awesome-home-kubernetes
testssl.sh
awesome-home-kubernetes | testssl.sh | |
---|---|---|
16 | 43 | |
1,205 | 7,647 | |
- | - | |
7.7 | 8.7 | |
over 1 year ago | 6 days ago | |
Python | Shell | |
The Unlicense | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-home-kubernetes
-
A 4+1 node storage cluster intended for AI ingest datasets. What platform should we use? (ceph, btrfs, OpenZFS, TruNas Scale?
Also check out the awesome kubernetes@home repo where many homelabbers share their configs.
-
Running Kubernetes cluster locally to self host a bunch of applications along with a DNS server
Sorry I'm not familiar with this. Are you referring to this?
-
to kube or not to kube?
https://github.com/k8s-at-home/awesome-home-kubernetes https://github.com/k8s-at-home/template-cluster-k3s
- I must announce the immediate end of service of SSLPing
-
Deploy a Kubernetes cluster and have it automated from a Git repository!
To see it in action be sure to check out my repository or the many others here.
-
[github] k3s-io/k3s: Production ready, easy to install, half the memory, all in a binary less than 100 MB
Make it usable and link to the best place with k3s in action: https://github.com/k8s-at-home/awesome-home-kubernetes
- k8s-at-home/awesome-home-kubernetes: Awesome projects involving running Kubernetes at home
-
Kubernetes at Home With K3s
Nice but I suggest going to https://github.com/k8s-at-home/awesome-home-kubernetes and learn from the best at this topic ;)
-
Kubernetes best practices generally and for organizing my stuff
Check out Flux V2. It syncs a git repo with your cluster, allowing you to define your infrastructure as code. It will keep your cluster synced with your repo and detect changes. A number of example repos are Here and onedr0p did a example repo here There's many options for structuring folder, I'd recommend you have a look at a few repos and pick one you like. The linked template is a good start, as it helps avoid dependency hell with a crd folder that starts before the YAML that needs the crd defined. Many people on the awesome list also run ansible for full infrastructure as code. I spent a lot of time perfecting my setup to go from blank Ubuntu VM to my cluster with a few keystrokes. Running it in git also helps you be able to use things like renovate bot to keep versions up to date. As for namespaces, everyone had their own method, but about using kube-system. Also, keep a eye out for services that refuse to have their name space changed.
testssl.sh
-
Badssl.com
You’re in luck because such a tool exists :) https://testssl.sh/
- Testing TLS/SSL Encryption
-
Uncertain how to proceed with patching SSL and TLS issues in MacOS (Sweet32)
Run https://testssl.sh/ and see what ciphers are being offered.
-
Changing SSL Wildcard Certificate
There is https://github.com/drwetter/testssl.sh utility. It can help diagnose issues (e.g. diffs between working and non-working sites).
- Specific SSL Ciphers Test
-
SSL Diag Tool
For internal use, there's https://testssl.sh/
-
Dovecot not offering TLSv1.2 after a few minutes
The current configuration allows for TLSv1 to TLSv1.3 connections. I can verify those using testssl.sh, the tests will succeed (although correctly mentioning, that TLSv1 and TLSv1.1 should be disabled). Running the tests again after about 5 minutes, the results are different. TLSv1.2 now shows "not offered and downgraded to a weaker protocol".
- How to combine pem file and 3 security certificates?
- oggi 2022-11-01 verrà rilasciata una vulnerabilità di livello CRITICAL su OpenSSL 3.0.x
-
alternative to whatsmychaincert.com cli or gui
testssl.sh
What are some alternatives?
watchtower - A process for automating Docker container base image updates.
https-ssl-cert-check-zabbix - Script to check validity and expiration of TLS/SSL certificate on hosts. May be used with Zabbix or standalone.
cluster-template - A template for deploying a Kubernetes cluster with k3s or Talos
kubernetes-the-hard-way - Bootstrap Kubernetes the hard way. No scripts.
longhorn - Cloud-Native distributed storage built on and for Kubernetes
ssh-audit - SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
awesome-gitops - A curated list for awesome GitOps resources
ssh-audit - SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
piku - The tiniest PaaS you've ever seen. Piku allows you to do git push deployments to your own servers.
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
rook - Storage Orchestration for Kubernetes
OpenSSL - TLS/SSL and crypto library