Skip to content
#

etcd

Here are 469 public repositories matching this topic...

rkd-msw
rkd-msw commented Apr 18, 2019

I'm using TLS on etcd 3.3.12 and have a mix of etcd proxies and masters. The proxies don't seem to honour the --cipher-suites setting, as it ends up with ECDHE-RSA-AES256-GCM-SHA384 despite --cipher-suites=TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 being set.

$ pgrep -laf /usr/bin/etcd
21968 /usr/bin/etcd --listen-client-urls https://0.0.0.0:4000 --adv
traefik
woohhan
woohhan commented Dec 7, 2019

Is this a bug report or feature request?

  • Feature Request

What should the feature do:
We have per node configuration for selecting device, but no wal/db device selection. We can add configuration for what device will be used for wal/db device.

// current
    nodes:
    - name: "mynode"
      devices:
      - name: "sdb"

// fix to
    nodes:
    - name: "mynode"
xlyoung
xlyoung commented Oct 24, 2017

通过了CSR认证,却没有获取到nodes的信息

[root@k8s-01 ssl]# kubectl get csr
NAME AGE REQUESTOR CONDITION
csr-b0gpz 6m kubelet-bootstrap Pending
csr-swnf0 27m kubelet-bootstrap Pending
[root@k8s-01 ssl]# kubectl certificate approve csr-b0gpz csr-swnf0
certificatesigningrequest "csr-b0gpz" approved
certificatesigningrequest "csr-swnf0" approved
[root@k8s-01 ssl]

waitingsong
waitingsong commented Apr 25, 2019

https://github.com/gjmzj/kubeasz/blob/master/docs/guide/ingress-tls.md#4%E5%88%9B%E5%BB%BA-https-ingress-%E4%BE%8B%E5%AD%90

# 创建https ingress
$ kubectl apply -f /etc/ansible/manifests/ingress/traefik/tls/hello-tls.ing.yaml
# 注意根据hello示例,需要在default命名空间创建对应的secret: traefik-cert
$ kubectl create secret tls traefik-cert --key=tls.key --cert=tls.crt
  1. 不执行 hello-tls.ing.yaml ,nginx的https
kmoppel
kmoppel commented Feb 2, 2017

Hey!
Not a big problem of course but currently when you do "pip install patroni" you still need to go to Github and save a copy of for https://github.com/zalando/patroni/blob/master/postgres0.yml to get started. I know there are env variables but there are quite some to remember. So would be very convenient if running something like "patroni --initconf postgres0.yml" would fill the postgres0.yml

stolon
stremovsky
stremovsky commented Mar 5, 2020

What would you like to be added:

For security reasons, I do not want to connect to consul using the domain socket.

The following is not working as I expect it to be:
"stolon-sentinel --store-backend=consul --store-endpoints unix:///var/run/consul/consul_http.sock"

I am getting the next error:

2020-03-05T20:46:32.998Z FATAL cmd/sentinel.go:1985 cannot create sentinel: c

goddanao
goddanao commented Apr 16, 2020

Is your feature request related to a problem? Please describe.
I got few migrations each referring a different connection. migrate:fresh, migrate:refresh doesn't handle this scenario since they operate on the default connection or in the specific connection passed via --database param.

Describe the solution you'd like
The simplest solution can be to process only migrations that has th

mgmt
chuckha
chuckha commented Sep 16, 2019

Maybe I missed it but etcdadm just told me to

INFO[0005] To add another member to the cluster, copy the CA cert/key to its certificate dir and run: 
INFO[0005] 	etcdadm join https://10.0.0.19:2379 

But I didn't see any commands that would help me achieve this task. It might be nice to have a command to tar up the certs or at least provide me with some bash i can copy paste.

Improve this page

Add a description, image, and links to the etcd topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the etcd topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.