Skip to content

Commit 1c91ff1

Browse files
committed
chore: change shortcodes format (HTML tag like)
1 parent 49ebe76 commit 1c91ff1

File tree

18 files changed

+217
-217
lines changed

18 files changed

+217
-217
lines changed

.vscode/csak-timelog.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
22
"starttime": "3/29/2022, 8:08:48 AM",
3-
"totaltimesec": 15540,
4-
"lasttime": "3/29/2022, 12:40:43 PM"
3+
"totaltimesec": 18720,
4+
"lasttime": "3/29/2022, 1:33:30 PM"
55
}

content/blog/CentOS8-firewalld-tips/index.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ When configuring firewall rules to be as strict as required, you may have some t
2424

2525
## Enable "*Access Denied*"
2626

27-
{{< expand "References" >}}
27+
{{<expand "References">}}
2828
* [How to enable firewalld logging for denied packets on Linux](https://www.cyberciti.biz/faq/enable-firewalld-logging-for-denied-packets-on-linux/)
29-
{{</ expand >}}
29+
{{</expand>}}
3030

3131
`firewalld` can log events to `rsyslog`, the events journal in most linux distribution. This can be enable either at runtime (that won't persist across service restarts) or by configuration to keep it enabled for longer periods.
3232

@@ -40,7 +40,7 @@ sudo sed -i.bak -E 's/#?LogDenied=off/LogDenied=all/' /etc/firewalld/firewalld.c
4040
sudo firewall-cmd --get-log-denied
4141
```
4242

43-
Then, we'll put rejection logs in {{< var "logFileName" >}}.
43+
Then, we'll put rejection logs in {{<var "logFileName">}}.
4444

4545
```sh
4646
cat <<EOF | sudo tee /etc/rsyslog.d/{{logFileName}}.conf

content/blog/kubernetes-qol.md

+18-18
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ image:
2121

2222
## `kubectl` auto-complete
2323

24-
{{< expand "References" >}}
24+
{{<expand "References">}}
2525
* [:books: kubectl installation manual](https://kubernetes.io/docs/tasks/tools/install-kubectl/#enable-kubectl-autocompletion)
26-
{{</ expand >}}
26+
{{</expand>}}
2727

2828
Autocomplete is nice, and a real time saver. It avoids typos, and it's quite satisfying to type a complete command in 4 keystrokes and a couple of `tab`s correctly placed. (even if I'm always unsure when relying on my browser's autocomplete for https://**anal**ytics.google.com :expressionless:).
2929

@@ -33,8 +33,8 @@ But for this one, I can only say one thing, and you have no excuses:
3333

3434
So, short stories short, and depending on your shell, type in:
3535

36-
{{< tabs "zsh" "bash" >}}
37-
{{< tab >}}
36+
{{<tabs "zsh" "bash">}}
37+
{{<tab>}}
3838
```sh
3939
cat <<EOF | tee -a ~/.zshrc
4040
autoload -Uz compinit
@@ -43,8 +43,8 @@ source <(kubectl completion zsh)
4343
EOF
4444
source ~/.zshrc
4545
```
46-
{{</ tab >}}
47-
{{< tab >}}
46+
{{</tab>}}
47+
{{<tab>}}
4848

4949
> All the (bad) flavours come from the natural world.
5050
@@ -61,23 +61,23 @@ fi
6161
echo 'source <(kubectl completion bash)' >> ~/.bashrc
6262
source ~/.bashrc
6363
```
64-
{{</ tab >}}
65-
{{</ tabs >}}
64+
{{</tab>}}
65+
{{</tabs>}}
6666

6767
## `kubecolor`: prettier `kubectl` commands outputs with colors
6868

69-
{{< expand "References" >}}
69+
{{<expand "References">}}
7070
* [Add ANSI colors to kubectl describe and other outputs](https://github.com/kubernetes/kubectl/issues/524)
7171
* [kubecolor](https://github.com/dty1er/kubecolor)
72-
{{</ expand >}}
72+
{{</expand>}}
7373

7474
```sh
7575
go get -u github.com/dty1er/kubecolor/cmd/kubecolor
7676
# Make sure kubecolor is found
7777
which kubecolor
7878
```
7979

80-
{{< alert theme="warning" >}}
80+
{{<alert theme="warning">}}
8181
If the command above did not worked, then you may have a problem with your `$GOPATH` or `$GOHOME` environment variables. If none are set, then the package was installed in `~/go/bin`. Either fix your vars or add `~/go/bin` to your `$PATH`.
8282

8383
```sh
@@ -86,7 +86,7 @@ PATH="\$PATH:\$HOME/go/bin"
8686
EOF
8787
source ~/.zshrc
8888
```
89-
{{</ alert >}}
89+
{{</alert>}}
9090

9191
Finally, you could either use `kubecolor` instead of `kubectl`, or alias `kubectl` as `kubecolor` with the following code sample:
9292

@@ -104,21 +104,21 @@ EOF
104104
source {{profileFile}}
105105
```
106106

107-
{{< alert theme="warning">}}
107+
{{<alert theme="warning">}}
108108
I noticed some little things does not work well with `kubecolor`. That's why the script above let you use the original `kubectl` command through `kubectll`. For instance, I noticed that some commands prompting user input (so using *stdin*), such as `kubectl login`, don't work.
109109

110110
So, if you try a command that seems to not work as expected, or stay stuck, fall back to `kubectll`.
111-
{{</ alert >}}
111+
{{</alert>}}
112112

113113
## `helm`: a kubernetes stack template repository
114114

115115
[*Helm*](https://helm.sh/) is a convinient way to use or share configurable kubernetes stacks. For example, it may allow to install easily a front-end, with its API and a database, in a single template, in which you can inject your specific configuration (PVC, ports, environment, etc...).
116116

117117
To install *helm*, run the following command:
118118

119-
{{< alert theme="info">}}
119+
{{<alert theme="info">}}
120120
Make sure that OpenSSL is installed before proceeding.
121-
{{</ alert >}}
121+
{{</alert>}}
122122

123123
```sh
124124
# See https://helm.sh/docs/intro/install/
@@ -127,9 +127,9 @@ curl https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3 | bas
127127

128128
## `krew`: a `kubectl` plugins manager
129129

130-
{{< expand "References" >}}
130+
{{<expand "References">}}
131131
* [Installing krew](https://krew.sigs.k8s.io/docs/user-guide/setup/install/)
132-
{{</ expand >}}
132+
{{</expand>}}
133133

134134
[*krew*](https://krew.sigs.k8s.io/) is a nice small plugin manager for your `kubectl` command. At the time of writing, it has [129 plugins available](https://krew.sigs.k8s.io/plugins/), including some pretty convinient to restart pods, login using OpenId, check the state of your cluster, and more.
135135

content/talks/RSA-Certificates-guide.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ What does *asymmetric encryption* means ? It is opposed to the *symmetric encryp
2525

2626
While the 2 points above are super great for security and privacy, they come also with some drawbacks: generating, manipulating and using RSA keys can be a bit confusing, and that's why I'm writing this article.
2727

28-
{{< alert theme="info" >}}
28+
{{<alert theme="info">}}
2929
See this article like a personal guide I publish in case it can help someone. It is not meant to be precise or exhaustive.
30-
{{</ alert >}}
30+
{{</alert>}}
3131

3232
## File formats
3333

@@ -37,11 +37,11 @@ As said above, [*RSA*](https://en.wikipedia.org/wiki/RSA_(cryptosystem)) being a
3737

3838
The private key is one of the 2 keys mentioned above, that is meant to be used by the server.
3939

40-
{{< alert theme="danger" >}}
40+
{{<alert theme="danger">}}
4141
As its name suggests, this file is **super** critical: anyone having this can decode messages that are sent to you, encrypted with your [public key](#pub-the-public-key).
4242

4343
You should **never __ever__** send it to untrusted party. Other people should have the [public key](#pub-the-public-key).
44-
{{</ alert >}}
44+
{{</alert>}}
4545

4646
#### What does it contains ?
4747

@@ -72,7 +72,7 @@ Here, `2048` is the modulus. To be considered safe until 2030, it is recommended
7272
openssl rsa -text -in foo.key
7373
```
7474

75-
{{< expand "Sample output" >}}
75+
{{<expand "Sample output">}}
7676
```
7777
RSA Private-Key: (512 bit, 2 primes)
7878
modulus:
@@ -109,7 +109,7 @@ coefficient:
109109
f9:3e:07:e3:99:59:03:13:5f:49:97:79:86:96:9e:
110110
a8:c3
111111
```
112-
{{</ expand >}}
112+
{{</expand>}}
113113

114114
There is a lot of maths involved here, so I won't go any further. But if you're curious, go ahead and find out what those are !
115115

content/test/include-code-file/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ categories:
1717
image:
1818
---
1919

20-
{{< includeCodeFile "./foo.yaml" >}}
21-
{{< includeCodeFile "./bar.conf" "fallback" >}}
20+
{{<includeCodeFile "./foo.yaml">}}
21+
{{<includeCodeFile "./bar.conf" "fallback">}}

content/walkthroughs/kubernetes/00-vpn/index.md

+23-23
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,20 @@ tags:
1212
- Networking
1313
---
1414

15-
{{< expand "References" >}}
15+
{{<expand "References">}}
1616
* <https://www.digitalocean.com/community/tutorials/how-to-run-openvpn-in-a-docker-container-on-ubuntu-14-04>
1717
* <https://blog.container-solutions.com/running-docker-containers-with-systemd>
18-
{{</ expand >}}
18+
{{</expand>}}
1919

20-
Because we are installing our cluster bare metal on servers exposed on the Internet, we'll need a way to secure all of our network traffic around the critical parts of *kubernetes*. To do so, we'll use OpenVPN to create a virtual secured network where all of our nodes will work. Moreover, this network will also contains *MetalLB* services when {{< linkToPage "/walkthroughs/kubernetes/02-cluster#initialize-metallb" "configuring our bare metal load balancer" >}}.
20+
Because we are installing our cluster bare metal on servers exposed on the Internet, we'll need a way to secure all of our network traffic around the critical parts of *kubernetes*. To do so, we'll use OpenVPN to create a virtual secured network where all of our nodes will work. Moreover, this network will also contains *MetalLB* services when {{<linkToPage "/walkthroughs/kubernetes/02-cluster#initialize-metallb" "configuring our bare metal load balancer">}}.
2121

22-
{{< alert theme="info" >}}
22+
{{<alert theme="info">}}
2323
You **may** need to edit your `/etc/hosts` files to associate `vpn.{{cluster.baseHostName}}` to your future *OpenVPN* server on **each of the devices that will join the cluster** (if `vpn.{{cluster.baseHostName}}` is not a real *DNS* name).
2424

2525
```sh
2626
echo '{{vpn.publicServerIp}} vpn.{{cluster.baseHostName}}' >> /etc/hosts
2727
```
28-
{{</ alert >}}
28+
{{</alert>}}
2929

3030
See the [docs of kylemanna/openvpn](https://github.com/kylemanna/docker-openvpn$docs) (our *OpenVPN* server).
3131

@@ -50,13 +50,13 @@ Once the last command is executed, your *OpenVPN* server should start. If it sta
5050

5151
## Make a *systemd* service for *OpenVPN* through *docker*
5252

53-
{{< alert theme="info" >}}
53+
{{<alert theme="info">}}
5454
If you're not using systemd, see [how to use init.d](https://www.digitalocean.com/community/tutorials/how-to-run-openvpn-in-a-docker-container-on-ubuntu-14-04#step-3-%E2%80%94-launch-the-openvpn-server), and skip this section.
55-
{{</ alert >}}
55+
{{</alert>}}
5656

57-
Install the {{< linkToIncludedFile "./systemd/kubernetes-vpn.service" >}} template into `/usr/lib/systemd/system`, then enable this service. It will run our *OpenVPN* server container.
57+
Install the {{<linkToIncludedFile "./systemd/kubernetes-vpn.service">}} template into `/usr/lib/systemd/system`, then enable this service. It will run our *OpenVPN* server container.
5858

59-
{{< includeCodeFile "./systemd/kubernetes-vpn.service" >}}
59+
{{<includeCodeFile "./systemd/kubernetes-vpn.service">}}
6060

6161
```sh
6262
mv ./systemd/kubernetes-vpn.service /usr/lib/systemd/system
@@ -68,7 +68,7 @@ systemctl enable --now kubernetes-vpn.service
6868

6969
You can check our docker container with `docker container inspect kubernetes-vpn.service` & get our *OpenVPN* logs with `journalctl -u kubernetes-vpn.service`.
7070

71-
Now, get the value of the variable {{< var "vpn.serverIp" >}} with this command:
71+
Now, get the value of the variable {{<var "vpn.serverIp">}} with this command:
7272

7373
```sh
7474
# Show interface informations
@@ -82,11 +82,11 @@ docker exec -it kubernetes-vpn.service ip -4 addr show tun0 `# Get the "tun0" in
8282
8383
## Setup clients
8484

85-
This section is meant to be repeated for each of your cluster's nodes. For every node, replace the {{< var "node.ip" >}} & {{< var "node.name" >}} variables.
85+
This section is meant to be repeated for each of your cluster's nodes. For every node, replace the {{<var "node.ip">}} & {{<var "node.name">}} variables.
8686

87-
{{< alert theme="warning" >}}
88-
**Important**: {{< var "node.ip" >}} is the desired IP of your machine in your VPN. It **must** be on the same network than {{< var "vpn.serverIp" >}} (usually, `192.168.255.XXX`)
89-
{{</ alert >}}
87+
{{<alert theme="warning">}}
88+
**Important**: {{<var "node.ip">}} is the desired IP of your machine in your VPN. It **must** be on the same network than {{<var "vpn.serverIp">}} (usually, `192.168.255.XXX`)
89+
{{</alert>}}
9090

9191
### Generate credentials
9292

@@ -103,15 +103,15 @@ echo "ifconfig-push {{node.ip}} {{vpn.serverIp}}" | docker run -v {{vpn.volumeNa
103103
docker run -v {{vpn.volumeName}}:/etc/openvpn --rm kylemanna/openvpn:2.4 ovpn_getclient {{node.name}} > {{node.name}}.ovpn
104104
```
105105

106-
Move this `{{node.name}}.ovpn` file to the {{< var "node.name" >}} node **by a safe mean**. Those files are super critical, so be very careful to not put it anywhere usafe.
106+
Move this `{{node.name}}.ovpn` file to the {{<var "node.name">}} node **by a safe mean**. Those files are super critical, so be very careful to not put it anywhere usafe.
107107

108108
Next operations have to be run on clients.
109109

110110
### Install *OpenVPN* client
111111

112-
{{< expand "References" >}}
112+
{{<expand "References">}}
113113
* <https://www.vpsserver.com/community/tutorials/4035/install-openvpn-on-centos-8/>
114-
{{< /expand >}}
114+
{{</expand>}}
115115

116116
Install required dependencies.
117117

@@ -150,21 +150,21 @@ You should be good to go ! :fire:
150150

151151
## Troubleshoot
152152

153-
{{< expand "References" >}}
153+
{{<expand "References">}}
154154
* https://stackoverflow.com/a/63624477/4839162
155-
{{</ expand >}}
155+
{{</expand>}}
156156

157157
### No internet connection on nodes, or no connection between nodes
158158

159-
{{< expand "References" >}}
159+
{{<expand "References">}}
160160
* <https://github.com/kylemanna/docker-openvpn#openvpn-details>
161161
* <https://github.com/kylemanna/docker-openvpn/issues/381#issuecomment-386269991>
162162
* <https://github.com/kylemanna/docker-openvpn/issues/381#issuecomment-616009737>
163-
{{</ expand >}}
163+
{{</expand>}}
164164

165-
{{< alert theme="warning" >}}
165+
{{<alert theme="warning">}}
166166
Check in case-by-case.
167-
{{</ alert >}}
167+
{{</alert>}}
168168

169169
I had to add a route push in my server configuration to make it work. See <https://openvpn.net/community-resources/how-to/#expanding-the-scope-of-the-vpn-to-include-additional-machines-on-either-the-client-or-server-subnet>
170170

0 commit comments

Comments
 (0)