You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/blog/CentOS8-firewalld-tips/index.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -24,9 +24,9 @@ When configuring firewall rules to be as strict as required, you may have some t
24
24
25
25
## Enable "*Access Denied*"
26
26
27
-
{{<expand "References">}}
27
+
{{<expand "References">}}
28
28
*[How to enable firewalld logging for denied packets on Linux](https://www.cyberciti.biz/faq/enable-firewalld-logging-for-denied-packets-on-linux/)
29
-
{{</expand>}}
29
+
{{</expand>}}
30
30
31
31
`firewalld` can log events to `rsyslog`, the events journal in most linux distribution. This can be enable either at runtime (that won't persist across service restarts) or by configuration to keep it enabled for longer periods.
32
32
@@ -40,7 +40,7 @@ sudo sed -i.bak -E 's/#?LogDenied=off/LogDenied=all/' /etc/firewalld/firewalld.c
40
40
sudo firewall-cmd --get-log-denied
41
41
```
42
42
43
-
Then, we'll put rejection logs in {{<var "logFileName">}}.
43
+
Then, we'll put rejection logs in {{<var "logFileName">}}.
44
44
45
45
```sh
46
46
cat <<EOF | sudo tee /etc/rsyslog.d/{{logFileName}}.conf
Autocomplete is nice, and a real time saver. It avoids typos, and it's quite satisfying to type a complete command in 4 keystrokes and a couple of `tab`s correctly placed. (even if I'm always unsure when relying on my browser's autocomplete for https://**anal**ytics.google.com :expressionless:).
29
29
@@ -33,8 +33,8 @@ But for this one, I can only say one thing, and you have no excuses:
33
33
34
34
So, short stories short, and depending on your shell, type in:
## `kubecolor`: prettier `kubectl` commands outputs with colors
68
68
69
-
{{<expand "References">}}
69
+
{{<expand "References">}}
70
70
*[Add ANSI colors to kubectl describe and other outputs](https://github.com/kubernetes/kubectl/issues/524)
go get -u github.com/dty1er/kubecolor/cmd/kubecolor
76
76
# Make sure kubecolor is found
77
77
which kubecolor
78
78
```
79
79
80
-
{{<alert theme="warning">}}
80
+
{{<alerttheme="warning">}}
81
81
If the command above did not worked, then you may have a problem with your `$GOPATH` or `$GOHOME` environment variables. If none are set, then the package was installed in `~/go/bin`. Either fix your vars or add `~/go/bin` to your `$PATH`.
82
82
83
83
```sh
@@ -86,7 +86,7 @@ PATH="\$PATH:\$HOME/go/bin"
86
86
EOF
87
87
source~/.zshrc
88
88
```
89
-
{{</alert>}}
89
+
{{</alert>}}
90
90
91
91
Finally, you could either use `kubecolor` instead of `kubectl`, or alias `kubectl` as `kubecolor` with the following code sample:
92
92
@@ -104,21 +104,21 @@ EOF
104
104
source {{profileFile}}
105
105
```
106
106
107
-
{{<alert theme="warning">}}
107
+
{{<alerttheme="warning">}}
108
108
I noticed some little things does not work well with `kubecolor`. That's why the script above let you use the original `kubectl` command through `kubectll`. For instance, I noticed that some commands prompting user input (so using *stdin*), such as `kubectl login`, don't work.
109
109
110
110
So, if you try a command that seems to not work as expected, or stay stuck, fall back to `kubectll`.
111
-
{{</alert>}}
111
+
{{</alert>}}
112
112
113
113
## `helm`: a kubernetes stack template repository
114
114
115
115
[*Helm*](https://helm.sh/) is a convinient way to use or share configurable kubernetes stacks. For example, it may allow to install easily a front-end, with its API and a database, in a single template, in which you can inject your specific configuration (PVC, ports, environment, etc...).
116
116
117
117
To install *helm*, run the following command:
118
118
119
-
{{<alert theme="info">}}
119
+
{{<alerttheme="info">}}
120
120
Make sure that OpenSSL is installed before proceeding.
121
-
{{</alert>}}
121
+
{{</alert>}}
122
122
123
123
```sh
124
124
# See https://helm.sh/docs/intro/install/
@@ -127,9 +127,9 @@ curl https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3 | bas
[*krew*](https://krew.sigs.k8s.io/) is a nice small plugin manager for your `kubectl` command. At the time of writing, it has [129 plugins available](https://krew.sigs.k8s.io/plugins/), including some pretty convinient to restart pods, login using OpenId, check the state of your cluster, and more.
Copy file name to clipboardexpand all lines: content/talks/RSA-Certificates-guide.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,9 @@ What does *asymmetric encryption* means ? It is opposed to the *symmetric encryp
25
25
26
26
While the 2 points above are super great for security and privacy, they come also with some drawbacks: generating, manipulating and using RSA keys can be a bit confusing, and that's why I'm writing this article.
27
27
28
-
{{<alert theme="info">}}
28
+
{{<alerttheme="info">}}
29
29
See this article like a personal guide I publish in case it can help someone. It is not meant to be precise or exhaustive.
30
-
{{</alert>}}
30
+
{{</alert>}}
31
31
32
32
## File formats
33
33
@@ -37,11 +37,11 @@ As said above, [*RSA*](https://en.wikipedia.org/wiki/RSA_(cryptosystem)) being a
37
37
38
38
The private key is one of the 2 keys mentioned above, that is meant to be used by the server.
39
39
40
-
{{<alert theme="danger">}}
40
+
{{<alerttheme="danger">}}
41
41
As its name suggests, this file is **super** critical: anyone having this can decode messages that are sent to you, encrypted with your [public key](#pub-the-public-key).
42
42
43
43
You should **never __ever__** send it to untrusted party. Other people should have the [public key](#pub-the-public-key).
44
-
{{</alert>}}
44
+
{{</alert>}}
45
45
46
46
#### What does it contains ?
47
47
@@ -72,7 +72,7 @@ Here, `2048` is the modulus. To be considered safe until 2030, it is recommended
72
72
openssl rsa -text -in foo.key
73
73
```
74
74
75
-
{{<expand "Sample output">}}
75
+
{{<expand "Sample output">}}
76
76
```
77
77
RSA Private-Key: (512 bit, 2 primes)
78
78
modulus:
@@ -109,7 +109,7 @@ coefficient:
109
109
f9:3e:07:e3:99:59:03:13:5f:49:97:79:86:96:9e:
110
110
a8:c3
111
111
```
112
-
{{</expand>}}
112
+
{{</expand>}}
113
113
114
114
There is a lot of maths involved here, so I won't go any further. But if you're curious, go ahead and find out what those are !
Because we are installing our cluster bare metal on servers exposed on the Internet, we'll need a way to secure all of our network traffic around the critical parts of *kubernetes*. To do so, we'll use OpenVPN to create a virtual secured network where all of our nodes will work. Moreover, this network will also contains *MetalLB* services when {{<linkToPage "/walkthroughs/kubernetes/02-cluster#initialize-metallb" "configuring our bare metal load balancer">}}.
20
+
Because we are installing our cluster bare metal on servers exposed on the Internet, we'll need a way to secure all of our network traffic around the critical parts of *kubernetes*. To do so, we'll use OpenVPN to create a virtual secured network where all of our nodes will work. Moreover, this network will also contains *MetalLB* services when {{<linkToPage "/walkthroughs/kubernetes/02-cluster#initialize-metallb" "configuring our bare metal load balancer">}}.
21
21
22
-
{{<alert theme="info">}}
22
+
{{<alerttheme="info">}}
23
23
You **may** need to edit your `/etc/hosts` files to associate `vpn.{{cluster.baseHostName}}` to your future *OpenVPN* server on **each of the devices that will join the cluster** (if `vpn.{{cluster.baseHostName}}` is not a real *DNS* name).
See the [docs of kylemanna/openvpn](https://github.com/kylemanna/docker-openvpn$docs) (our *OpenVPN* server).
31
31
@@ -50,13 +50,13 @@ Once the last command is executed, your *OpenVPN* server should start. If it sta
50
50
51
51
## Make a *systemd* service for *OpenVPN* through *docker*
52
52
53
-
{{<alert theme="info">}}
53
+
{{<alerttheme="info">}}
54
54
If you're not using systemd, see [how to use init.d](https://www.digitalocean.com/community/tutorials/how-to-run-openvpn-in-a-docker-container-on-ubuntu-14-04#step-3-%E2%80%94-launch-the-openvpn-server), and skip this section.
55
-
{{</alert>}}
55
+
{{</alert>}}
56
56
57
-
Install the {{<linkToIncludedFile "./systemd/kubernetes-vpn.service">}} template into `/usr/lib/systemd/system`, then enable this service. It will run our *OpenVPN* server container.
57
+
Install the {{<linkToIncludedFile "./systemd/kubernetes-vpn.service">}} template into `/usr/lib/systemd/system`, then enable this service. It will run our *OpenVPN* server container.
You can check our docker container with `docker container inspect kubernetes-vpn.service` & get our *OpenVPN* logs with `journalctl -u kubernetes-vpn.service`.
70
70
71
-
Now, get the value of the variable {{<var "vpn.serverIp">}} with this command:
71
+
Now, get the value of the variable {{<var "vpn.serverIp">}} with this command:
72
72
73
73
```sh
74
74
# Show interface informations
@@ -82,11 +82,11 @@ docker exec -it kubernetes-vpn.service ip -4 addr show tun0 `# Get the "tun0" in
82
82
83
83
## Setup clients
84
84
85
-
This section is meant to be repeated for each of your cluster's nodes. For every node, replace the {{<var "node.ip">}} & {{<var "node.name">}} variables.
85
+
This section is meant to be repeated for each of your cluster's nodes. For every node, replace the {{<var "node.ip">}} & {{<var "node.name">}} variables.
86
86
87
-
{{<alert theme="warning">}}
88
-
**Important**: {{<var "node.ip">}} is the desired IP of your machine in your VPN. It **must** be on the same network than {{<var "vpn.serverIp">}} (usually, `192.168.255.XXX`)
89
-
{{</alert>}}
87
+
{{<alerttheme="warning">}}
88
+
**Important**: {{<var "node.ip">}} is the desired IP of your machine in your VPN. It **must** be on the same network than {{<var "vpn.serverIp">}} (usually, `192.168.255.XXX`)
docker run -v {{vpn.volumeName}}:/etc/openvpn --rm kylemanna/openvpn:2.4 ovpn_getclient {{node.name}} > {{node.name}}.ovpn
104
104
```
105
105
106
-
Move this `{{node.name}}.ovpn` file to the {{<var "node.name">}} node **by a safe mean**. Those files are super critical, so be very careful to not put it anywhere usafe.
106
+
Move this `{{node.name}}.ovpn` file to the {{<var "node.name">}} node **by a safe mean**. Those files are super critical, so be very careful to not put it anywhere usafe.
I had to add a route push in my server configuration to make it work. See <https://openvpn.net/community-resources/how-to/#expanding-the-scope-of-the-vpn-to-include-additional-machines-on-either-the-client-or-server-subnet>
0 commit comments