Search
You can find the results of your search below.
Matching pagenames:
Fulltext results:
- kubernetes_using_single_node_as_master_and_worker @linux_faq
- udo apt-get install -y apt-transport-https \ ca-certificates curl \ gnupg-agent \ software-properties-com... ?only_cpu_and_memory=true": x509: cannot validate certificate for 192.168.44.11 because it doesn't contain any ... ow config reloads to resume - alert: NGINXCertificateExpiry expr: (avg(nginx_ingress_controll... annotations: description: ssl certificate(s) will expire in less then a week su
- kubernetes @devops
- k8s-tips-give-access-to-your-clusterwith-a-client-certificate-dfb3b71a76fe \\ Что нужно понимать. * В куберн... key -nodes -out ${KUB_USERNAME}.csr echo "Create CertificateSigningRequest in ${KUB_CONTEXT} cluster..." expor... tr -d '\n') kubectl apply -f - <<EOF apiVersion: certificates.k8s.io/v1beta1 kind: CertificateSigningRequest metadata: name: ${KUB_USERNAME}_csr spec: groups: - syst
- wiki_backup @linux_faq
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... and remove tmp dir echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... te to remote server echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit
- apt-key_is_deprecated_how_to_add @linux_faq
- do apt-get update sudo apt install gnupg2 wget ca-certificates lsb-release software-properties-common gpg_key_u
- openssl_hints @linux_faq
- ых (только то что между строками <code>-----BEGIN CERTIFICATE-----</code> и <code>-----END CERTIFICATE------</code> делаем так: openssl s_client -showcerts -connect nexu
- armbian_install_xfce_desktop @android
- obexd bluez-tools brltty brltty-x11 bubblewrap ca-certificates-mono cheese-common cifs-utils cli-common colord ... obexd bluez-tools brltty brltty-x11 bubblewrap ca-certificates-mono cheese-common cifs-utils cli-common colord
- aws_certified_devops_engineer_professional @devops
- * защита данных в процессе передачи и хранения (**Certificate Manager**, **AWS Shield**, **AWS Web Application
- aws_acm_letsencrypt_renew_lambda_terraform @devops
- сертификатов (в том числе и wild-card) в **Amazon Certificate Manager**. \\ С недавних пор **Amazon** перестал ... = "${var.certbot_contact_email}" certificate_domains = "${local.certificate_domains}" # Route53 Zones list to apply policy hosted_zon... = data.aws_route53_zone.zones certificate_arn = aws_acm_certificate.c
- kuwfi-ax1800-tenbay-t-mb5eu-v01 @openwrt
- potx2f/luci-app-temp-status <code>wget --no-check-certificate -O /tmp/luci-app-temp-status_0.3-5_all.ipk https:
- otus_course_final @devops
- ====== Сертификат OTUS ====== https://otus.ru/certificate/a3bb5b94f88e4582a53f606a1f1ab0ae/ ====== Проектная р
- deploy_elk_using_helm @devops
- password: 7hhjEqA6oH3049D1oTT9s4O2 ssl: certificate_authorities: - /mnt/elastic-internal/elasti... curl \ unzip \ git \ dnsmasq \ ca-certificates \ && apk --no-cache add --virtual .build-depen... # LUA options ## lua_ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt; lua_package_path '~/lua/?.lua;;'; resolver 192.168.77.1;
- powershell_skip_certificate_check @ms_windows_ms_sql
- ile-from-server-via-https-which-has-a-self-signed-certificate/ - это на Powershell 5 не сработало\\ "[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};(New-Object Net.WebCl
- skaffold @devops
- } /BEGIN/, /END/ { print }' > /usr/local/share/ca-certificates/ca.crt update-ca-certificates unset DOCKER_TLS_CERTDIR dockerd-entrypoint.sh stages:... } /BEGIN/, /END/ { print }' > /usr/local/share/ca-certificates/ca.crt update-ca-certificates env echo "waiting for the DinD..." timeout 60 bash -c '
- ubuntu_setup_script @linux_faq
- ######################################### ### Add Certificates ########################################### open... em csplit -k -f $CA_CERT_PREFIX ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname $CA_CERT_PREFIX\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "$CA_CERT_... PREFIX"* ; do sudo mv "$file" /usr/local/share/ca-certificates/"$file".pem ; done for file in /usr/local/share/