This is the presentation materials of Japanese OCDET of bare metal computing meeting.
In "GMO AppsCloud" of GMO Internet, Inc., by modifying the nova Baremetal compute of OpenStack Havana so as to drive the Ansible, by installing the OS in the cobbler, has commercialized the environment to start with disk boot loader.
Microsoft Open Tech Night #01 LT-tetsuyasdTetsuya Sodo
?
LT for MS Ignite 2019 Event Summary
Including...
- Community Leaders/Leaders Forum
- Microsoft mission
- Inclusion and diversity
- Azure Machine Learning
- Recommended apps
IoT Devices Compliant with JC-STAR Using Linux as a Container OSTomohiro Saneyoshi
?
Security requirements for IoT devices are becoming more defined, as seen with the EU Cyber Resilience Act and Japan’s JC-STAR.
It's common for IoT devices to run Linux as their operating system. However, adopting general-purpose Linux distributions like Ubuntu or Debian, or Yocto-based Linux, presents certain difficulties. This article outlines those difficulties.
It also, it highlights the security benefits of using a Linux-based container OS and explains how to adopt it with JC-STAR, using the "Armadillo Base OS" as an example.
Feb.25.2025@JAWS-UG IoT
30. ECKをOCPに入れる手順概要(仮) (3/6)
④ all-in-one.yamlをapplyしてOperatorを作成する
30
$ oc apply -f all-in-one.yaml
customresourcedefinition.apiextensions.k8s.io/apmservers.apm.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/clusterlicenses.elasticsearch.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/elasticsearches.elasticsearch.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/enterpriselicenses.elasticsearch.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/remoteclusters.elasticsearch.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/trustrelationships.elasticsearch.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/users.elasticsearch.k8s.elastic.co created
customresourcedefinition.apiextensions.k8s.io/kibanas.kibana.k8s.elastic.co created
clusterrole.rbac.authorization.k8s.io/elastic-operator created
clusterrolebinding.rbac.authorization.k8s.io/elastic-operator created
namespace/elastic-system configured
statefulset.apps/elastic-operator created
secret/webhook-server-secret created
serviceaccount/elastic-operator configured
⑤ Operatorが属するelastic-systemネームスペースを他テナントと疎通可能にする
$ oc adm pod-network make-projects-global elastic-system
(ovs-multitenant構成の場合のみ実行する ※後述)
31. ECKをOCPに入れる手順概要(仮) (4/6)
31
$ oc new-project myeck
Now using project "myeck" on server "https://api.ocp4101.vlan016.cnta.local:6443".
…
$ oc project
Using project "myeck" on server "https://api.ocp4101.vlan016.cnta.local:6443".
⑥ 利用者テナントに切り替える
$ oc apply –f my-es-cluster.yaml
elasticsearch.elasticsearch.k8s.elastic.co/quickstart created
$ oc apply –f my-kibana.yaml
kibana.kibana.k8s.elastic.co/quickstart created
⑦ ElasticsearchとKibanaのデプロイ (yamlの書き方については後述)
■注意:⑥~⑨まではテナント利用者として実行してください