IT |
ITmedia 総合記事一覧 |
[ITmedia ビジネスオンライン] 「DAZN for docomo」、初期ユーザーも一律値上げ 7月から月額1078円→1925円に |
https://www.itmedia.co.jp/business/articles/2204/14/news173.html
|
daznfordocomo |
2022-04-14 18:22:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia ビジネスオンライン] スバルの新型BEV「ソルテラ」は“購入可能” 594万円から |
https://www.itmedia.co.jp/business/articles/2204/14/news174.html
|
itmedia |
2022-04-14 18:11:00 |
IT |
情報システムリーダーのためのIT情報専門サイト IT Leaders |
空間撮影で3Dコンテンツを作成できるMatterportが日本法人「マーターポート」を設立 | IT Leaders |
https://it.impress.co.jp/articles/-/23020
|
空間撮影でDコンテンツを作成できるMatterportが日本法人「マーターポート」を設立ITLeaders米Matterportは年月日、日本法人「マーターポート株式会社」本社東京都港区、執行役員社長蕭敬和氏を設立したと発表した。 |
2022-04-14 18:14:00 |
python |
Pythonタグが付けられた新着投稿 - Qiita |
複数のグラフを一度にプロットする |
https://qiita.com/reser_ml_memo/items/3f0e50912911d75804c5
|
科学研究所 |
2022-04-14 18:24:28 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
夜集中して、寝ないで頑張れる環境をつくり、疲れたらLINEで癒しの曲を! |
https://qiita.com/Nori777/items/2f1a32f2fe561f297fd6
|
obnizxlinebot |
2022-04-14 18:51:35 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
とかく、この世は住みにくい。対人関係の距離感をobnizで物理的に測り矯正するLINEBotを作成! |
https://qiita.com/yoshio333333/items/6255585fea900974ae81
|
linebot |
2022-04-14 18:49:23 |
AWS |
AWSタグが付けられた新着投稿 - Qiita |
Amazon VPC IP Address Manager とは? |
https://qiita.com/miyuki_samitani/items/1e754adac213f2ac319c
|
amazonvpcipaddressmanager |
2022-04-14 18:59:23 |
AWS |
AWSタグが付けられた新着投稿 - Qiita |
VMware Cloud on AWSとAmazon VPCの接続パターン & ENI経由での接続詳細 |
https://qiita.com/mtoyoda/items/99c9b5af4392fdc3c170
|
amazonvpc |
2022-04-14 18:17:24 |
技術ブログ |
Mercari Engineering Blog |
グループに拡大していくFunctionチームのRoadmap/Missionを策定した話 |
https://engineering.mercari.com/blog/entry/20220413-3311c64c07/
|
functiohellip |
2022-04-14 10:00:38 |
海外TECH |
DEV Community |
Free Push-To-Talk Android SDK awaits your implementation |
https://dev.to/voicepingapp/free-push-to-talk-android-sdk-awaits-your-implementation-hnf
|
Free Push To Talk Android SDK awaits your implementationNothing is better than a good quality product and it is free We Smart Walkie Pte Ltd have been developing walkie talkie Push To Talk software for years with all the hurdles and obstacles we faced to bring the best solution to our users who come from all over the world countries Now we proudly announce that you can take and use some of our good work in the form of open source Android Software Development Kit SDK and open source server that you can self host This is our contribution to the community whom we owe Oftentimes we take info and get answers from the community And we solve some of our problems using the open source software from the community too So this is our “thank you to the community which might also include you What is Push To Talk The simplest explanation for Push To Talk is walkie talkie functionality When we want to talk in a walkie talkie we need to push a button and hold it Then only we can be heard instantly by other people on other walkie talkies When we are done talking we need to release the button In a walkie talkie when we talk we can t hear others and vice versa when we hear we can t talk That s where the Push To Talk term comes from It s often abbreviated as PTT So what is Push To Talk SDK Software Development Kit SDK is a piece of software that can be directly integrated into another software to enrich its functionality PTT SDK offers the capability to add walkie talkie PTT functionality into your software VoicePing PTT Android SDK helps you add PTT functionality to your android app It will not be limited by range like the old walkie talkie As long as the devices have internet connection even if one device is in the Earth s south pole and one other in the north pole they will be able to talk to each other seamlessly Why would you need PTT functionality PTT conforms to human direct verbal communication It s fast and instant The exact way we talk to others and others talk to us Text messages compared to PTT take more time to write and to be understood Although text has its own power in a special context which is silence more private clarity and light in data storage and transfer But most of the time we use too much text messaging outside its specialty causing us to lose time just to convey non private or non sensitive information to the other party PTT also has its own power which is instant and interruptible Hence PTT is often used in Search and Rescue SAR like activities because the communication needs to be instant hassle free over a long period of time no need for action to pick up to hear the message and reliable It s different than a call which takes time to get picked up first needs an opening word smalltalk closing words and parties involved need to spend high focus and attention to communicate and respond What can you build with a PTT SDK Imagine you drive a car in convoy There are cars including yours Only the front most car driver knows the direction Sometimes you are not right behind your convoy but separated by other vehicles on the road When the first car turns right and you lose sight what would you do Send a text message to the first car s driver Or call None of this is suitable in this kind of situation because seconds matter in decision Which results in total driving time your convoy will have Now imagine you have an app on your phone that has walkie talkie PTT functionality You plug an earpiece to it and you drive Along the journey when there is road branching the first driver always PTT other drivers which way to take It can be heard instantly without any action If a problem occurs you can also PTT others by pressing the earpiece button to tell them so they can stop wait for you or even search to help you The communication is as simple as pressing the button It s easy fast and instant Yes you can build that kind of app with VoicePing Walkie Talkie Android SDK That is just one use case where PTT is irreplaceable You can find many other PTT use cases on our website How to taste the service before you go too deep You have two options First is by trying out free public channels on VoicePing apps below VoicePing WebVoicePing AndroidVoicePing iOSJoin the same free public channel ID to communicate between devices Second is by trying the VoicePing SDK demo apk The demo apk source code is also available on the VoicePing Android SDK repository to guide you on how to use or integrate the SDK to your android project Where should you go for more details if you want to use VoicePing Android SDK If you want to know more we have the documentation page here It mainly has two parts First is the Android PTT SDK itself The Android SDK needs VoicePing router server to work We have our public server for you to test and use If you need to self host the server on your own the second part of the documentation is the guide on setting up the self hosted server Who can use VoicePing Android PTT SDK Basically everyone since we put the code under MIT license That means you are free to use the software including for commercial purposes Who maintains the open source code The developers at Smart Walkie Pte Ltd are full time maintainers of the code So if you have issues or find bugs don t hesitate to report to us We also welcome all contributions from the community not just code but any contribution for example updating the documentation or hinting a typo What if you need more support beyond the open sourced functionality offers If you need further support we can help you in any way Please contact us at sales smartwalkietalkie com See more about this here If you are reading up to here thank you for your kind attention We can t wait to know what you will build with the VoicePing Walkie Talkie Android SDK Let us know in the comments section below or on the github discussions page We hope that this contribution of making a free open source PTT SDK will help the community overall to save time both software development wise and communication wise Finally even when VoicePing Android Walkie Talkie PTT SDK brings the possibility of instant communication what also matters is our own communication skill to convey information effectively The app is just a tool the tool itself doesn t change certain aspects in life But how people use it does change certain aspects in life “Communication is a skill that you can learn It s like riding a bicycle or typing If you re willing to work at it you can rapidly improve the quality of every part of your life Brian TracySmartwalkie Smart Walkie Pte Ltd is a company that works on both hardware and software of Push To Talk PTT solution VoicePing is the software part of it We help many industries all over the globe on their communication needs |
2022-04-14 09:51:07 |
海外TECH |
DEV Community |
3 Frontend Developers' Must-Have Tools |
https://dev.to/annoh_karlgusta/3-frontend-developers-must-have-tools-3k09
|
Frontend Developers x Must Have ToolsAnimXYZ AnimXYZ is a website animation tool that allows you to create tweak and compose animations for your website Using CSS variables you can create an almost infinite number of unique animations without having to write a single keyframe You ll save time and have complete control over the movement of your elements AnimXYZ will bring your website to life with Vue React SCSS and CSS www animxyz comShaper This interactive tool will allow you to experiment with various user interfaces while they are live on the website Typography color space and layering are all examples of this Theatre Js For the web I created a motion design Theatre js is a GUI based JavaScript animation library The DOM WebGL and any other JavaScript variable are animated It s essentially a visual editor for animating DOM objects www theatrejs comSee you soon |
2022-04-14 09:09:27 |
海外TECH |
DEV Community |
Code compiling: Explain like I'm Five |
https://dev.to/arikaturika/code-compiling-explain-like-im-five-4mkj
|
Code compiling Explain like I x m FiveComputers can only understand machine code which is a low level programming language generally being made up entirely of numbers Most of the time when people talk about machine code they refer to it as binary code a number system with base either a or So we can say that machine code is made out of sequences of ones and zeros Below there s a snippet of some binary code We need to comunicate with computers so in order to do so we need to speak their language But writing machine code is very impractical so we had to come up with languages that resemble our own language We call these languages higher level programming languages Some examples are Python Ruby C or Java Now the problem is that computers do not understand these languages directly so we need a translator that can explain our instructions to the computer This is how compilers and interpreters were born They are programs that translate the code we write using higher level languages into machine code Compiling means that after we finished writing our code a compiler a program takes our code and looks at it making sure it has been written acording the rules of the programming language we used it checks for syntax errors If no mistakes are found the code can be effectively translated into machine code and a file containing compiled code is generated We hear people saying that the code doesn t compile This means that while checking the code the compiler found errors and the translation into machine code wasn t succesful Usually the programmer will see some error messages that will help them debug the code Only after all errors are fixed the code will compile IMPORTANTJust because the code compiles that doesn t mean the program works This is because a compiler can t catch logical errors It might sound counterintuitive but think about it like writing an English text with no grammatical errors or typos so the words are correct on their own but when read together they make no sense Low level programming languages are languages that sit close to the computer s instruction set An instruction set is the set of instructions that the processor understands Machine code can be represented using other number formats like hexadecimal These formats are easier to read by humans but the computer can t understand them so in the end they also get converted to binary Interpreters are also used to translate source code into machine code but they work differently from compilers |
2022-04-14 09:07:20 |
海外TECH |
DEV Community |
Comparison of Reactjs & Angular |
https://dev.to/jamesxaviers23/comparison-of-reactjs-angular-c3p
|
Comparison of Reactjs amp AngularThere are lot of framework amp front end development libraries persisting in the market React amp Angular are the most debated java script framework libraries They Both are high in demand React React is an open source front end development library that is built in with JavaScript to make user interface components AngularWhile angular is typescript based programming platform the components in this is based on web application framework which allows you to create highly scalable web applicationsMajor Differences can be seen in LanguageArchitectureDirectivesComponentizationDocument Object ModelProductivity amp Development SpeedToolsetBoth the framework have grown into enormous and well developed open source libraries and frameworks To choose which is best for your project read more |
2022-04-14 09:07:01 |
海外TECH |
DEV Community |
OAuth vs JWT (JSON Web Tokens): An In-Depth Comparison |
https://dev.to/supertokens/oauth-vs-jwt-json-web-tokens-an-in-depth-comparison-5gnp
|
OAuth vs JWT JSON Web Tokens An In Depth ComparisonAuthentication is one of the core functions of applications on the internet today one that many developers are familiar with Yet actually implementing authentication correctly requires understanding several standards and protocols Two of the most important of these authentication standards are OAuth and JWT JSON Web Tokens Looking to make sense of OAuth and JWT You re in the right place In this article we will cover What OAuth is and the Pros and Cons of using itWhat JWT JSON Web Tokens is and the Pros and ConsHow to use OAuth and JWT together effectivelyLet s dive in What is OAuth OAuth Open Authorization often written as the latest version OAuth is a protocol that is used to authenticate a user via an authentication server One of the useful things about OAuth is that it enables you to delegate account access in a secure way without sharing credentials Instead of credentials OAuth relies on access tokens Using access tokens a client application can verify the identity of the user that authenticated themselves Visually the process looks like this When you implement “Sign in with Google or “Sign in with Github you are using the OAuth protocol Pros of using OAuthWorking with OAuth has some great benefits including It s the accepted industry standard This means that most authentication services will understand and use OAuth There s many plug and play OAuth options Including services like “Sign in with Google and “Sign in with Facebook that are already set up to be consumed within your application OAuth has well tested client libraries in almost all languages and web frameworks This means that your language of choice can be used with OAuth It allows for decoupling of code Your client application code is not affected by the authentication code OAuth is very secure and battle tested Due to its widespread nature you can be rest assured that all security edge cases have been thought about by industry experts Potential considerations of using OAuthWhile OAuth is a great standard there s a handful of things to be mindful of when using it OAuth can be complicated to understand if you are unfamiliar There are several different OAuth flows and deciding which is right for you can be a challenge Sometimes you may even need to use multiple flows It has lower end user privacy The auth server knows all the sites that the end user has logged in into For example when a site uses Sign in with Google Google would be able to keep track of when that site s users are signing in or are active It s overkill in certain situations If you are building a simple webapp that has one frontend and backend then you don t need the OAuth protocol However a lot of online tutorials and ready made auth solutions force you to implement this No session management solution Once the user is authenticated the auth server simply returns a JWT which can be consumed by your application as well will see later However after that step the OAuth protocol doesn t provide any support for specifying how to maintain the authenticated session between your app s frontend and backend this is totally up to the developer What is JWT JSON Web Tokens A JWT is a token that is generated by the authentication server and contains the end user s information like their userID email etc The information is in JSON format and can be efficiently verified by the client application using cryptography So when exactly is using a JWT appropriate JWT is best used whenever you want to transmit some information to an untrusted client in such a way that that client can verify the information contained in the payload themselves From the context of an auth server an untrusted client is the application that the user is trying to use From the context of the application s backend an untrusted client is the frontend code Pros of using JWTThere s some good reasons JWT is such a popular standard They are self contained The JWT can contain the user s details So you don t need to query a database auth server for that information on each request They offer strong security guarantees JWTs are digitally signed which safeguards them from being modified by the client or an attacker JWTs are stored only on the client You generate JWTs on the server and send them to the client The client then submits the JWT with every request This saves database space They are efficient and quick to verify This is because JWTs don t require a database lookup Potential considerations of using JWTWhile JWTs are incredibly useful it s helpful to keep the following things in mind You can t revoke them without putting in a lot of extra engineering effort This is because there is no db call when verifying them In order to implement immediate revocation you would need to implement JWT blacklisting which can be time consuming It s easy to create security bottlenecks while keeping one secret safe If the signing key is compromised the attacker can use that to create their own valid JWTs This would allow them to spoof the identity of any user an application Better together How to use OAuth and JWT togetherWe ve learned that OAuth and JWT are powerful standards for building authentication flows in applications As it turns out OAuth vs JWT doesn t have to be either or they can be used together When the authentication server successfully verifies a user s credentials via OAuth it also needs to transmit the user details to the client application In order for the client application to verify the details JWTs can be used to ensure an efficient process This works by the OAuth server sending a JWT to the client after the OAuth flow is complete containing the end user s information A typical JSON payload in the JWT sent by the OAuth server looks like the below example from sign in with Google iss azp apps googleusercontent com aud apps googleusercontent com sub at hash HKE PDhYmRNtsDBQ email jsmith example com email verified true iat exp nonce hd example com What do all these fields mean Below is a quick summary using this particular example iss The issuer of the token in this case Google azp and aud Client IDs issued by Google for your application This way Google knows which website is trying to use its sign in service and the website knows that the JWT was issued specifically for them sub The end user s Google user IDat hash The hash of the access token The OAuth access token is different from the JWT in the sense that it s an opaque token The access token s purpose is so that the client application can query Google to ask for more information about the signed in user email The end user s email IDemail verified Whether or not the user has verified their email iat The time in milliseconds since epoch the JWT was createdexp The time in milliseconds since epoch the JWT was creatednonce Can be used by the client application to prevent replay attacks hd The hosted G Suite domain of the userAs you can see there is a lot of information transmitted from the OAuth server Google in this case to the client application It s worth mentioning that some of the fields in the above JSON payload are specific to Google like hd Other providers may have similar and have different content Since this is all in a JWT the client application can verify the contents of this JSON and know that no one has manipulated this content Final thoughtsOftentimes we see developers asking whether to use “OAuth or JWT for their authentication setup In reality OAuth and JWT are two different standards with different uses which can be used together with great effect In fact JWT is often used as part of the OAuth protocol At SuperTokens we provide an auth solution that mitigates most of the cons of using OAuth and a JWT including We encourage the use of OAuth only when really needed We offer a way to revoke JWTs access tokens easily without reducing the verification efficiency We offer a secure session management solution which is the missing piece in the OAuth protocol Want to learn more about authentication OAuth or JWT Or You have any questions please join our discord server here |
2022-04-14 09:01:28 |
海外TECH |
DEV Community |
Deploy Kubernetes (K8s) on Amazon AWS using mixed on-demand and spot instances |
https://dev.to/garutilorenzo/deploy-kubernetes-k8s-on-amazon-aws-using-mixed-on-demand-and-spot-instances-5eia
|
Deploy Kubernetes Ks on Amazon AWS using mixed on demand and spot instancesDeploy in a few minutes an high available Kubernetes cluster on Amazon AWS using mixed on demand and spot instances Please note this is only an example on how to Deploy a Kubernetes cluster For a production environment you should use EKS or ECS The scope of this repo is to show all the AWS components needed to deploy a high available Ks cluster Table of ContentsRequirementsInfrastructure overviewBefore you startProject setupAWS provider setupPre flight checklistDeployDeploy a sample stackClean upTodo RequirementsTerraform Terraform is an open source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services Terraform codifies cloud APIs into declarative configuration files Amazon AWS Account Amazon AWS account with billing enabledkubectl The Kubernetes command line tool optional aws cli optionalYou need also one VPC with private and public subnetsone ssh key already uploaded on your AWS accountone bastion host to reach all the private EC instancesFor VPC and bastion host you can refer to this repository Infrastructure overviewThe final infrastructure will be made by two autoscaling group one for the kubernetes master nodes and one for the worker nodestwo launch template used by the asgone internal load balancer L that will route traffic to Kubernetes serversone external load balancer L that will route traffic to Kubernetes workersone security group that will allow traffic from the VPC subnet CIDR on all the ks ports kube api nginx ingress node port etc one security group that will allow traffic from all the internet into the public load balancer L on port and one S bucket used to store the cluster join certificatesone IAM role used to allow all the EC instances in the cluster to write on the S bucket used to share the join certificatesone certificate used by the public LB stored on AWS ACM The certificate is a self signed certificate Kubernetes setupThe installation of Ks id done by kubeadm In this installation Containerd is used as CRI and flannel is used as CNI You can optionally install Nginx ingress controller and Longhorn To install Nginx ingress set the variable install nginx ingress to yes default no To install longhorn set the variable install longhorn to yes default no NOTE if you don t install the nginx ingress the public Load Balancer and the SSL certificate won t be deployed In this installation is used a S bucket to store the join certificate token At the first startup of the instance if the cluster does not exist the S bucket is used to get the join certificates token Before you startNote that this tutorial uses AWS resources that are outside the AWS free tier so be careful Project setupClone this repo and go in the example directory git clone cd ks aws terraform cluster example Now you have to edit the main tf file and you have to create the terraform tfvars file For more detail see AWS provider setup and Pre flight checklist Or if you prefer you can create an new empty directory in your workspace and create this three files terraform tfvarsmain tfprovider tfThe main tf file will look like variable AWS ACCESS KEY variable AWS SECRET KEY variable environment default staging variable AWS REGION default lt YOUR REGION gt module ks cluster ssk key pair name lt SSH KEY NAME gt uuid lt GENERATE UUID gt environment var environment vpc id lt VPC ID gt vpc private subnets lt PRIVATE SUBNET LIST gt vpc public subnets lt PUBLIC SUBNET LIST gt vpc subnet cidr lt SUBNET CIDR gt PATH TO PUBLIC LB CERT lt PAHT TO PUBLIC LB CERT gt PATH TO PUBLIC LB KEY lt PAHT TO PRIVATE LB CERT gt install nginx ingress true source github com garutilorenzo ks aws terraform cluster output ks dns name value module ks cluster ks dns name output ks server private ips value module ks cluster ks server private ips output ks workers private ips value module ks cluster ks workers private ips For all the possible variables see Pre flight checklistThe provider tf will look like provider aws region var AWS REGION access key var AWS ACCESS KEY secret key var AWS SECRET KEY The terraform tfvars will look like AWS ACCESS KEY xxxxxxxxxxxxxxxxx AWS SECRET KEY xxxxxxxxxxxxxxxxx Now we can init terraform with terraform initInitializing modules ks cluster in Initializing the backend Initializing provider plugins Finding latest version of hashicorp template Finding latest version of hashicorp aws Installing hashicorp template v Installed hashicorp template v signed by HashiCorp Installing hashicorp aws v Installed hashicorp aws v signed by HashiCorp Terraform has created a lock file terraform lock hcl to record the providerselections it made above Include this file in your version control repositoryso that Terraform can guarantee to make the same selections by default whenyou run terraform init in the future Terraform has been successfully initialized You may now begin working with Terraform Try running terraform plan to seeany changes that are required for your infrastructure All Terraform commandsshould now work If you ever set or change modules or backend configuration for Terraform rerun this command to reinitialize your working directory If you forget othercommands will detect it and remind you to do so if necessary Generate self signed SSL certificate for the public LB L NOTE If you already own a valid certificate skip this step and set the correct values for the variables PATH TO PUBLIC LB CERT and PATH TO PUBLIC LB KEYWe need to generate the certificates sel signed for our public load balancer Layer To do this we need openssl open a terminal and follow this step Generate the key openssl genrsa gt privatekey pemGenerating RSA private key bit long modulus primes e is x Generate the a new certificate request openssl req new key privatekey pem out csr pemYou are about to be asked to enter information that will be incorporatedinto your certificate request What you are about to enter is what is called a Distinguished Name or a DN There are quite a few fields but you can leave some blankFor some fields there will be a default value If you enter the field will be left blank Country Name letter code AU ITState or Province Name full name Some State ItalyLocality Name eg city BresciaOrganization Name eg company Internet Widgits Pty Ltd GL LtdOrganizational Unit Name eg section ITCommon Name e g server FQDN or YOUR name testlb domainexample comEmail Address email you comPlease enter the following extra attributesto be sent with your certificate requestA challenge password An optional company name Generate the public CRT openssl x req days in csr pem signkey privatekey pem out public crtSignature oksubject C IT ST Italy L Brescia O GL Ltd OU IT CN testlb domainexample com emailAddress email you comGetting Private keyThis is the final result lscsr pem privatekey pem public crtNow set the variables PATH TO PUBLIC LB CERT full path public crtPATH TO PUBLIC LB KEY full path privatekey pem AWS provider setupFollow the prerequisites step on this link In your workspace folder or in the examples directory of this repo create a file named terraform tfvars AWS ACCESS KEY xxxxxxxxxxxxxxxxx AWS SECRET KEY xxxxxxxxxxxxxxxxx Pre flight checklistOnce you have created the terraform tfvars file edit the main tf file always in the example directory and set the following variables VarRequiredDescregionyesset the correct OCI region based on your needsenvironmentyesCurrent work environment Example staging dev prod This value is used for tag all the deployed resourcesuuidyesUUID used to tag all resourcesssk key pair nameyesName of the ssh key to usevpc idyesID of the VPC to use You can find your vpc id in your AWS console Example vpc xxxxx vpc private subnetsyesList of private subnets to use This subnets are used for the public LB You can find the list of your vpc subnets in your AWS console Example subnet xxxxxx vpc public subnetsyesList of public subnets to use This subnets are used for the EC instances and the private LB You can find the list of your vpc subnets in your AWS console Example subnet xxxxxx vpc subnet cidryesYour subnet CIDR You can find the VPC subnet CIDR in your AWS console Example PATH TO PUBLIC LB CERTyesPath to the public LB certificate See how to generate the certificatePATH TO PUBLIC LB KEYyesPath to the public LB key See how to generate the keyec associate public ip addressnoAssign or not a pulic ip to the EC instances Default falses bucket namenoS bucket name used for sharing the kubernetes token used for joining the cluster Default my very secure ks bucketinstance profile namenoInstance profile name Default KsInstanceProfileiam role namenoIAM role name Default KsIamRoleaminoAmi image name Default ami afed ubuntu default instance typenoDefault instance type used by the Launch template Default t largeinstance typesnoArray of instances used by the ASG Dfault asg instance type t large asg instance type m large asg instance type ta large ks master template prefixnoTemplate prefix for the master instances Default ks master tplks worker template prefixnoTemplate prefix for the worker instances Default ks worker tplks versionnoKubernetes version to installks pod subnetnoKubernetes pod subnet managed by the CNI Flannel Default ks service subnetnoKubernetes pod service managed by the CNI Flannel Default ks dns domainnoInternal kubernetes DNS domain Default cluster localkube api portnoKubernetes api port Default ks internal lb namenoInternal load balancer name Default ks server tcp lbks server desired capacitynoDesired number of ks servers Default ks server min capacitynoMin number of ks servers Default ks server max capacitynoMax number of ks servers Default ks worker desired capacitynoDesired number of ks workers Default ks worker min capacitynoMin number of ks workers Default ks worker max capacitynoMax number of ks workers Default cluster namenoKubernetes cluster name Default ks clusterinstall longhornnoInstall or not longhorn Default falselonghorn releasenolonghorn release Default v install nginx ingressnoInstall or not nginx ingress controller Default falseks ext lb namenoExternal load balancer name Default ks ext lbextlb listener http portnoHTTP nodeport where nginx ingress controller will listen Default extlb listener https portnoHTTPS nodeport where nginx ingress controller will listen Default extlb http portnoExternal LB HTTP listen port Default extlb https portnoExternal LB HTTPS listen port Default DeployWe are now ready to deploy our infrastructure First we ask terraform to plan the execution with terraform plan name ks sg name prefix known after apply owner id known after apply revoke rules on delete false tags Name sg ks cluster staging environment staging provisioner terraform scope ks cluster uuid xxxxx xxxxx xxxx xxxxxx xxxxxx tags all Name sg ks cluster staging environment staging provisioner terraform scope ks cluster uuid xxxxx xxxxx xxxx xxxxxx xxxxxx vpc id vpc xxxxxx Plan to add to change to destroy Changes to Outputs ks dns name known after apply ks server private ips known after apply ks workers private ips known after apply Note You didn t use the out option to save this plan so Terraform can t guarantee to take exactly these actions if you run terraform apply now now we can deploy our resources with terraform apply tags all Name sg ks cluster staging environment staging provisioner terraform scope ks cluster uuid xxxxx xxxxx xxxx xxxxxx xxxxxx vpc id vpc xxxxxxxx Plan to add to change to destroy Changes to Outputs ks dns name known after apply ks server private ips known after apply ks workers private ips known after apply Do you want to perform these actions Terraform will perform the actions described above Only yes will be accepted to approve Enter a value yes Apply complete Resources added changed destroyed Outputs ks dns name ks ext lt REDACTED gt elb amazonaws com ks server private ips tolist x x x x x x x x x ks workers private ips tolist x x x x x x x x x Now on one master node you can check the status of the cluster with ssh j bastion lt BASTION IP gt ubuntu x x xWelcome to Ubuntu LTS GNU Linux aws x Documentation Management Support System information as of Wed Apr UTC System load Processes Usage of of GB Users logged in Memory usage IPv address for cni Swap usage IPv address for ens updates can be applied immediately Last login Wed Apr from ubuntu i dedcfafe sudo su root i dedcfafe kubectl get nodesNAME STATUS ROLES AGE VERSIONi bfadf Ready control plane master ms v i ccc Ready lt none gt ms v i dedcfafe Ready control plane master ms v i bfdeeefd Ready lt none gt ms v i bfeabcca Ready control plane master ms v i cbeeb Ready lt none gt ms v root i dedcfafe kubectl get nsNAME STATUS AGEdefault Active msingress nginx Active s lt ingress controller nskube node lease Active mskube public Active mskube system Active mslonghorn system Active s lt longhorn nsroot i dedcfafe kubectl get pods all namespacesNAMESPACE NAME READY STATUS RESTARTS AGEingress nginx ingress nginx admission create vfpx Completed msingress nginx ingress nginx admission patch df Completed msingress nginx ingress nginx controller fcd cxv Running mskube system coredns d cgg Running mskube system coredns d vr Running mskube system etcd i bfadf Running mskube system etcd i dedcfafe Running mskube system etcd i bfeabcca Running mkube system kube apiserver i bfadf Running ms ago mskube system kube apiserver i dedcfafe Running mskube system kube apiserver i bfeabcca Running mskube system kube controller manager i bfadf Running mskube system kube controller manager i dedcfafe Running ms ago mskube system kube controller manager i bfeabcca Running mskube system kube flannel ds cs Running mskube system kube flannel ds bb Running mskube system kube flannel ds qgs Running mskube system kube flannel ds swwp Running mskube system kube flannel ds zhp Running mskube system kube flannel ds zrwdq Running mskube system kube proxy rbks Running mskube system kube proxy npgg Running mskube system kube proxy pxbr Running mskube system kube proxy q Running mskube system kube proxy sqnv Running mskube system kube proxy tngx Running mskube system kube scheduler i bfadf Running mskube system kube scheduler i dedcfafe Running ms ago mskube system kube scheduler i bfeabcca Running mslonghorn system csi attacher p Running slonghorn system csi attacher hzlj Running slonghorn system csi attacher zftg Running slonghorn system csi provisioner bdcb vwx Running slonghorn system csi provisioner bdcb xcv Running slonghorn system csi provisioner bdcb qd Running slonghorn system csi resizer dcfff dwdrq Running slonghorn system csi resizer dcfff klvcr Running slonghorn system csi resizer dcfff ptpzb Running slonghorn system csi snapshotter fcdf dlkdq Running slonghorn system csi snapshotter fcdf pcc Running slonghorn system csi snapshotter fcdf psmn Running slonghorn system engine image ei fadfbf bkwhx Running mslonghorn system engine image ei fadfbf cqqn Running mslonghorn system engine image ei fadfbf lhjjc Running mslonghorn system instance manager e b Running slonghorn system instance manager e aebb Running mslonghorn system instance manager e acba Running mslonghorn system instance manager r abaf Running slonghorn system instance manager r bfba Running mslonghorn system instance manager r cfa Running mslonghorn system longhorn csi plugin br Running slonghorn system longhorn csi plugin gdxf Running slonghorn system longhorn csi plugin wctt Running slonghorn system longhorn driver deployer dddcddbb zjhk Running mslonghorn system longhorn manager cbsh Running mslonghorn system longhorn manager dt Running ms ago mslonghorn system longhorn manager xqlfv Running ms ago mslonghorn system longhorn ui dcd tcb Running ms Public LB checkWe can now test the public load balancer nginx ingress controller and the security group ingress rules On your local PC run curl k v https ks ext lt REDACTED gt elb amazonaws com Trying x x x TCP NODELAY set Connected to ks ext lt REDACTED gt elb amazonaws com x x x port ALPN offering h ALPN offering http successfully set certificate verify locations CAfile etc ssl certs ca certificates crt CApath etc ssl certs TLSv OUT TLS handshake Client hello TLSv IN TLS handshake Server hello TLSv IN TLS handshake Certificate TLSv IN TLS handshake Server key exchange TLSv IN TLS handshake Server finished TLSv OUT TLS handshake Client key exchange TLSv OUT TLS change cipher Change cipher spec TLSv OUT TLS handshake Finished TLSv IN TLS handshake Finished SSL connection using TLSv ECDHE RSA AES GCM SHA ALPN server accepted to use h Server certificate subject C IT ST Italy L Brescia O GL Ltd OU IT CN testlb domainexample com emailAddress email you com start date Apr GMT expire date Apr GMT issuer C IT ST Italy L Brescia O GL Ltd OU IT CN testlb domainexample com emailAddress email you com SSL certificate verify result self signed certificate continuing anyway Using HTTP server supports multi use Connection state changed HTTP confirmed Copying HTTP data in stream buffer to connection buffer after upgrade len Using Stream ID easy handle xccde gt GET HTTP gt Host ks ext lt REDACTED gt elb amazonaws com gt user agent curl gt accept gt Connection state changed MAX CONCURRENT STREAMS lt HTTP lt date Tue Apr GMT lt content type text html lt content length lt strict transport security max age includeSubDomains lt lt html gt lt head gt lt title gt Not Found lt title gt lt head gt lt body gt lt center gt lt h gt Not Found lt h gt lt center gt lt hr gt lt center gt nginx lt center gt lt body gt lt html gt Connection to host ks ext lt REDACTED gt elb amazonaws com left intact is a correct response since the cluster is empty Deploy a sample stackWe use the same stack used in this repository This stack need longhorn and nginx ingress To test all the components of the cluster we can deploy a sample stack The stack is composed by the following components MariaDBNginxWordpressEach component is made by one deployment and one service Wordpress and nginx share the same persistent volume ReadWriteMany with longhorn storage class The nginx configuration is stored in four ConfigMaps and the nginx service is exposed by the nginx ingress controller Deploy the resources with kubectl apply f kubectl apply f kubectl apply f NOTE to install WP and reach the wp admin path you have to edit the nginx deployment and change this line env name SECURE SUBNET value change meand set your public ip address To check the status root i dedcfafe kubectl get pods o wideNAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATESmariadb cbfbd snh Running ms i bfdeeefd lt none gt lt none gt nginx bdfbcb szfh Running s i ccc lt none gt lt none gt wordpress b jgvm Running s i cbeeb lt none gt lt none gt root i dedcfafe kubectl get deploymentsNAME READY UP TO DATE AVAILABLE AGEmariadb msnginx swordpress sroot i dedcfafe kubectl get svcNAME TYPE CLUSTER IP EXTERNAL IP PORT S AGEkubernetes ClusterIP lt none gt TCP mmariadb svc ClusterIP lt none gt TCP msnginx svc ClusterIP lt none gt TCP swordpress svc ClusterIP lt none gt TCP sNow you are ready to setup WP open the LB public ip and follow the wizard NOTE nginx and the Kubernetes Ingress rule are configured without virthual host server name To clean the deployed resources kubectl delete f kubectl delete f kubectl delete f Clean upBefore destroy all the infrastructure DELETE all the object in the S bucket terraform destroy |
2022-04-14 09:00:52 |
海外TECH |
Engadget |
Google's 'Switch to Android' app helps iOS users do just that |
https://www.engadget.com/googles-switch-to-android-app-is-finally-available-on-i-os-092508859.html?src=rss
|
Google x s x Switch to Android x app helps iOS users do just thatGoogle has finally countered Apple s quot Move to iOS quot app by releasing quot Switch to Android quot for iOS on the App Store confirming earlier rumors As the name indicates it s designed to help iPhone and iPad users import contacts photos calendars and video to an Android device It also shows users how to turn off iMessage in favor of Android messaging and transfer photos videos by connecting to iCloud nbsp Google dropped the new app without a lot of fanfare as TechCrunch notes On its Switch to Android website the app is still not mentioned and can only be found on the App Store with a direct link ーsearch results still turn up nothing GoogleThe app is a big improvement over the current system which requires you to back up photos video calendar and contacts using the Google Drive iOS app It was first spotted last summer by toGoogle in code tucked into Google s Data Transfer Tool and seen in a more recent release with the ability to import iCloud video and photos into Google Photos nbsp Apple s equivalent app arrived way back in September so Google certainly took its time responding quot Move to iOS quot works in much the same way helping users import photos video messages contacts and more over to an iOS device One Android device maker Samsung has its own device migration app as well called Smart Switch helping you switch from an iPhone or other Android device to a Galaxy smartphone However it s only available on Google Play or its own Galaxy store and doesn t run on iOS nbsp |
2022-04-14 09:25:08 |
海外科学 |
BBC News - Science & Environment |
Scientists map Caribbean coral reefs to tackle climate change |
https://www.bbc.co.uk/news/science-environment-61084816?at_medium=RSS&at_campaign=KARANGA
|
caribbean |
2022-04-14 09:30:02 |
医療系 |
医療介護 CBnews |
流行の主体「オミクロン株BA.2系統に」-東京都がコロナモニタリング項目の分析公表 |
https://www.cbnews.jp/news/entry/20220414184324
|
新型コロナウイルス |
2022-04-14 18:55:00 |
ニュース |
BBC News - Home |
UK to give asylum seekers one-way ticket to Rwanda |
https://www.bbc.co.uk/news/uk-politics-61097114?at_medium=RSS&at_campaign=KARANGA
|
trial |
2022-04-14 09:49:57 |
ニュース |
BBC News - Home |
Russian warship Moskva: What do we know? |
https://www.bbc.co.uk/news/world-europe-61103927?at_medium=RSS&at_campaign=KARANGA
|
russia |
2022-04-14 09:48:56 |
ニュース |
BBC News - Home |
NHS faces an Easter 'as bad as any winter' |
https://www.bbc.co.uk/news/health-61093736?at_medium=RSS&at_campaign=KARANGA
|
record |
2022-04-14 09:29:56 |
ニュース |
BBC News - Home |
Ukraine war in maps: Tracking the Russian invasion |
https://www.bbc.co.uk/news/world-europe-60506682?at_medium=RSS&at_campaign=KARANGA
|
donbas |
2022-04-14 09:14:29 |
ニュース |
BBC News - Home |
Anya Shrubsole: England bowler and World Cup winner retires from international game |
https://www.bbc.co.uk/sport/cricket/61104203?at_medium=RSS&at_campaign=KARANGA
|
international |
2022-04-14 09:51:23 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
クロス・マーケティンググループ、記念株主優待の実 施でQUOカードを贈呈! 創業20周年を記念した優待 で、2022年6月末に100株保有で優待利回り2%超に - 株主優待【新設・変更・廃止】最新ニュース |
https://diamond.jp/articles/-/301676
|
|
2022-04-14 18:10:00 |
IT |
週刊アスキー |
DMM GAMES、「神殺しのアリア」ハーフアニバーサリー前夜祭イベント「Very Many Party」を開催! 新ディアミス「花小路真央」や新衣装「パーティードレス」が追加! |
https://weekly.ascii.jp/elem/000/004/089/4089328/
|
DMMGAMES、「神殺しのアリア」ハーフアニバーサリー前夜祭イベント「VeryManyParty」を開催新ディアミス「花小路真央」や新衣装「パーティードレス」が追加EXNOAはDMMGAMESで提供中のDリアルタイムバトルRPG「神殺しのアリア」にて、ハーフアニバーサリー前夜祭イベント「VeryManyParty」を開催。 |
2022-04-14 18:20:00 |
IT |
週刊アスキー |
新作対戦格闘『KOF XV』で無料DLCキャラクター「オメガ・ルガール」が本日配信! |
https://weekly.ascii.jp/elem/000/004/089/4089329/
|
kofxv |
2022-04-14 18:20:00 |
マーケティング |
AdverTimes |
ペッパーフード、マーケティング部を新設 経営企画推進室を廃止 |
https://www.advertimes.com/20220414/article381774/
|
経営企画 |
2022-04-14 09:37:12 |
GCP |
Cloud Blog |
A policy roadmap for 24/7 carbon-free energy |
https://cloud.google.com/blog/topics/sustainability/a-policy-roadmap-for-achieving-247-carbon-free-energy/
|
A policy roadmap for carbon free energyIn Google set its most ambitious sustainability goal to date By we aim to operate entirely on carbon free energy CFE ーaround the clock ーat our data centers and offices worldwide This means matching each hour of our electricity consumption with carbon free electricity sources on every grid where we operate Securing round the clock carbon free energy isn t just important for Google it s also critical for the world to successfully tackle the urgent challenge of climate change The electricity sector is the linchpin of this effort as it is both a significant contributor to global carbon emissions and a tool to enable the decarbonization of other parts of the economy such as buildings transportation and heavy industry When Google announced our CFE goal we identified three ways to advance toward it First develop new transactional approaches for buying clean energy around the clock Second support the commercialization of next generation clean energy technologies and develop smart solutions for managing electricity demand Finally develop partnerships and advocate for policies that accelerate the decarbonization of electricity grids across the world This last pillar is critical to achieve CFE both for our own operations and for economies more broadly we must do more than just purchase clean energy ーwe must work to transform electricity systems That change can only happen if we work collaboratively to reform the policies and regulations that have shaped the electricity industry for more than a century That s why today we are releasing a new clean energy policy roadmap informed by over a decade of experience as a large electricity user and major clean energy buyer across the globe While rapid progress in cost effective carbon free energy technology has put the prospect of decarbonized electricity grids within reach it is not inevitable this transition will be slower more expensive and less certain without the right public policies We are committed to working with stakeholders across the globe to advocate for policies that accelerate grid decarbonization for everyone Policy priorities for grid decarbonizationOur policy roadmap identifies three core goals ーadvance technology expand and reform markets and empower consumers ーthat policymakers should prioritize to accelerate the transition to a reliable cost effective inclusive and carbon free electricity system Advance technology Policies should support the development commercialization and deployment of a broad portfolio of carbon free energy technologies maintain existing carbon free resources and speed the replacement of carbon emitting ones These policies include clean energy standards CFE investment incentives and measures that remove barriers to the electricity transmission infrastructure that is critical to cost effectively deliver clean power from where it s generated to where it s needed Expand and reform markets As a major electricity buyer across dozens of regions worldwide our experience has taught us that regional and competitive wholesale electricity markets are key vehicles to accelerate clean energy adoption and lower costs for electricity consumers Policymakers should work to create and expand regional and competitive wholesale electricity markets where they don t exist today They should also reform markets to value the contribution of all carbon free energy sources and to move towards models that are more integrated and flexible across supply and demand Empower consumers Policy reforms are needed to unleash the power of customer demand to accelerate the clean energy transition This means creating legal and cost effective pathways to clean energy for all consumers providing customers access to transparent granular high quality energy data and designing regulatory structures that incentivize consumer participation For example policymakers can support the development of time based energy attribute certificates T EACs that can enable consumers to increase their decarbonization impact Working together to advance clean energy policyIdentifying the right policies is only a first step To drive the policy and market changes needed over the next decade will require hard work from everyone including the private sector We all have a stake in the policies and regulations that shape electricity systems and we must use our voices and organize around the common objective of complete rapid and cost effective decarbonization This is why Google worked with our partners at UN Energy and Sustainable Energy for All to launch the global Carbon free Energy Compact ーa set of commitments and actions from energy buyers energy suppliers governments system operators solutions providers investors and other organizations to advance CFE It s also why we ve been a vocal supporter of legislation to advance clean energy in the United States and other countries around the world As we advance toward our goal of CFE by we commit to working with others and advocating for clean energy policies that enable CFE for all energy consumers and decarbonize electricity grids at the scale and pace required to meet the urgency of the world s climate challenge Please join us to create a carbon free future To learn more about how to engage with us and accelerate the transformation of electric grids globally visit gocarbonfree comRelated ArticleWhy was an electrifying year for carbon free energyRecapping Google s progress in toward running on carbon free energy by ーand decarbonizing the electricity system as a whole Read Article |
2022-04-14 09:30:00 |
コメント
コメントを投稿