summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--site/intel-pod15/baremetal/bootactions/ixgbe-dkms-install.yaml56
-rw-r--r--site/intel-pod15/baremetal/nodes.yaml84
-rw-r--r--site/intel-pod15/intel-pod15.env21
-rw-r--r--site/intel-pod15/networks/common-addresses.yaml74
-rw-r--r--site/intel-pod15/networks/control-plane-addresses.yaml29
-rw-r--r--site/intel-pod15/networks/physical/networks.yaml306
-rw-r--r--site/intel-pod15/pki/pki-catalog.yaml249
-rw-r--r--site/intel-pod15/profiles/hardware/intel-s2600wt.yaml (renamed from site/intel-pod15/profiles/hardware/intel-pod15.yaml)44
-rw-r--r--site/intel-pod15/profiles/host/cp-intel-pod15.yaml105
-rw-r--r--site/intel-pod15/profiles/host/dp-intel-pod15.yaml112
-rw-r--r--site/intel-pod15/profiles/region.yaml16
-rw-r--r--[-rwxr-xr-x]site/intel-pod15/secrets/certificates/certificates.yaml3966
-rw-r--r--site/intel-pod15/secrets/certificates/ingress.yaml108
-rw-r--r--site/intel-pod15/secrets/ingress.yaml135
-rw-r--r--site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key1.yaml8
-rw-r--r--site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key2.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/aqua_executor.yaml (renamed from site/intel-pod15/secrets/passphrases/osh_tempest_password.yaml)6
-rw-r--r--site/intel-pod15/secrets/passphrases/aqua_orchestrator.yaml (renamed from site/intel-pod15/secrets/passphrases/osh_keystone_ldap_password.yaml)6
-rw-r--r--site/intel-pod15/secrets/passphrases/artifactory_oslo_db_admin_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/artifactory_oslo_db_artifactory_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/artifactory_oslo_db_audit_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/artifactory_oslo_db_sst_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_access_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_secret_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/cedric_crypt_password.yaml12
-rw-r--r--site/intel-pod15/secrets/passphrases/ceph_fsid.yaml7
-rw-r--r--site/intel-pod15/secrets/passphrases/ceph_swift_keystone_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/control_db_admin_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/control_db_user_password.yaml (renamed from site/intel-pod15/secrets/passphrases/ucp_postgres_replication_password.yaml)6
-rw-r--r--site/intel-pod15/secrets/passphrases/control_insight_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/distribution_postgres_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/distribution_redis_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/global_passphrase.yaml (renamed from site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_password.yaml)6
-rw-r--r--site/intel-pod15/secrets/passphrases/global_salt.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/grego_crypt_password.yaml (renamed from site/intel-pod15/secrets/passphrases/mfix_crypt_password.yaml)2
-rw-r--r--site/intel-pod15/secrets/passphrases/ipmi_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/maas-region-key.yaml7
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_addons_keystone_ranger-agent_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_db_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_messaging_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_addons_ranger_admin_oslo_db_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_sst_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_barbican_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_barbican_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_barbican_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_cinder_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_cinder_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_cinder_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_cinder_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_glance_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_glance_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_glance_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_glance_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_stack_user_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_heat_trustee_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_horizon_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_horizon_secret_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_dmaap_mechid_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_elasticsearch_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_grafana_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_session_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_kibana_admin_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_nagios_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_openstack_exporter_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_audit_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_exporter_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_sst_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_prometheus_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_ks_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_access_key.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_secret_key.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_access_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_access_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_secret_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_secret_key.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_access_key.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_secret_key.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_ironic_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_ldap_mechid_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_keystone_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_neutron_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_neutron_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_neutron_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_neutron_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_metadata_proxy_shared_secret.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_nova_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_oslo_cache_secret_key.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_oslo_db_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_oslo_db_audit_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_oslo_db_exporter_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_oslo_db_sst_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_oslo_messaging_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_placement_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/osh_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ozone-mariadb-admin-password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ozone-mariadb-ozoneuser-password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/private_docker_key.yaml14
-rw-r--r--site/intel-pod15/secrets/passphrases/ro_keystone_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ro_oslo_db_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ro_oslo_messaging_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/sridhar_crypt_password.yaml12
-rw-r--r--site/intel-pod15/secrets/passphrases/tenant_ceph_fsid.yaml7
-rw-r--r--site/intel-pod15/secrets/passphrases/ubuntu_crypt_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_airflow_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_airflow_postgres_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_armada_keystone_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_barbican_keystone_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_barbican_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_deckhand_keystone_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_deckhand_postgres_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_drydock_keystone_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_drydock_postgres_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_keystone_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_keystone_ldap_mechid_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_keystone_oslo_db_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_keystone_test_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_maas_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_maas_postgres_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_openstack_exporter_keystone_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_oslo_db_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_oslo_db_audit_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_oslo_db_exporter_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_oslo_db_sst_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_oslo_messaging_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_postgres_admin_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_postgres_audit_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_postgres_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_postgres_replica_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_promenade_keystone_password.yaml4
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_rabbitmq_erlang_cookie.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_shipyard_keystone_password.yaml4
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_shipyard_postgres_password.yaml6
-rw-r--r--site/intel-pod15/secrets/passphrases/ucp_webhook_keystone_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/xray_mongo_root_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/xray_mongo_user_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/xray_postgres_password.yaml11
-rw-r--r--site/intel-pod15/secrets/passphrases/xray_rabbitmq_password.yaml11
-rw-r--r--site/intel-pod15/secrets/publickey/jamesg_ssh_public_key.yaml11
-rw-r--r--site/intel-pod15/secrets/publickey/jenkins_ssh_public_key.yaml (renamed from site/intel-pod15/secrets/publickey/opnfv_ssh_public_key.yaml)4
-rw-r--r--site/intel-pod15/secrets/publickey/mfix_ssh_public_key.yaml11
-rw-r--r--site/intel-pod15/site-definition.yaml4
-rw-r--r--site/intel-pod15/software/charts/kubernetes/container-networking/etcd.yaml127
-rw-r--r--site/intel-pod15/software/charts/kubernetes/container-networking/policies.yaml135
-rw-r--r--site/intel-pod15/software/charts/kubernetes/etcd/etcd.yaml131
-rw-r--r--site/intel-pod15/software/charts/osh-infra/fluentbit.yaml22
-rw-r--r--site/intel-pod15/software/charts/osh-infra/fluentd.yaml22
-rw-r--r--site/intel-pod15/software/charts/osh-infra/grafana.yaml23
-rw-r--r--site/intel-pod15/software/charts/osh-infra/ingress.yaml24
-rw-r--r--site/intel-pod15/software/charts/osh-infra/mariadb.yaml24
-rw-r--r--site/intel-pod15/software/charts/osh-infra/prometheus.yaml35
-rw-r--r--site/intel-pod15/software/charts/osh/openstack-compute-kit/libvirt.yaml22
-rw-r--r--site/intel-pod15/software/charts/osh/openstack-compute-kit/neutron.yaml60
-rw-r--r--site/intel-pod15/software/charts/osh/openstack-compute-kit/nova.yaml47
-rw-r--r--site/intel-pod15/software/charts/ucp/ceph/ceph-client-update.yaml26
-rw-r--r--site/intel-pod15/software/charts/ucp/ceph/ceph-client.yaml100
-rw-r--r--site/intel-pod15/software/charts/ucp/ceph/ceph-osd.yaml30
-rw-r--r--site/intel-pod15/software/charts/ucp/divingbell/divingbell.yaml31
-rw-r--r--site/intel-pod15/software/config/common-software-config.yaml3
-rw-r--r--site/intel-pod15/software/config/corridor.yaml26
-rwxr-xr-xtools/deploy.sh6
-rw-r--r--tools/files/Corefile-intel-pod1512
-rw-r--r--tools/files/intel-pod15.db25
189 files changed, 3836 insertions, 3632 deletions
diff --git a/site/intel-pod15/baremetal/bootactions/ixgbe-dkms-install.yaml b/site/intel-pod15/baremetal/bootactions/ixgbe-dkms-install.yaml
deleted file mode 100644
index 49b5329..0000000
--- a/site/intel-pod15/baremetal/bootactions/ixgbe-dkms-install.yaml
+++ /dev/null
@@ -1,56 +0,0 @@
----
-# This file defines a boot action to install specified version of the ixgbe
-# driver and blacklist the ixgbevf driver.
-schema: 'drydock/BootAction/v1'
-metadata:
- schema: 'metadata/Document/v1'
- name: ixgbe-dkms-install
- storagePolicy: 'cleartext'
- layeringDefinition:
- abstract: false
- layer: site
- labels:
- application: 'drydock'
- substitutions:
- - src:
- schema: pegleg/Script/v1
- name: ixgbe-dkms-install
- path: .
- dest:
- path: .assets[1].data
-data:
- signaling: false
- assets:
- - path: /etc/systemd/system/ixgbe-dkms-install.service
- type: unit
- permissions: '444'
- data: |
- [Unit]
- Description=Service for Installing ixgbe driver
- DefaultDependencies=no
- Before=promjoin.service
- After=network-online.target local-fs.target cloud-init.target
-
- [Service]
- Type=oneshot
- ExecStart=/opt/ixgbe-dkms-install.sh
- RemainAfterExit=true
-
- [Install]
- WantedBy=airship.target
-
- data_pipeline:
- - utf8_decode
- - path: /opt/ixgbe-dkms-install.sh
- type: file
- permissions: '700'
- data_pipeline:
- - utf8_decode
- - path: /etc/modprobe.d/sriov_blacklist.conf
- type: file
- permissions: '644'
- data_pipeline:
- - utf8_decode
- data: |
- blacklist ixgbevf
-...
diff --git a/site/intel-pod15/baremetal/nodes.yaml b/site/intel-pod15/baremetal/nodes.yaml
index 75acde9..0e20234 100644
--- a/site/intel-pod15/baremetal/nodes.yaml
+++ b/site/intel-pod15/baremetal/nodes.yaml
@@ -31,6 +31,8 @@ metadata:
layer: site
storagePolicy: cleartext
data:
+ oob:
+ account: 'root'
# NEWSITE-CHANGEME: The IPv4 address assigned to each logical network on this
# node. In the reference Airship deployment, this is all logical Networks defined
# in networks/physical/networks.yaml. IP addresses are manually assigned, by-hand.
@@ -46,26 +48,26 @@ data:
# the environment; these are not addresses which MaaS assigns.
- network: oob
address: 10.10.150.12
- # The IP of the node on the DMZ network. Refer to the static IP range
- # defined for the Admin network in networks/physical/networks.yaml.
- - network: dmz
+ # The IP of the node on the oam network. Refer to the static IP range
+ # defined for the oam network in networks/physical/networks.yaml.
+ - network: oam
address: 10.10.150.22
- # The IP of the node on the Admin network. Refer to the static IP range
+ # The IP of the node on the pxe network. Refer to the static IP range
# defined for the Admin network in networks/physical/networks.yaml.
# This network is used for PXE bootstrapping of the bare-metal servers.
- - network: admin
+ - network: pxe
address: 10.10.151.22
- # The IP of the node on the Private network. Refer to the static IP range
- # defined for the Private network in networks/physical/networks.yaml.
- - network: private
+ # The IP of the node on the calico network. Refer to the static IP range
+ # defined for the calico network in networks/physical/networks.yaml.
+ - network: calico
address: 10.10.152.22
# The IP of the node on the Storage network. Refer to the static IP range
# defined for the Storage network in networks/physical/networks.yaml.
- network: storage
address: 10.10.153.22
- # The IP of the node on the Management network. Refer to the static IP range
- # defined for the Management network in networks/physical/networks.yaml.
- - network: management
+ # The IP of the node on the overlay network. Refer to the static IP range
+ # defined for the overlay network in networks/physical/networks.yaml.
+ - network: overlay
address: 10.10.154.22
# NEWSITE-CHANGEME: Set the host profile for the node.
# Note that there are different host profiles depending if this is a control
@@ -77,7 +79,7 @@ data:
# a general set of host profiles at the "type" or "global" layers/folders.
# If you have hardware that is not on this list of profiles, you may need to
# create a new host profile for that hardware.
- host_profile: cp-intel-pod15
+ host_profile: cp-intel-s2600wt
metadata:
tags:
# NEWSITE-CHANGEME: See previous comment. Apply 'masters' tag for control
@@ -100,22 +102,24 @@ metadata:
layer: site
storagePolicy: cleartext
data:
+ oob:
+ account: 'root'
# NEWSITE-CHANGEME: The next node's IPv4 addressing
addressing:
- network: oob
address: 10.10.150.13
- - network: dmz
+ - network: oam
address: 10.10.150.23
- - network: admin
+ - network: pxe
address: 10.10.151.23
- - network: private
+ - network: calico
address: 10.10.152.23
- network: storage
address: 10.10.153.23
- - network: management
+ - network: overlay
address: 10.10.154.23
# NEWSITE-CHANGEME: The next node's host profile
- host_profile: cp-intel-pod15
+ host_profile: cp-intel-s2600wt
metadata:
# NEWSITE-CHANGEME: The next node's rack designation
rack: pod15-rack
@@ -134,56 +138,24 @@ metadata:
layer: site
storagePolicy: cleartext
data:
+ oob:
+ account: 'root'
# NEWSITE-CHANGEME: The next node's IPv4 addressing
addressing:
- network: oob
address: 10.10.150.14
- - network: dmz
+ - network: oam
address: 10.10.150.24
- - network: admin
+ - network: pxe
address: 10.10.151.24
- - network: private
+ - network: calico
address: 10.10.152.24
- network: storage
address: 10.10.153.24
- - network: management
+ - network: overlay
address: 10.10.154.24
# NEWSITE-CHANGEME: The next node's host profile
- host_profile: dp-intel-pod15
- metadata:
- # NEWSITE-CHANGEME: The next node's rack designation
- rack: pod15-rack
- # NEWSITE-CHANGEME: The next node's role desigatnion
- tags:
- - 'workers'
-...
----
-schema: 'drydock/BaremetalNode/v1'
-metadata:
- schema: 'metadata/Document/v1'
- # NEWSITE-CHANGEME: The next node's hostname
- name: pod15-node5
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data:
- # NEWSITE-CHANGEME: The next node's IPv4 addressing
- addressing:
- - network: oob
- address: 10.10.150.15
- - network: dmz
- address: 10.10.150.25
- - network: admin
- address: 10.10.151.25
- - network: private
- address: 10.10.152.25
- - network: storage
- address: 10.10.153.25
- - network: management
- address: 10.10.154.25
- # NEWSITE-CHANGEME: The next node's host profile
- host_profile: dp-intel-pod15
+ host_profile: dp-intel-s2600wt
metadata:
# NEWSITE-CHANGEME: The next node's rack designation
rack: pod15-rack
diff --git a/site/intel-pod15/intel-pod15.env b/site/intel-pod15/intel-pod15.env
index 326024b..3d307a3 100644
--- a/site/intel-pod15/intel-pod15.env
+++ b/site/intel-pod15/intel-pod15.env
@@ -1,9 +1,16 @@
-export OS_AUTH_URL=${OS_AUTH_URL:-http://iam-airship.intel-pod15.opnfv.org:80/v3}
-export GEN_SSH=${GEN_SSH:-intel-pod15-genesis}
-export SITE_NAME=${SITE_NAME:-intel-pod15}
+# The envrionment required by the tools/deploy.sh script for automated site
+# deployment.
+# The particular values in this file match the reference lab Intel POD15
+# https://wiki.opnfv.org/display/pharos/Intel+POD15
-export GEN_IPMI=${GEN_IPMI:-10.10.150.11}
-export NODES_IPMI=${NODES_IPMI:-'10.10.150.12 10.10.150.13 10.10.150.14 10.10.150.15'}
-export SITE_DEF=${SITE_DEF:-airship/site/intel-pod15/site-definition.yaml}
+# Airship related settings
+export OS_AUTH_URL=${OS_AUTH_URL:-'http://iam-nc.intel-pod15.opnfv.org:80/v3'}
+export GEN_SSH=${GEN_SSH:-'intel-pod15-genesis'}
+export SITE_NAME=${SITE_NAME:-'intel-pod15'}
+export GEN_IPMI=${GEN_IPMI:-'10.10.150.11'}
+# TODO add node5
+export NODES_IPMI=${NODES_IPMI:-'10.10.150.12 10.10.150.13 10.10.150.14'}
+export SITE_DEF=${SITE_DEF:-'airship/site/intel-pod15/site-definition.yaml'}
-export OS_AUTH_URL_IDENTITY=${OS_AUTH_URL:-http://identity-airship.intel-pod15.opnfv.org:80/v3}
+# OpenStack related settings
+export OS_AUTH_URL_IDENTITY=${OS_AUTH_URL_IDENTITY:-'http://identity-nc.intel-pod15.opnfv.org:80/v3'}
diff --git a/site/intel-pod15/networks/common-addresses.yaml b/site/intel-pod15/networks/common-addresses.yaml
index f4e8134..b991603 100644
--- a/site/intel-pod15/networks/common-addresses.yaml
+++ b/site/intel-pod15/networks/common-addresses.yaml
@@ -5,10 +5,16 @@
schema: pegleg/CommonAddresses/v1
metadata:
schema: metadata/Document/v1
+ replacement: true
name: common-addresses
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ name: common-addresses-global
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
calico:
@@ -18,24 +24,37 @@ data:
# This should be whichever interface (or bond) and VLAN number specified in
# networks/physical/networks.yaml for the Calico network.
# E.g. you would set "interface=ens785f0" as shown here.
- ip_autodetection_method: interface=ens785f1
+ ip_autodetection_method: can-reach=10.10.152.21
etcd:
# The etcd service IP address.
# This address must be within data.kubernetes.service_cidr range
service_ip: 10.96.232.136
+ ip_rule:
+ # NEWSITE-CHANGEME: The service gateway/VRR IP for routing pod traffic
+ gateway: 10.10.152.1
- # NEWSITE-CHANGEME: Update virtual IPs to be used for deployment.
- # These IPs are imporant and tied to FQDN/DNS registration for the site, see more at
- # https://airship-treasuremap.readthedocs.io/en/latest/authoring_and_deployment.html#register-dns-names
- vip:
- # Used for accessing Airship/OpenStack APIs (ingress of kube-system)
- # The address is selected from DMZ network specified in
- # networks/physical/networks.yaml
- ingress_vip: '10.10.150.100/32'
- # Used for bare-metal deployment (PXE boot, fetching Drydock bootactions)
- # The address is selected from Admin network specified in
- # networks/physical/networks.yaml
- maas_vip: '10.10.151.100/32'
+ bgp:
+ # on the genesis node, run /opt/cni/bin/calicoctl get bgppeers
+ # asnumber: 64688
+ ipv4:
+ # NEWSITE-CHANGEME: A routable CIDR to configure for ingress, maas, and
+ # outward facing services (i.e. routable ingress CIDR)
+ # public_service_cidr: 10.10.150.128/29
+ public_service_cidr: 10.10.150.128/29
+ # NEWSITE-CHANGEME: Update with the "public" facing VIP to assign to
+ # the ingress controller. /32 is redundant; this is an IP not a CIDR.
+ ingress_vip: 10.10.150.129/32
+ # NEWSITE-CHANGEME(v1.0.1): Update with the "public" facing VIP to assign
+ # the MAAS ingress controller. /32 is redundant; this is an IP not a CIDR.
+ maas_vip: 10.10.151.129/32
+ # NEWSITE-CHANGEME: In Network Cloud, there is a pair of "global" BGP
+ # peers that will be used for the whole site (all racks). These BGP peer
+ # IPs should be put into this list.
+ # NOTE: Any change to the size of this list (2) requires corresponding
+ # changes in calico.yaml
+ peers:
+ - 'Nonsense'
+ - 'Nonsense'
dns:
# Kubernetes cluster domain. Do not change. This is internal to the cluster.
@@ -45,11 +64,15 @@ data:
# List of upstream DNS forwards. Verify you can reach them from your
# environment. If so, you should not need to change them.
upstream_servers:
- - 8.8.8.8
- - 8.8.4.4
+ - 10.10.150.20
+ - 10.10.151.20
# Repeat the same values as above, but formatted as a common separated
# string
- upstream_servers_joined: 8.8.8.8,8.8.4.4
+ upstream_servers_joined: 10.10.150.20, 10.10.151.20
+
+ # NEWSITE-CHANGEME: Set the FQDN used by bare metal nodes according to FQDN naming standards at
+ node_domain: intel-pod15.opnfv.org
+
# NEWSITE-CHANGEME: FQDN for ingress (i.e. "publicly facing" access point)
# Choose FQDN according to the ingress/public FQDN naming conventions at
# the top of this document.
@@ -66,6 +89,10 @@ data:
# NEWSITE-CHANGEME: Address defined for Calico network in
# networks/physical/networks.yaml
ip: 10.10.152.21
+ # NEWSITE-CHANGEME: OOB IP of the Genesis node. This should be sourced from the
+ # engineering package and match the address used to access the iLO/iDRAC/ASMI
+ # interface for the Genesis node.
+ oob: 10.10.150.11
bootstrap:
# NEWSITE-CHANGEME: Address defined for the Admin (PXE) network in
@@ -117,7 +144,7 @@ data:
# comma separated NTP server list. Verify that these upstream NTP servers are
# reachable in your environment; otherwise update them with the correct
# values for your environment.
- servers_joined: '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,4.ubuntu.pool.ntp.org'
+ servers_joined: '0.ubuntu.pool.ntp.org,1.ubuntu.pool.ntp.org,2.ubuntu.pool.ntp.org,3.ubuntu.pool.ntp.org'
# An example for Openstack Helm Infra LDAP
ldap:
@@ -139,6 +166,13 @@ data:
# deployment (test vs prod values, etc)
domain: example
+ ldap:
+ # NEWSITE-CHANGEME: Replace with the site's LDAP account used to
+ # authenticate to the active directory backend to validate keystone
+ # users.
+ # It is NOT used in the example deployment.
+ username: "m12345@ldap.test.com"
+
storage:
ceph:
# NEWSITE-CHANGEME: CIDRs for Ceph. Update to match the network CIDR
@@ -150,15 +184,15 @@ data:
# NEWSITE-CHANGEME: Overlay network for VM traffic. Ensure the interface name and
# VLAN number are consistent with what's defined for the Private network in
# networks/physical/networks.yaml
- tunnel_device: 'ens785f1'
+ tunnel_device: 'ens785f0'
# Interface for the OpenStack external network. Ensure the interface name is
# consistent with the interface and VLAN assigned to the Public network in
# networks/physical/networks.yaml
- external_iface: 'ens785f0.1153'
+ external_iface: 'ens785f1.1153'
openvswitch:
# Interface for the OpenStack external network. Ensure the interface name is
# consistent with the interface and VLAN assigned to the Public network in
# networks/physical/networks.yaml
- external_iface: 'ens785f0.1153'
+ external_iface: 'ens785f1.1153'
...
diff --git a/site/intel-pod15/networks/control-plane-addresses.yaml b/site/intel-pod15/networks/control-plane-addresses.yaml
new file mode 100644
index 0000000..0140e27
--- /dev/null
+++ b/site/intel-pod15/networks/control-plane-addresses.yaml
@@ -0,0 +1,29 @@
+---
+schema: nc/ControlPlaneAddresses/v1
+metadata:
+ schema: metadata/Document/v1
+ name: control-plane-addresses
+ layeringDefinition:
+ abstract: false
+ layer: site
+ storagePolicy: cleartext
+data:
+ genesis:
+ hostname: pod15-node1
+ ip:
+ oam: 10.10.150.21
+ ksn: 10.10.152.21
+
+ masters:
+ - hostname: pod15-node1
+ ip:
+ oam: 10.10.150.21
+ ksn: 10.10.152.21
+ - hostname: pod15-node2
+ ip:
+ oam: 10.10.150.22
+ ksn: 10.10.152.22
+ - hostname: pod15-node3
+ ip:
+ oam: 10.10.150.23
+ ksn: 10.10.152.23
diff --git a/site/intel-pod15/networks/physical/networks.yaml b/site/intel-pod15/networks/physical/networks.yaml
index 5bf1a29..b5d19aa 100644
--- a/site/intel-pod15/networks/physical/networks.yaml
+++ b/site/intel-pod15/networks/physical/networks.yaml
@@ -2,47 +2,27 @@
# The purpose of this file is to define all of the NetworkLinks (i.e. layer 1
# devices) and Networks (i.e. layer 3 configurations).
#
-# The following is reference configuration for Intel hosted POD10
-# https://wiki.opnfv.org/display/pharos/Intel+POD10
-# +--------+------------+-----------------------------------+----------+----------+----------------+
-# | | | | | | |
-# +--------+------------+-----------------------------------+----------+----------+----------------+
-# |IF0 1G | dmz | OoB & OAM (default route) | VLAN 150 | untagged | 10.10.150.0/24 |
-# |IF1 1G | admin | PXE boot network | VLAN 151 | untagged | 10.10.151.0/24 |
-# |IF2 10G | private | Underlay calico and ovs overlay | VLAN 152 | untagged | 10.10.152.0/24 |
-# | | management | Management (unused for now) | VLAN 154 | tagged | 10.10.154.0/24 |
-# |IF3 10G | storage | Storage network | VLAN 153 | untagged | 10.10.153.0/24 |
-# | | public | Public network for VMs | VLAN 1153| tagged | 10.10.155.0/24 |
-# +--------+------------+-----------------------------------+----------+----------+----------------+
+# The following is reference configuration for Intel hosted POD15
+# https://wiki.opnfv.org/display/pharos/Intel+POD15
+# +--------+------------+-----------------------------------+-----------+----------+----------------+
+# | | | | | | |
+# +--------+------------+-----------------------------------+-----------+----------+----------------+
+# |IF0 1G | dmz | OOB and OAM (default route) | VLAN 150 | untagged | 10.10.150.0/25 |
+# |IF1 1G | pxe | PXE boot network | VLAN 151 | untagged | 10.10.151.0/24 |
+# |IF2 10G | calico | Underlay Calico | VLAN 152 | untagged | 10.10.152.0/24 |
+# | | overlay | overlay network for openstack SDN | VLAN 154 | tagged | 10.10.154.0/24 |
+# |IF3 10G | storage | Storage network | VLAN 153 | untagged | 10.10.153.0/24 |
+# | | routable | OVS-F (OVS Floating IP – Public) | VLAN 1153 | tagged | 10.10.155.0/24 |
+# +--------+------------+-----------------------------------+-----------+----------+----------------+
#
-# For standard Airship deployments, you should not need to modify the number of
-# NetworkLinks and Networks in this file. Only the IP addresses and CIDRs should
-# need editing.
+# For standard Airship/OPNFV deployments, you should not need to modify the
+# number of NetworkLinks and Networks in this file. Only the IP addresses and
+# CIDRs should need editing.
#
-schema: 'drydock/NetworkLink/v1'
-metadata:
- schema: 'metadata/Document/v1'
- name: oob
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data:
- # MaaS doesnt own this network like it does the others,
- # so the noconfig label is specified.
- labels:
- noconfig: enabled
- bonding:
- mode: disabled
- mtu: 1500
- linkspeed: auto
- trunking:
- mode: disabled
- default_network: oob
- allowed_networks:
- - oob
-...
----
+# The general Drydock documentation contains additional details, exmaples
+# and how-tos on working with Drydock/YAMLs in more generic way and enabling
+# custom/additional features not represented here (such as bonded networks).
+# See https://airship-drydock.readthedocs.io/en/latest/topology.html#defining-networking
schema: 'drydock/Network/v1'
metadata:
schema: 'metadata/Document/v1'
@@ -50,6 +30,12 @@ metadata:
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: oob
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
# NEWSITE-CHANGEME: Update with the site's out-of-band CIDR
@@ -61,101 +47,24 @@ data:
metric: 100
...
---
-schema: 'drydock/NetworkLink/v1'
-metadata:
- schema: 'metadata/Document/v1'
- name: dmz
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data:
- bonding:
- mode: disabled
- mtu: 1500
- linkspeed: auto
- trunking:
- mode: disabled
- default_network: dmz
- allowed_networks:
- - dmz
-...
----
schema: 'drydock/Network/v1'
metadata:
schema: 'metadata/Document/v1'
- name: dmz
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data:
- # NEWSITE-CHANGEME: Update with the site's DMZ network CIDR
- cidr: 10.10.150.0/24
- routes:
- - subnet: 0.0.0.0/0
- # NEWSITE-CHANGEME: Set the DMZ network gateway IP address
- # NOTE: This serves as the site's default route.
- gateway: 10.10.150.1
- metric: 100
- ranges:
- # NEWSITE-CHANGEME: Exclude any reserved IPs for the lab.
- - type: reserved
- start: 10.10.150.1
- end: 10.10.150.19
- # NEWSITE-CHANGEME: Update static range that will be used for the nodes.
- # See minimum range required for the nodes in baremetal/nodes.yaml.
- - type: static
- start: 10.10.150.20
- end: 10.10.150.39
- dns:
- # NEWSITE-CHANGEME: FQDN for bare metal nodes.
- # Choose FQDN according to the node FQDN naming conventions at the top of
- # this document.
- domain: intel-pod15.opnfv.org
- # List of upstream DNS forwards. Verify you can reach them from your
- # environment. If so, you should not need to change them.
- # TODO: This should be populated via substitution from common-addresses
- servers: '8.8.8.8,8.8.4.4'
-...
----
-schema: 'drydock/NetworkLink/v1'
-metadata:
- schema: 'metadata/Document/v1'
- name: admin
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data:
- bonding:
- mode: disabled
- mtu: 1500
- linkspeed: auto
- trunking:
- mode: disabled
- default_network: admin
- allowed_networks:
- - admin
-...
----
-schema: 'drydock/Network/v1'
-metadata:
- schema: 'metadata/Document/v1'
- name: admin
+ name: pxe
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: pxe
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
# NEWSITE-CHANGEME: Update with the site's PXE network CIDR
# NOTE: The CIDR minimum size = (number of nodes * 2) + 10
cidr: 10.10.151.0/24
- routes:
- - subnet: 0.0.0.0/0
- # NEWSITE-CHANGEME: Set the Admin network gateway IP address
- gateway: 10.10.151.1
- metric: 100
# NOTE: The DHCP addresses are used when nodes perform a PXE boot
# (DHCP address gets assigned), and when a node is commissioning in MaaS
# (also uses DHCP to get its IP address). However, when MaaS installs the
@@ -176,54 +85,66 @@ data:
# excluding the reserved IPs.
- type: dhcp
start: 10.10.151.40
- end: 10.10.151.79
- dns:
- # NEWSITE-CHANGEME: FQDN for bare metal nodes.
- # Choose FQDN according to the node FQDN naming conventions at the top of
- # this document.
- domain: intel-pod15.opnfv.org
+ end: 10.10.151.128
+# dns:
# NEWSITE-CHANGEME: Use MAAS VIP as the DNS server.
# MAAS has inbuilt DNS server and Debian mirror that allows nodes to be
# deployed without requiring routed/internet access for the Admin/PXE interface.
# See data.vip.maas_vip in networks/common-addresses.yaml.
# TODO: This should be populated via substitution from common-addresses
- servers: '10.10.151.100'
+# servers: '10.10.151.20'
...
---
-schema: 'drydock/NetworkLink/v1'
+schema: 'drydock/Network/v1'
metadata:
schema: 'metadata/Document/v1'
- name: data1
+ name: oam
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: oam
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
- bonding:
- mode: disabled
- # NEWSITE-CHANGEME: Ensure the network switches in the environment are
- # configured for this MTU or greater.
- mtu: 1500
- linkspeed: auto
- trunking:
- mode: 802.1q
- allowed_networks:
- - private
- - management
+ # NEWSITE-CHANGEME: Update with the site's DMZ network CIDR
+ cidr: 10.10.150.0/24
+ routes:
+ - subnet: 0.0.0.0/0
+ # NEWSITE-CHANGEME: Set the DMZ network gateway IP address
+ # NOTE: This serves as the site's default route.
+ gateway: 10.10.150.1
+ metric: 100
+ ranges:
+ # NEWSITE-CHANGEME: Exclude any reserved IPs for the lab.
+ - type: reserved
+ start: 10.10.150.1
+ end: 10.10.150.19
+ # NEWSITE-CHANGEME: Update static range that will be used for the nodes.
+ # See minimum range required for the nodes in baremetal/nodes.yaml.
+ - type: static
+ start: 10.10.150.20
+ end: 10.10.150.39
...
---
schema: 'drydock/Network/v1'
metadata:
schema: 'metadata/Document/v1'
- name: private
+ name: calico
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: calico
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
- # NEWSITE-CHANGEME: Set the VLAN ID which the Private network is on
- vlan: '0'
- mtu: 1500
# NEWSITE-CHANGEME: Set the CIDR for the Private network
# NOTE: The CIDR minimum size = number of nodes + 10
cidr: 10.10.152.0/24
@@ -238,47 +159,42 @@ data:
schema: 'drydock/Network/v1'
metadata:
schema: 'metadata/Document/v1'
- name: management
+ name: overlay
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: os-overlay
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
# NEWSITE-CHANGEME: Set the VLAN ID which the Management network is on
vlan: '154'
- mtu: 1500
# NEWSITE-CHANGEME: Set the CIDR for the Management network
# NOTE: The CIDR minimum size = number of nodes + 10
cidr: 10.10.154.0/24
ranges:
+ # NEWSITE-CHANGEME: Update to the first 10 IPs in the CIDR
+ - type: reserved
+ start: 10.10.154.1
+ end: 10.10.154.10
# NEWSITE-CHANGEME: Update to the remaining range excluding (if any)
# reserved IPs.
- type: static
- start: 10.10.154.1
- end: 10.10.154.19
-...
----
-schema: 'drydock/NetworkLink/v1'
-metadata:
- schema: 'metadata/Document/v1'
- name: data2
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data:
- bonding:
- mode: disabled
- # NEWSITE-CHANGEME: Ensure the network switches in the environment are
- # configured for this MTU or greater.
- mtu: 1500
- linkspeed: auto
- trunking:
- mode: 802.1q
- default_network: storage
- allowed_networks:
- - storage
- - public
+ start: 10.10.154.11
+ end: 10.10.154.100
+ routes:
+ - subnet: 0.0.0.0/0
+ # NEWSITE-CHANGEME: Update to the gateway address for this network
+ gateway: 10.10.154.1
+ labels:
+ # NEWSITE-CHANGEME: All cruisers should have this enabled, set to false if this
+ # is a special case. If set to false, IP Addresses and CIDR will still need
+ # to be specified above to satisfy the schema and substitution used by other documents.
+ enabled: true
...
---
schema: 'drydock/Network/v1'
@@ -288,13 +204,14 @@ metadata:
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: storage
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
- # NEWSITE-CHANGEME: Set the VLAN ID which the Storage network is on
- vlan: '0'
- # NEWSITE-CHANGEME: Ensure the network switches in the environment are
- # configured for this MTU or greater.
- mtu: 1500
# NEWSITE-CHANGEME: Set the CIDR for the Storage network
# NOTE: The CIDR minimum size = number of nodes + 10
cidr: 10.10.153.0/24
@@ -306,22 +223,39 @@ data:
end: 10.10.153.19
...
---
-# The public network for OpenStack VMs.
-# NOTE: Only interface 'ens785f0.1153' will be setup, no IPs assigned to hosts
schema: 'drydock/Network/v1'
metadata:
schema: 'metadata/Document/v1'
- name: public
+ name: routable
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ network_role: os-routable
+ topology: cruiserlite
+ actions:
+ - method: merge
+ path: .
storagePolicy: cleartext
data:
# NEWSITE-CHANGEME: Set the VLAN ID which the Public network is on
vlan: '1153'
- # NEWSITE-CHANGEME: Ensure the network switches in the environment are
- # configured for this MTU or greater.
- mtu: 1500
- # NEWSITE-CHANGEME: Set the CIDR for the Public network
+ # NEWSITE-CHANGEME: Set the CIDR for the OVS-F (OVS Floating IP – Public) network
cidr: 10.10.155.0/24
+ ranges:
+ - type: reserved
+ # NEWSITE-CHANGEME: Update to the start and end addresses to be used for the Floating IP pool
+ start: 10.10.155.31
+ end: 10.10.155.128
+ routes:
+ - subnet: 0.0.0.0/0
+ # NEWSITE-CHANGEME: Update to the gateway address for this network
+ gateway: 10.10.155.1
+ metric: 100
+ labels:
+ # NEWSITE-CHANGEME: All cruisers should have this enabled, set to false if this
+ # is a special case in corridor 1 that doesn't support a floating IP pool.
+ # If set to false, IP Addresses and CIDR will still need to be specified
+ # above to satisfy the schema and substitution used by other documents.
+ enabled: true
...
diff --git a/site/intel-pod15/pki/pki-catalog.yaml b/site/intel-pod15/pki/pki-catalog.yaml
index 63c3f34..e1c3876 100644
--- a/site/intel-pod15/pki/pki-catalog.yaml
+++ b/site/intel-pod15/pki/pki-catalog.yaml
@@ -17,39 +17,14 @@ data:
kubernetes:
description: CA for Kubernetes components
certificates:
- - document_name: apiserver
- description: Service certificate for Kubernetes apiserver
- common_name: apiserver
- hosts:
- - localhost
- - 127.0.0.1
- # FIXME: Repetition of api_service_ip in common-addresses; use
- # substitution
- - 10.96.0.1
- kubernetes_service_names:
- - kubernetes.default.svc.cluster.local
# NEWSITE-CHANGEME: The following should be a list of all the nodes in
# the environment (genesis, control plane, data plane, everything).
# Add/delete from this list as necessary until all nodes are listed.
# For each node, the `hosts` list should be comprised of:
- # 1. The node's hostname, as already defined in baremetal/nodes.yaml
- # 2. The node's Calico IP address, as already defined in baremetal/nodes.yaml
- # NOTE: This list also needs to include the Genesis node, which is not
- # listed in baremetal/nodes.yaml, but by convention should be allocated
- # the first non-reserved IP in each logical network allocation range
- # defined in networks/physical/networks.yaml
- # NOTE: The genesis node needs to be defined twice (the first two entries
- # on this list) with all of the same paramters except the document_name.
- # In the first case the document_name is `kubelet-genesis`, and in the
- # second case the document_name format is `kubelet-YOUR_GENESIS_HOSTNAME`.
- - document_name: kubelet-genesis
- common_name: system:node:pod15-node1
- hosts:
- - pod15-node1
- - 10.10.152.21
- groups:
- - system:nodes
+ # 1. The node's hostname
+ # 2. The node's ksn/Calico IP address
+ # master nodes
- document_name: kubelet-pod15-node1
common_name: system:node:pod15-node1
hosts:
@@ -71,219 +46,23 @@ data:
- 10.10.152.23
groups:
- system:nodes
+
+ # work nodes
- document_name: kubelet-pod15-node4
common_name: system:node:pod15-node4
hosts:
+ # values from baremetal/nodes.yaml
- pod15-node4
- 10.10.152.24
groups:
- system:nodes
- - document_name: kubelet-pod15-node5
- common_name: system:node:pod15-node5
- hosts:
- - pod15-node4
- - 10.10.152.25
- groups:
- - system:nodes
- # End node list
- - document_name: scheduler
- description: Service certificate for Kubernetes scheduler
- common_name: system:kube-scheduler
- - document_name: controller-manager
- description: certificate for controller-manager
- common_name: system:kube-controller-manager
- - document_name: admin
- common_name: admin
- groups:
- - system:masters
- - document_name: armada
- common_name: armada
- groups:
- - system:masters
- kubernetes-etcd:
- description: Certificates for Kubernetes's etcd servers
- certificates:
- - document_name: apiserver-etcd
- description: etcd client certificate for use by Kubernetes apiserver
- common_name: apiserver
- # NOTE(mark-burnett): hosts not required for client certificates
- - document_name: kubernetes-etcd-anchor
- description: anchor
- common_name: anchor
- # NEWSITE-CHANGEME: The following should be a list of the control plane
- # nodes in the environment, including genesis.
- # For each node, the `hosts` list should be comprised of:
- # 1. The node's hostname, as already defined in baremetal/nodes.yaml
- # 2. The node's Calico IP address, as already defined in baremetal/nodes.yaml
- # 3. 127.0.0.1
- # 4. localhost
- # 5. kubernetes-etcd.kube-system.svc.cluster.local
- # NOTE: This list also needs to include the Genesis node, which is not
- # listed in baremetal/nodes.yaml, but by convention should be allocated
- # the first non-reserved IP in each logical network allocation range
- # defined in networks/physical/networks.yaml, except for the kubernetes
- # service_cidr where it should start with the second IP in the range.
- # NOTE: The genesis node is defined twice with the same `hosts` data:
- # Once with its hostname in the common/document name, and once with
- # `genesis` defined instead of the host. For now, this duplicated
- # genesis definition is required. FIXME: Remove duplicate definition
- # after Promenade addresses this issue.
- - document_name: kubernetes-etcd-genesis
- common_name: kubernetes-etcd-genesis
- hosts:
- - pod15-node1
- - 10.10.152.21
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- - document_name: kubernetes-etcd-pod15-node1
- common_name: kubernetes-etcd-pod15-node1
- hosts:
- - pod15-node1
- - 10.10.152.21
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- - document_name: kubernetes-etcd-pod15-node2
- common_name: kubernetes-etcd-pod15-node2
- hosts:
- - pod15-node2
- - 10.10.152.22
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- - document_name: kubernetes-etcd-pod15-node3
- common_name: kubernetes-etcd-pod15-node3
- hosts:
- - pod15-node3
- - 10.10.152.23
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- # End node list
- kubernetes-etcd-peer:
- certificates:
- # NEWSITE-CHANGEME: This list should be identical to the previous list,
- # except that `-peer` has been appended to the document/common names.
- - document_name: kubernetes-etcd-genesis-peer
- common_name: kubernetes-etcd-genesis-peer
- hosts:
- - pod15-node1
- - 10.10.152.21
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- - document_name: kubernetes-etcd-pod15-node1-peer
- common_name: kubernetes-etcd-pod15-node1-peer
- hosts:
- - pod15-node1
- - 10.10.152.21
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- - document_name: kubernetes-etcd-pod15-node2-peer
- common_name: kubernetes-etcd-pod15-node2-peer
- hosts:
- - pod15-node2
- - 10.10.152.22
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- - document_name: kubernetes-etcd-pod15-node3-peer
- common_name: kubernetes-etcd-pod15-node3-peer
- hosts:
- - pod15-node3
- - 10.10.152.23
- - 127.0.0.1
- - localhost
- - kubernetes-etcd.kube-system.svc.cluster.local
- - 10.96.0.2
- # End node list
- calico-etcd:
- description: Certificates for Calico etcd client traffic
- certificates:
- - document_name: calico-etcd-anchor
- description: anchor
- common_name: anchor
- # NEWSITE-CHANGEME: The following should be a list of the control plane
- # nodes in the environment, including genesis.
- # For each node, the `hosts` list should be comprised of:
- # 1. The node's hostname, as already defined in baremetal/nodes.yaml
- # 2. The node's Calico IP address, as already defined in baremetal/nodes.yaml
- # 3. 127.0.0.1
- # 4. localhost
- # 5. The calico/etcd/service_ip defined in networks/common-addresses.yaml
- # NOTE: This list also needs to include the Genesis node, which is not
- # listed in baremetal/nodes.yaml, but by convention should be allocated
- # the first non-reserved IP in each logical network allocation range
- # defined in networks/physical/networks.yaml
- - document_name: calico-etcd-pod15-node1
- common_name: calico-etcd-pod15-node1
- hosts:
- - pod15-node1
- - 10.10.152.21
- - 127.0.0.1
- - localhost
- - 10.96.232.136
- - document_name: calico-etcd-pod15-node2
- common_name: calico-etcd-pod15-node2
- hosts:
- - pod15-node2
- - 10.10.152.22
- - 127.0.0.1
- - localhost
- - 10.96.232.136
- - document_name: calico-etcd-pod15-node3
- common_name: calico-etcd-pod15-node3
- hosts:
- - pod15-node3
- - 10.10.152.23
- - 127.0.0.1
- - localhost
- - 10.96.232.136
- - document_name: calico-node
- common_name: calcico-node
- # End node list
- calico-etcd-peer:
- description: Certificates for Calico etcd clients
- certificates:
- # NEWSITE-CHANGEME: This list should be identical to the previous list,
- # except that `-peer` has been appended to the document/common names.
- - document_name: calico-etcd-pod15-node1-peer
- common_name: calico-etcd-pod15-node1-peer
- hosts:
- - pod15-node1
- - 10.10.152.21
- - 127.0.0.1
- - localhost
- - 10.96.232.136
- - document_name: calico-etcd-pod15-node2-peer
- common_name: calico-etcd-pod15-node2-peer
- hosts:
- - pod15-node2
- - 10.10.152.22
- - 127.0.0.1
- - localhost
- - 10.96.232.136
- - document_name: calico-etcd-pod15-node3-peer
- common_name: calico-etcd-pod15-node3-peer
- hosts:
- - pod15-node3
- - 10.10.152.23
- - 127.0.0.1
- - localhost
- - 10.96.232.136
- - document_name: calico-node-peer
- common_name: calcico-node-peer
+# - document_name: kubelet-pod15-node5
+# common_name: system:node:pod15-node5
+# hosts:
+ # values from baremetal/nodes.yaml
+# - pod15-node5
+# - 10.10.152.25
+# groups:
+# - system:nodes
# End node list
- keypairs:
- - name: service-account
- description: Service account signing key for use by Kubernetes controller-manager.
...
diff --git a/site/intel-pod15/profiles/hardware/intel-pod15.yaml b/site/intel-pod15/profiles/hardware/intel-s2600wt.yaml
index 207ee94..2dcc43b 100644
--- a/site/intel-pod15/profiles/hardware/intel-pod15.yaml
+++ b/site/intel-pod15/profiles/hardware/intel-s2600wt.yaml
@@ -2,30 +2,18 @@
schema: 'drydock/HardwareProfile/v1'
metadata:
schema: 'metadata/Document/v1'
- name: intel-pod15
+ replacement: true
+ name: intel-s2600wt
layeringDefinition:
abstract: false
layer: site
+ parentSelector:
+ name: intel-s2600wt
+ actions:
+ - method: replace
+ path: .device_aliases
storagePolicy: cleartext
data:
- # Vendor of the server chassis
- vendor: Intel
- # Generation of the chassis model
- generation: '4'
- # Version of the chassis model within its generation - not version of the hardware definition
- hw_version: '3'
- # The certified version of the chassis BIOS
- bios_version: 'SE5C610.86B.01.01.0019.101220160604'
- # Mode of the default boot of hardware - bios, uefi
- boot_mode: bios
- # Protocol of boot of the hardware - pxe, usb, hdd
- bootstrap_protocol: pxe
- # Which interface to use for network booting within the OOB manager, not OS device
- pxe_interface: 0
-
- # Map hardware addresses to aliases/roles to allow a mix of hardware configs
- # in a site to result in a consistent configuration
-
device_aliases:
## network
# $ sudo lspci |grep -i ethernet
@@ -46,14 +34,14 @@ data:
bus_type: 'pci'
# data networks
- # ens785f1
+ # ens785f0
data_nic1:
- address: '0000:05:00.1'
+ address: '0000:05:00.0'
dev_type: '82599ES 10-Gigabit SFI/SFP+ Network Connection'
bus_type: 'pci'
- # ens785f0
+ # ens785f1
data_nic2:
- address: '0000:05:00.0'
+ address: '0000:05:00.1'
dev_type: '82599ES 10-Gigabit SFI/SFP+ Network Connection'
bus_type: 'pci'
@@ -78,17 +66,11 @@ data:
# /dev/sda
bootdisk:
address: '0:0.0.0'
- dev_type: 'SSDSC2BB48'
+ dev_type: 'INTEL SSDSC2BB48'
bus_type: 'scsi'
# /dev/sdb
datadisk:
address: '1:0.0.0'
- dev_type: 'MG03ACA1'
+ dev_type: 'TOSHIBA MG03ACA1'
bus_type: 'scsi'
- cpu_sets:
- kvm: '4-43,48-87'
- hugepages:
- dpdk:
- size: '1G'
- count: 32
...
diff --git a/site/intel-pod15/profiles/host/cp-intel-pod15.yaml b/site/intel-pod15/profiles/host/cp-intel-pod15.yaml
deleted file mode 100644
index 5708f12..0000000
--- a/site/intel-pod15/profiles/host/cp-intel-pod15.yaml
+++ /dev/null
@@ -1,105 +0,0 @@
----
-# The primary control plane host profile for Airship for DELL R720s, and
-# should not need to be altered if you are using matching HW. The active
-# participants in the Ceph cluster run on this profile. Other control plane
-# services are not affected by primary vs secondary designation.
-schema: drydock/HostProfile/v1
-metadata:
- schema: metadata/Document/v1
- name: cp-intel-pod15
- storagePolicy: cleartext
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- hosttype: cp-global
- actions:
- - method: replace
- path: .interfaces
- - method: replace
- path: .storage
- - method: merge
- path: .
-data:
- hardware_profile: intel-pod15
-
- primary_network: dmz
- interfaces:
- dmz:
- device_link: dmz
- slaves:
- - ctrl_nic1
- networks:
- - dmz
- admin:
- device_link: admin
- slaves:
- - ctrl_nic2
- networks:
- - admin
- data1:
- device_link: data1
- slaves:
- - data_nic1
- networks:
- - private
- - management
- data2:
- device_link: data2
- slaves:
- - data_nic2
- networks:
- - storage
- - public
-
- storage:
- physical_devices:
- bootdisk:
- labels:
- bootdrive: 'true'
- partitions:
- - name: 'root'
- size: '30g'
- bootable: true
- filesystem:
- mountpoint: '/'
- fstype: 'ext4'
- mount_options: 'defaults'
- - name: 'boot'
- size: '1g'
- filesystem:
- mountpoint: '/boot'
- fstype: 'ext4'
- mount_options: 'defaults'
- - name: 'var_log'
- size: '100g'
- filesystem:
- mountpoint: '/var/log'
- fstype: 'ext4'
- mount_options: 'defaults'
- - name: 'var'
- size: '>100g'
- filesystem:
- mountpoint: '/var'
- fstype: 'ext4'
- mount_options: 'defaults'
-
- datadisk:
- partitions:
- - name: 'ceph'
- size: '99%'
- filesystem:
- mountpoint: '/var/lib/ceph'
- fstype: 'ext4'
- mount_options: 'defaults'
-
- platform:
- image: 'xenial'
- kernel: 'hwe-16.04'
- kernel_params:
- kernel_package: 'linux-image-4.15.0-46-generic'
-
- metadata:
- owner_data:
- openstack-l3-agent: enabled
-...
diff --git a/site/intel-pod15/profiles/host/dp-intel-pod15.yaml b/site/intel-pod15/profiles/host/dp-intel-pod15.yaml
deleted file mode 100644
index 25e8b52..0000000
--- a/site/intel-pod15/profiles/host/dp-intel-pod15.yaml
+++ /dev/null
@@ -1,112 +0,0 @@
----
-# The data plane host profile for Airship for DELL R720s, and should
-# not need to be altered if you are using matching HW. The host profile is setup
-# for cpu isolation (for nova pinning), hugepages, and sr-iov.
-schema: drydock/HostProfile/v1
-metadata:
- schema: metadata/Document/v1
- name: dp-intel-pod15
- storagePolicy: cleartext
- layeringDefinition:
- abstract: false
- layer: type
- parentSelector:
- hosttype: dp-global
- actions:
- - method: replace
- path: .interfaces
- - method: replace
- path: .storage
- - method: merge
- path: .
-data:
- hardware_profile: intel-pod15
-
- primary_network: dmz
- interfaces:
- dmz:
- device_link: dmz
- slaves:
- - ctrl_nic1
- networks:
- - dmz
- admin:
- device_link: admin
- slaves:
- - ctrl_nic2
- networks:
- - admin
- data1:
- device_link: data1
- slaves:
- - data_nic1
- networks:
- - private
- - management
- data2:
- device_link: data2
- slaves:
- - data_nic2
- networks:
- - storage
- - public
-
- storage:
- physical_devices:
- bootdisk:
- labels:
- bootdrive: 'true'
- partitions:
- - name: 'root'
- size: '30g'
- bootable: true
- filesystem:
- mountpoint: '/'
- fstype: 'ext4'
- mount_options: 'defaults'
- - name: 'boot'
- size: '1g'
- filesystem:
- mountpoint: '/boot'
- fstype: 'ext4'
- mount_options: 'defaults'
- - name: 'log'
- size: '100g'
- filesystem:
- mountpoint: '/var/log'
- fstype: 'ext4'
- mount_options: 'defaults'
- - name: 'var'
- size: '>100g'
- filesystem:
- mountpoint: '/var'
- fstype: 'ext4'
- mount_options: 'defaults'
-
- datadisk:
- partitions:
- - name: 'ceph'
- size: '99%'
- filesystem:
- mountpoint: '/var/lib/ceph'
- fstype: 'ext4'
- mount_options: 'defaults'
-
- platform:
- image: 'xenial'
- kernel: 'hwe-16.04'
- kernel_params:
- kernel_package: 'linux-image-4.15.0-46-generic'
- intel_iommu: 'on'
- iommu: 'pt'
- amd_iommu: 'on'
- cgroup_disable: 'hugetlb'
- transparent_hugepage: 'never'
- hugepagesz: 'hardwareprofile:hugepages.dpdk.size'
- hugepages: 'hardwareprofile:hugepages.dpdk.count'
- default_hugepagesz: 'hardwareprofile:hugepages.dpdk.size'
- isolcpus: 'hardwareprofile:cpuset.kvm'
- metadata:
- owner_data:
- sriov: enabled
-...
diff --git a/site/intel-pod15/profiles/region.yaml b/site/intel-pod15/profiles/region.yaml
index fd8d987..8db707a 100644
--- a/site/intel-pod15/profiles/region.yaml
+++ b/site/intel-pod15/profiles/region.yaml
@@ -1,5 +1,5 @@
---
-# The purpose of this file is to define the drydock Region, which in turn drives
+# The purpose of this file is to define the Drydock Region, which in turn drives
# the MaaS region.
schema: 'drydock/Region/v1'
metadata:
@@ -17,7 +17,7 @@ metadata:
schema: pegleg/SoftwareVersions/v1
name: software-versions
path: .packages.repositories.main_archive
- # NEWSITE-CHANGEME: Substitutions from deckhand SSH public keys into the
+ # NEWSITE-CHANGEME: Substitutions from Deckhand SSH public keys into the
# list of authorized keys which MaaS will register for the build-in "ubuntu"
# account during the PXE process. Create a substitution rule for each SSH
# key that should have access to the "ubuntu" account (useful for trouble-
@@ -30,7 +30,7 @@ metadata:
schema: deckhand/PublicKey/v1
# This should match the "name" metadata of the SSH key which will be
# substituted, located in site/intel-pod15/secrets folder.
- name: sridhar_ssh_public_key
+ name: jenkins_ssh_public_key
path: .
- dest:
# Increment the list index
@@ -38,15 +38,7 @@ metadata:
src:
schema: deckhand/PublicKey/v1
# your ssh key
- name: mfix_ssh_public_key
- path: .
- - dest:
- # Increment the list index
- path: .authorized_keys[2]
- src:
- schema: deckhand/PublicKey/v1
- # your ssh key
- name: cedric_ssh_public_key
+ name: jamesg_ssh_public_key
path: .
data:
tag_definitions: []
diff --git a/site/intel-pod15/secrets/certificates/certificates.yaml b/site/intel-pod15/secrets/certificates/certificates.yaml
index 6a3e57a..d9b9ddd 100755..100644
--- a/site/intel-pod15/secrets/certificates/certificates.yaml
+++ b/site/intel-pod15/secrets/certificates/certificates.yaml
@@ -1,114 +1,114 @@
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDSDCCAjCgAwIBAgIUdJelWxycorv7UHpR0av2SMOejG8wDQYJKoZIhvcNAQEL
- BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yNDEyMTMwMzQ1MDBaMCoxEzARBgNVBAoTCkt1YmVy
- bmV0ZXMxEzARBgNVBAMTCmt1YmVybmV0ZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IB
- DwAwggEKAoIBAQDEJxIm1fY9bNVNYa7OQ1xkuhmw4RnPD0lXZ65OhJ+NB//NDU7+
- Gp5mRHFkpWaPx0zl67U2nuaI3Uzvvo+Tg2s9VHRQezzBVFhgWyZumOiIxgBeawhg
- B9VkOwQDrXxjadYFCtIL00VsE5YF6qUzXvX0aBuNZ8NuLL4491ReNP96I8ama1N7
- 6bXGGUUPY4GZS4Xn88d6R5xxvH1chMaMotSwvtj9qk9FZLP4jqCRCpsnjwJbz7e0
- U60DfGOnfzs0iGer9cqI191fQVVYYuQ0MIe4/m3Hwltcb2+/emTC31ZqxqHZpHhs
- 5BWhGQn2hibwiiMZX1x1SWNAFNTrKCVeLfaRAgMBAAGjZjBkMA4GA1UdDwEB/wQE
- AwIBBjASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBSh7lNxbWgZTJ6JFE0t
- xStgHKxjwzAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzANBgkqhkiG
- 9w0BAQsFAAOCAQEADl0IAa6hee1cclBvb3WXPyT4j3P3fCpzUrD0G/L3HLzEgM7b
- iYDrSE+GHfQ8bjx1UaTMSIvAnBNsv7upwqIJuoXG3lJx/9roHPmtGwwGv6z++GwI
- gtl87B/LHtW2jVZ7dymJHrUjS6bp1EBPQFj0Rn+pAeBGOclucXOWn14MFjwPLH6Y
- wK+T76gX0v5LpTZYb6VwmBst6obpS3RM/gi9VH70nq4jYoKLDYOvWZzZ94XEE0/C
- SRE5hH21MbEnY6wy6heFTWYDkZWcHfrntYZDHWIYAMB12xv9P8KUl2Ena01FFL6b
- fjPFbeZ0024MuaHYCpfZu6r1nqFhnfvLTxAGRQ==
+ MIIDUjCCAjqgAwIBAgIUSaSXPhv/1NjovIPduElgEfTC/powDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTI1MDkxNDAwMTYwMFowLzETMBEGA1UEChMK
+ S3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1ldGNkMIIBIjANBgkqhkiG
+ 9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7dBXtfh0reD/KI5n14TD7Rhy5Sl8Go3iZz0i
+ nZySmPIyZ3Xxs2LDAiUXDcK5GorP1KNO78Osmx0VQsnoNNObhbCc8vOk6+482GuT
+ 5UWbveRsZV98bKHb1TVeFiF2+vd/FuKFMquxL6nnHxEc3dsATjhEnpLWB2oy8L/d
+ H2g4L09Z2Ie4wG1khSTQAzn39UUzHpmSybug8grUaK0picIoDIGIaMl5G8l0hjzp
+ wdhHe3HQJuVIHbB1F7Jp46gAATn8yVj0JFbjZbsoCQqiSzY6tdOXhYxeML1etTVs
+ 1XMYpBVh0jBODJtDVGLMtcZ4rBUUIBrtmiJ7Bf+vrx7gXaHq6wIDAQABo2YwZDAO
+ BgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBAjAdBgNVHQ4EFgQUPzOk
+ 92qxIKfyqTLHJmWZ1NK1EoswHwYDVR0jBBgwFoAUPzOk92qxIKfyqTLHJmWZ1NK1
+ EoswDQYJKoZIhvcNAQELBQADggEBAMnva/ytpGdWrqXESICgyCS8t+5iXwx+mkvT
+ +c0Mljqg4TAEiCelzKjkhQJh6qXUb+PSjYzr69UZLCAo+eXJI+ENK/b7hJo0YaSU
+ fbRohCGkjRrJSTN0bwgG6tNUkBQ+PRh/yjwPy27Gt18Mo27CCvfgyy2UsnnsBHLH
+ CyKbwkLnoChTdwxLG1D8LvZDNTg6aDxx33SeAItVH4c8Zwc6U721l8yXeYKIT5Uw
+ MVdEln4gg/LzljSjnC5ZDo1udFXYpczpNfiiAeCy6gqhHPSde/7rv6CHdel7gUZ3
+ GkQHwxZvvBgBjy5vxUa6d2Jy2hVTgIWWZqZSc3tP+1UZrWg1RZc=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes
+ name: kubernetes-etcd
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateAuthority/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDUjCCAjqgAwIBAgIUKGkHzTXaivBQ+gUwIGCuqNdTRUYwDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDUwMFoXDTI0MTIxMzAzNDUwMFowLzETMBEGA1UEChMK
- S3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1ldGNkMIIBIjANBgkqhkiG
- 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtwaK9O3pc8epDF/X4wjkTpxWshaTHI3Smjzp
- wQMcPlu+T8W2tLsifbptgMce2qOMz5wM0RnMrp3c3sG6ajJFKAiS78MM+4I1q2Jb
- buKG1661eoIdYteZMmVRRr4UJwmsmgyR4uqhSTGi6oasmuhK6kiszEI4dcyJNeWv
- 59mqdEr/k0lSmAjgKv2NXrlIhtSKmwvEfdFlgKBMU+nuLRkR3HYVb0SKfZG+DuRs
- cceE/ZPfT1pmz+z3ghDTKuH668UOT6b0AHS9nfWE/IVn+tDOOlWYO+259cGnnrlm
- FbAKFoBIf9NonrYvePkbsVgqQBeFxzwS+upEbHPh/WAJcPYhFwIDAQABo2YwZDAO
- BgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBAjAdBgNVHQ4EFgQUFDHZ
- NBr3Zu1wNNAcoJhvzFZv7pEwHwYDVR0jBBgwFoAUFDHZNBr3Zu1wNNAcoJhvzFZv
- 7pEwDQYJKoZIhvcNAQELBQADggEBAHOqogGrCi3EK0YB4z0lF5tmT0g+i4DC76Sd
- +Riw713TdyQV20srigiReaCxSctvVhWOxA3t154lpbwbOwvxqC8mXbFSZ5Cr2EVJ
- 56cDpBm2HH7a0fq0Ds4Ywh9tCqR3DgGczpTG5Zn/zdDx/WmE4QHCqqKWQSkuNhn2
- eGouU5mI6JRGCUiOMvOKdFJMcIThewKLbBigkS3kZ/zLBDZAp+HWc8xH4JEywFsE
- sktq5xIeXOgeBAkTX1sSmXoUFXl6E4mUv4wBYAqG1zTgtuhnpqnJK4BBScq0gKj7
- fux6YyKy5KwRT/2Z/WVNgUz4O7Ts5Dr1ozWz7lY6EwR0ajP0PV4=
+ MIIDXDCCAkSgAwIBAgIUf2yg/av5fj9sZK1cI3lnb2ZzveswDQYJKoZIhvcNAQEL
+ BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
+ dGNkLXBlZXIwHhcNMjAwOTE1MDAxNjAwWhcNMjUwOTE0MDAxNjAwWjA0MRMwEQYD
+ VQQKEwpLdWJlcm5ldGVzMR0wGwYDVQQDExRrdWJlcm5ldGVzLWV0Y2QtcGVlcjCC
+ ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOnduiOM/60YigLji2hwgto3
+ jV/grmCEn1+Tvm5xZrd9JMAG73f2eFauzJqmMf11ORoq1r3BrVpl0aRNWLTql7KP
+ 0tkJlKN/1IyLt/ZAcl6Y+TUcpDvYgKzqjerQd1DMvU4g2w2zov1BLFvbFvxBH5UO
+ 4yD47/TDDbFn09AfwBHOrQe+D22X3jo4UMLnHTAztt/DNm0+KkJP9bQLVfOIMyDm
+ zZBSKzSVBSzwwNu0p8qkw38LyeyFZXMloRYNpaWTMzBx+uenDjfd7pvb/6HWYlf/
+ d1lcTLJJnQ1o+gEFFMyIDFLJU2jKnPehtMDZ1uJw0B+hxhBjXBACBs9BWix4ufUC
+ AwEAAaNmMGQwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQIwHQYD
+ VR0OBBYEFCF5uN1D8PTs9Uxjc1IFtS35m9JcMB8GA1UdIwQYMBaAFCF5uN1D8PTs
+ 9Uxjc1IFtS35m9JcMA0GCSqGSIb3DQEBCwUAA4IBAQAwDo0BJKNZvSRpGHLsRBLQ
+ O5x8mLB97YYnbtAUq7Hg14LXZzFMnJzfY8p53RQsaKxS3qrgTa+PNRDYoVr5mt8D
+ qYPr3foNU1t5IGuY1qmw3xP2IHNvLSTvt8otOOQfvb2TwGSbyygXFR0FBRdEjkoO
+ DkiYoZuxC2/WR5MI1ZT+0DCVD3qxaNcFznPi1g0D4fl/+CIxER8oVz/W0R0mDod0
+ AAqi4eOxz/raVCXptq3fUzOqT63o5Qwy1RqDMf9X+RfyDymLSttHNHBJ37aMhVp8
+ VxtJ4ecjXb5gHGz5O03Bewwi6OkhfW8hatgoiVqrA/+OUXM8raiDQZrK6O4cKPFF
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd
+ name: kubernetes-etcd-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateAuthority/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDXDCCAkSgAwIBAgIUa1+yWTRwV+ypIPLV7nBySUS+w14wDQYJKoZIhvcNAQEL
- BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
- dGNkLXBlZXIwHhcNMTkxMjE1MDM0NjAwWhcNMjQxMjEzMDM0NjAwWjA0MRMwEQYD
- VQQKEwpLdWJlcm5ldGVzMR0wGwYDVQQDExRrdWJlcm5ldGVzLWV0Y2QtcGVlcjCC
- ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN/aNSzPmcyRrmmM33YsSDzO
- 8p8uT/v3eMk6O6lWPbp59J06O1sjgqP8NEObgZfr19bgs5UieZ5E5RCHsrTndzE4
- BhViPPQ1A8p57hckifHpFUwK4oomMUbsMdUNVc7K6XrM6IeR2yTzijLt8VKD2lG4
- TEbiKhCMoLw5MM9S19IZvRA0CITr+vRjDhpqsBysusO7DUS5bYte8ilsQL1LFYIL
- g4di0CFBM2TRGkKQQKt1EQ7b4QqgCnK1fcX1BMRwYE9AoW8yrQ+qK7VqXoWS5VwJ
- gRTEz7PrahBO55JtJ5KOqyOuSLhpamTTqC9aFEXNV8aMZdZfPvjxYQwWNf2TAFsC
- AwEAAaNmMGQwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQIwHQYD
- VR0OBBYEFKr2D34PW5AKaX1UUp9WtygIrygOMB8GA1UdIwQYMBaAFKr2D34PW5AK
- aX1UUp9WtygIrygOMA0GCSqGSIb3DQEBCwUAA4IBAQC+YoGJ3Kt8J5LAn+EaePq/
- jmsNRYIuj1g7M4KxAEjG7oLnOJvEzygEYaTEUI1uN0Oet8gWTvcOcTk1YZ0kdfKV
- 0H4l/P+OwoVN3f5X0Xk6ZQyTWHw7+TrnNPpbpDqBkODg2rpogYowT+W2wTO5yXR/
- 17BBeWdb77tOzh3Krg4o2MMm74wF4FDBvMCgZ4xDlev+wvlRRogZ969y8K8c47b+
- bfqt1sAoax9dEwagSttX0kLi9yVKDMerZtDz86QdMpmzC64yqTd0LiLuSi/Pdphu
- IgpNP8OBt0fuNDgfeqCXjTPTQJ1KBjD2SBAHSyIlk80F1Qr9JXQWLJRcVKOpSI95
+ MIIDSDCCAjCgAwIBAgIUe1GZtZIRpWZD7NyS2LfIijIg9tIwDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE2MDBaFw0yNTA5MTQwMDE2MDBaMCoxEzARBgNVBAoTCkt1YmVy
+ bmV0ZXMxEzARBgNVBAMTCmt1YmVybmV0ZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IB
+ DwAwggEKAoIBAQCgRtxVqPCUny6juVnt13gYgGkWhG8NSuvoJY8t2EDytyOx0ft1
+ whj6ZnTKjAsxQewuwG4Y2GXS35Ik7Qrk0gBXebN1Waz/Mnh4n3CJtsYU79jc96kz
+ zGsvkTAuHypfFkBNj/vgMJhFIRb/Nd00e+peDqNCwq9Zq9/4UXdvYCO9zOhI7EKk
+ i1dDiQdjDi0XT5Yt/qhhUa9FNUl2luoNWlRaNl6/gLBYmRRdRY4JpC9hxsToD8Mi
+ IkWbeTQfKkUvmkKTgC8ruGVvLYjJTXoqimvCIiSYckEPkVIBlHjqz0L/Lq8+lVOf
+ rLklXHsYAxOIa3KWIO94Kae+A6qYKivhYIGHAgMBAAGjZjBkMA4GA1UdDwEB/wQE
+ AwIBBjASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBSFLj/5uiFO8GNv0zRP
+ ZT05buvXfzAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzANBgkqhkiG
+ 9w0BAQsFAAOCAQEAFlChgib90xuazjZq4ckyf4eTc6WuhzKPaPCL90TKelBwr9RV
+ 0ormq7Lve8KEDJsQh9jieh+BUiyH0wUk75PdpuBxFl9FCPSVRq+vFa+tmt8PDfvQ
+ 8hM7KC5BEk7iJR3aTsV+QbGlHkoy/5dxUpUGnzF4HYnhf5qVtfV245q3urclXgrU
+ h8GjaMStyFSHgC1SMfvIWTZOT5/1gzDkwGzQrt9OMnX6j28MIayiuzPfLgOIMpWv
+ MKZSGWspgLQZg/3GFwXuKy++a6WUqbSep3xA0bujk+04R4JnpOjpmC9/aTp4Z/44
+ 1XVrPu7cIZ+p2Uk53MPOIuAgNufyr+QAmVDqag==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-peer
+ name: kubernetes
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateAuthority/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDSjCCAjKgAwIBAgIUfcVLKpbbFByekAPQT+jIviRWd3IwDQYJKoZIhvcNAQEL
+ MIIDSjCCAjKgAwIBAgIUGY8rJWfjsxRR/N2H66urZ2uxCCcwDQYJKoZIhvcNAQEL
BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
- HhcNMTkxMjE1MDM0NjAwWhcNMjQxMjEzMDM0NjAwWjArMRMwEQYDVQQKEwpLdWJl
+ HhcNMjAwOTE1MDAxNzAwWhcNMjUwOTE0MDAxNzAwWjArMRMwEQYDVQQKEwpLdWJl
cm5ldGVzMRQwEgYDVQQDEwtjYWxpY28tZXRjZDCCASIwDQYJKoZIhvcNAQEBBQAD
- ggEPADCCAQoCggEBANJLb3IV/fXfI0LKe5y/2lBL9PJGie69Cz5CWyPIplr+r4XM
- ktri7ljK5lz1W1huZa8YvLWr430Ic6Zzsq4GryKowChDRkCZJ9O2U46bLBl0BLe4
- w1OtSDel4RVMeTk7BMjhNYZWQYTeHd4JdDaTZosa0ezhxqU0iLY8ADokEtPi3qdx
- nizBA6pLl0NibakQ1cphyK2hCeBwT6VsAuMvwrronRoCjreMyVJmiNF2PKLBsKl3
- NR1Vf7W3WkiMKviq0D7iT0NQxaQcd8h5iT6BWQhM9sofYAlLqZ4QzcexNnWbNlLg
- Mm5BlNGx2WvsumA1zKR3a7T7/wh0581Fi0LhT48CAwEAAaNmMGQwDgYDVR0PAQH/
- BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQIwHQYDVR0OBBYEFMJnaGNECRgVN42A
- TvYqehbEBI6sMB8GA1UdIwQYMBaAFMJnaGNECRgVN42ATvYqehbEBI6sMA0GCSqG
- SIb3DQEBCwUAA4IBAQB45ezEMQELk1leJYENJS3bvEaKHFNgAFpADUBXRnfD8Fy5
- /Ji+nYsWGFdImSDt24razbw+7H4HBgQrELw+hVMgkhHPTdZgFExm0bu1TJDvJ3Rk
- yXOCT64gKFWb+krmuTufyT0Ic53v7uUxqwtys+BvAZAJOboueCMv949xAc2ZaXax
- ssFzwXsevM3P3wbF6JLS8bqE03S2aWBpNBsDDEaCF9G7imGCmkg/k9TKAzHEp97j
- rAOGwJix1YQmRneZEPOo0PWFqDS0JJx8lSN7N8G1IbdxTlIPPuLyvtx5jfQhbrPP
- js/eV4N7JzGw34W0sY/h/RaUd1iKJE/bUPkB4bmL
+ ggEPADCCAQoCggEBAPUWfmdILqkvOU/24DIDfp/UjoRVYX5tIgORZCNoZQv3Fpwp
+ X4chL5iiuFgsZ3vcyt5/8D4Sm947MBIgSJ4KMrsa9A5i2ZuMjHaS5lY02Bjuw16z
+ 4DcXNJIRXHyPt7wdiTYwBUyf8Bl5+5eDsNt0woIlgo2kH+Jjdrb3N2ot9KsVPg+Z
+ eg0tpgwNHVLi98a8SsEDZf8TwiPX8Uv88IqgDlqz/X9BudUXSGdlFTDllcg6L7DN
+ vuaShBykKqOs3rTImx3RO+Ybou20vJHnrATvV8yMGuPFlnOdCwQL0OP2jdbjnqGx
+ k6Ou2O58S/rXR/SFLIEj7VAHt9f6IQUvodOb0YcCAwEAAaNmMGQwDgYDVR0PAQH/
+ BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQIwHQYDVR0OBBYEFBMZXniYrQoc5svG
+ Bp14kiFpSERkMB8GA1UdIwQYMBaAFBMZXniYrQoc5svGBp14kiFpSERkMA0GCSqG
+ SIb3DQEBCwUAA4IBAQCWTJJyM6U8ILMxXGkYr5Fbv+nDCH10aNk0VNwbn1yesOiM
+ XU3yCQtbpqjv1NcoRUYjdv+Q1ntyRzTdVYHn5Jw33Mx0NLAahJ96Ymo/nWdIYH/X
+ oax3p06V79diezxzQBOSsFKpkWcT0PoQna+uHxwvZxi06V1iTfO6oxi7+YkQC0in
+ dNn7+lKz+Lh8r60KvWUIy+S5j4V0N1lx9hJg2clyjsyTU0i/UDACbk2L6Ucs9yM8
+ 1ONcj5YAwmZwachEnwDn5TfopWLqF48lKHlxjviVBXTKZLspPCZuSPEB8uhq8sX/
+ 0VNUVaZuH1KeFgvfzVzJe8/6wUr9mL8th9GwD8XB
-----END CERTIFICATE-----
metadata:
layeringDefinition:
@@ -121,24 +121,24 @@ schema: deckhand/CertificateAuthority/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDVDCCAjygAwIBAgIUZMOvPKBPJ3zK9tr7Pcmj6WPmHf4wDQYJKoZIhvcNAQEL
+ MIIDVDCCAjygAwIBAgIUDTzyuypzLnUJua5ADO1aovA12xQwDQYJKoZIhvcNAQEL
BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
- cGVlcjAeFw0xOTEyMTUwMzQ2MDBaFw0yNDEyMTMwMzQ2MDBaMDAxEzARBgNVBAoT
+ cGVlcjAeFw0yMDA5MTUwMDE3MDBaFw0yNTA5MTQwMDE3MDBaMDAxEzARBgNVBAoT
Ckt1YmVybmV0ZXMxGTAXBgNVBAMTEGNhbGljby1ldGNkLXBlZXIwggEiMA0GCSqG
- SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDFAgF9vAt4IYoSHAoW0Knp708eKMe0GO36
- HCFr95HYaQ1ww4eSi56xi6FdF0TMCTGex+WSkzHnufNM1LjAp5Dgu3C3GgW0Gfm/
- rkPtW7FNnHdUgRm1U02qzRUo8YXj4OYKSL/15JrNCCV3iC97aBccYmsDuKh2ktM5
- CZNOhHpXyHbOmBGup7pW5k/yeOFUW1oo7jhWoi1nr+/69kebjcsZa/LQhZBKe91M
- wyloRrrwAB3hmHbEyOEAPgZVhXVXyIDsoIiMJI1Mp2wq2/TUcVKvVBenwazEAp/b
- UyxvQ5I5BW4lzLvLyZR1vOIBjS78hPuHnNHqfdUtibQFli/ikdOXAgMBAAGjZjBk
- MA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBS0
- IBvCEFyceh5MvvW1+n98/fwOrDAfBgNVHSMEGDAWgBS0IBvCEFyceh5MvvW1+n98
- /fwOrDANBgkqhkiG9w0BAQsFAAOCAQEAkrSHoT9YHi8pgjxO6vZmdTPe36gF/nk2
- csX+VJxbhWGE0a/7Qr22wSN831BGzjeJh5wV4CE4s2C/SkGG6fvxFrW05gtX8cOU
- rcG7ru8xnWdnXM0UsCsKbeGpKWGkTcBeuQ6Zc+9WRDCzbQDSXBQUwqSHHJy5UX3g
- tDDFbc1uWNmedqU78a9n120g8IIEOHLh3Zm6WUk+Ho81NKNzigamROjviCDfuSdQ
- pYfuuLDruU2ngBBG24IUYuDU0+Q4iNcgCT/SjwoHhzm83Zw39647LDZURckM3mHj
- y6zXCJ7hC86/Tj6JuHp/7tGevBWp1MDvkD1ZE85bF3hhbvBf3y2Lsw==
+ SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDjjAmLb6EtUcwxi8uVMGjWLBJYy9OwQP5U
+ 9bQUYAZ1FTD2KaJih+EHrRWFS8EmiWwVJs2Lw7B8RCiidHxAEIdTn4a2FiUjz2Cg
+ PYItuIG/1m4qqYoLN5jhKjqUHz+SQqZVSUusPuHqeqtXmeKIaDBSAfKyzm46pteg
+ 5T8nfYbCuFxkHzAvbStcf80tCltX5HXKx4bYJK7HWk8IHoVGJyiLmVWbfNgePtbf
+ jM5WZtEZAjAQspw2geQK/CdX2GEHy+ZrcDqxqPYzl3hKVRd1/LQelOrWEohY7KOf
+ BMtp2f7GbaHI9UJKtNnaTdcH8ONAI8m/ROxjoo1nOBOSIZdWkhBHAgMBAAGjZjBk
+ MA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBQH
+ IctKzuAgPN5tyT9e2vxggek1tTAfBgNVHSMEGDAWgBQHIctKzuAgPN5tyT9e2vxg
+ gek1tTANBgkqhkiG9w0BAQsFAAOCAQEAoXrJ5MvpeZgFWfS31NdkgZ4lotVDHfOS
+ wd/nk39NmTSr8ygszGkKPn4YifDkh1YHsnzjhTQLMyo4MHyOUhzSvRhsFx5YWNt5
+ YvdoNleLvsWREmno3PFj8PTulZxWEFohoZyBZJPOvi8G52TSAHfm8bQxJWGPabYh
+ LXVsqwWQsYqNEKJ7zv4THHMUH02q1AQNiqqyKGGEnYGcI7EAhJ+pYsDrY1ugwt6L
+ V1Wlpyq2IsiLQz4Xby1mOWpql+TZKdVPUylzYSbN0/jAd3mEV2muGAy605z20+Rm
+ XbRLX1G8cdvbxC+NKLyzR+y5+pmjWjZMwWtQSIcYUtk0qjlqz/mwAQ==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
@@ -150,143 +150,293 @@ metadata:
schema: deckhand/CertificateAuthority/v1
---
data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDWDCCAkCgAwIBAgIUKesUWMlJwqIIr+3ksg+gF6fYsUYwDQYJKoZIhvcNAQEL
+ BQAwMjETMBEGA1UEChMKS3ViZXJuZXRlczEbMBkGA1UEAxMSa3ViZXJuZXRlcy1h
+ Z2ctYXBpMB4XDTIwMDkxNTAwMTcwMFoXDTI1MDkxNDAwMTcwMFowMjETMBEGA1UE
+ ChMKS3ViZXJuZXRlczEbMBkGA1UEAxMSa3ViZXJuZXRlcy1hZ2ctYXBpMIIBIjAN
+ BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwHITjRchxnJ4xFVa2nBaYpABaytg
+ ypgWFF3HXNXglgJMODY/frLqZRsWKSIgreVVuNT312Qb1EEAlKrFF7w1sDFn8P6G
+ lpPpLJ0O0XEFNEmlAxIaXiQ6HiFgZj1m5YwMoTswpTgUGBt54D0Vl6CEPQIC90IW
+ ZHbr0TK+Y3vjWquvBIcuUv96hrFSSy5N8ZGPg8lhblxGXJNPtiL4zyMxmu6neJ7k
+ 2krofBmfYxjpIt+7Ysc43PzT7n7KOjpbX8P5XKwkPyV9oY3QEO1TOUd83F2MezcI
+ s9VInvIUpTPc8hl9pEHAjDsbONk4VSnvVFpL8zat786nVYg122DgQfoRAwIDAQAB
+ o2YwZDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBAjAdBgNVHQ4E
+ FgQUycfLGZl5SMlUcFm8sosbWfBy6XUwHwYDVR0jBBgwFoAUycfLGZl5SMlUcFm8
+ sosbWfBy6XUwDQYJKoZIhvcNAQELBQADggEBAJnEwpUTH/zucHeZC+f7V/pLyuOe
+ BnOBLXBew3SWxqy3DhXeTe+Sm/WhcrImelBQ7/XFr+ZCvBcPRNFYS9qDFHMSJ/Oz
+ nRj0pq8+utCKKa7Yb1aHuXnnM7W68myBTBneGaZmj4Date9XE+CZsY2Sf/UuuT+b
+ w9b0CEtx6359uzdh+5GGP+e9M3qRS2vzZlmH98F3XXyk4e2EaZ9XAWSJ+71bruwy
+ m6OmfV9EkAG7HsTh9Z9DlOJh2gssM0+mPRqiMjTUD5IjWosSx16l6FT72mj2VPXz
+ ACpfuBSCf/8Wm3WdJYftAwc+PxGDRXQj9ir4BibGVOXsqGKOUm3L/pbPhA8=
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-agg-api
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthority/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDQjCCAiqgAwIBAgIUO174bSrZLrDQR3cQvZwWDKqhIoQwDQYJKoZIhvcNAQEL
+ BQAwJzETMBEGA1UEChMKS3ViZXJuZXRlczEQMA4GA1UEAxMHY254LWFwaTAeFw0y
+ MDA5MTUwMDE3MDBaFw0yNTA5MTQwMDE3MDBaMCcxEzARBgNVBAoTCkt1YmVybmV0
+ ZXMxEDAOBgNVBAMTB2NueC1hcGkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
+ AoIBAQC/RfjSXGho6wigU7zyPO6RGRKc4yvCiUxFv++3UKABbTRc1gy+pN1je5X4
+ hNA4ewy7heWSYFL06CLULjKfQM0nnG5g7P+raRKdVHTwrxwNL9SsOlbddMavWZ1I
+ 3xZ+b1AKqYH5/vLigktr7lvS/ZxSZfqpPmqY31rbL7R0dJpp2dMF0j+ol+wolXGZ
+ roWtREi/4G/NqP7kyMyKt04uPS6weKaY7hanOjJeEKZ5KMiToTEcUhGGeD9htmYs
+ lRgDHLUDGrM+Xyo3d73URJsySu+CZlgr62QQHGE+q29V7VcnLoGnza6V7eXhY7Ft
+ RNdfG0tsyequZw5/ErxTyq55XLsDAgMBAAGjZjBkMA4GA1UdDwEB/wQEAwIBBjAS
+ BgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBSz3EZKhpioi/Uni9LOrqmH9p1s
+ qjAfBgNVHSMEGDAWgBSz3EZKhpioi/Uni9LOrqmH9p1sqjANBgkqhkiG9w0BAQsF
+ AAOCAQEAZ7LFsntamEIm+Dzt/ShHFNyIOCILo+yUIDgAEm3qK+iLvycfaq6xL6ca
+ 5TkplZXwBhnz2nKCGCjPYOACU9oe3oTVZA11i2wqAIhvBGs6yFDZsva4ipIPsp28
+ +D8Xl3kL3ZtsqZEUh+QH8Hpj3cl0ZzRQz2kT/4qqsTLqS8fFZHmQeJqm8iIoSFTf
+ m8L5MkmViorqNfuS4J9w4w2oDWpqGNgA3a6rYb18o9Cj364JXKY1fMok5MP+dpoY
+ vwD121sRvqqDaiGGxJIVozQcKjiEIdru9mBTwDcGjYd0AWB8+LKnC+jd3DpGLzEU
+ +tRk9Bwbh3Q4r862fYuv2LdOjVSRVw==
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: cnx-api
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthority/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDWjCCAkKgAwIBAgIUdYoVpwEFt1mSaSUIWAjZ5DD0Bq8wDQYJKoZIhvcNAQEL
+ BQAwMzETMBEGA1UEChMKS3ViZXJuZXRlczEcMBoGA1UEAxMTcGF0cm9uaS1yZXBs
+ aWNhdGlvbjAeFw0yMDA5MTUwMDE3MDBaFw0yNTA5MTQwMDE3MDBaMDMxEzARBgNV
+ BAoTCkt1YmVybmV0ZXMxHDAaBgNVBAMTE3BhdHJvbmktcmVwbGljYXRpb24wggEi
+ MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC562eG++JdvIDhhY46Ol+jvMR0
+ /8dFFD1x0v3eJ30uD4UMxSh2XWRE5tANRxSzw1TcEBafTbuQ3vcaMB/saVM41WAw
+ qC/HqIZ4ZXlMWHRax4GOm5gwWVzYVnoF4ZTvq/j9ygvX8ff/16BAYFZ0zE/ji1J3
+ 5LIJub6jiAzGRZtm5nXqvti4NAFRi01Eexzh/wL0X5zYcqkUYNEAvpxzg9sWNep7
+ ZNq6FSFC/f3T/4qMj5Lg4kAC081emaVq6udzd1P93K3dXtaogftMtK52bC/UCZ5H
+ QfPrTMDahJjEOx6Ra5p0ltGdI+Sg2wiErzCcr42TFoRq2rfYwnq9HXf1zKjzAgMB
+ AAGjZjBkMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1Ud
+ DgQWBBSRrdzoLl13ULkVD90JWUpQfNXWMTAfBgNVHSMEGDAWgBSRrdzoLl13ULkV
+ D90JWUpQfNXWMTANBgkqhkiG9w0BAQsFAAOCAQEAdPH7SFhAq4M8AiH9yUwphg8V
+ vwOvwcZTmR1QedCbb1f5A/PKuMhTfzM+TYvh/jDgUPhroYvKFA4PZs0w+Gv7t+8Z
+ yq96N8PQ/2uLxRBTK1PTbwS443tc9guPVADAV96+yBjx1yagoikRnGlShiAej3Ca
+ dwKXEAgIuJ7aS2O9t9bJHsl01TR/eCvk2e3bOWvp4RMOZa+fyVdxkAM4lVV6S6sw
+ nFuvYzLK47MtDLfg5oqA1gp0Qum4sDN0AxDiyEs0naHp6DjWjAUx8nxET2ZPDQVP
+ CQr16bkxANbJaYBF58zCOq9KW5Ndz5stm0W4mgK+z+v3krxUyknQJnQ5Ov4Qjw==
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: patroni-replication
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthority/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDVDCCAjygAwIBAgIUMd1102Pzdi/AvGJ4WvmMOtIy3NswDQYJKoZIhvcNAQEL
+ BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQa2V5c3RvbmUtd2Vi
+ aG9vazAeFw0yMDA5MTUwMDE3MDBaFw0yNTA5MTQwMDE3MDBaMDAxEzARBgNVBAoT
+ Ckt1YmVybmV0ZXMxGTAXBgNVBAMTEGtleXN0b25lLXdlYmhvb2swggEiMA0GCSqG
+ SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDmqBY+EuRw8tEA0ZyQQgW/+udU31FvirC1
+ eXT+ow1acBDo5XMUHNqN4A2j2B6IKi+tZDUc7LnzvrVbYBn127iqqLScU/kw2u3v
+ vGIzyMQkW1HDcZz5SCZ5b6jLANHAWSwiJ5mkAoUtL2FPcFeeT4q5AqTRtypB2mfd
+ usXk5Xpvj0P5zmEVMt19PS/y1Buu44LCBI+K25PD0dwoduFREZTimAH6yaUHUFoW
+ cVGsnwPSw/kaW2ed+rHHtam9JH395OOc2nk8hnq+t98+JTpGUqB59MlRGr+mf/i2
+ +QYq2hI2p+H6raa3WGporbOSX5AvX385/7cmScVGOGMgBA9Y0F6rAgMBAAGjZjBk
+ MA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBQj
+ NAQ9DUXrBqJni3IXwLqZslVvOTAfBgNVHSMEGDAWgBQjNAQ9DUXrBqJni3IXwLqZ
+ slVvOTANBgkqhkiG9w0BAQsFAAOCAQEAII74qj9quZhIB8DN2fE8f0pjS7XzkcoR
+ MSS0hOcme3pToWQRACcF+RwYK2KrbEuUWgab1C5Rd7X8h0yireWql9MBwDnpL7Wj
+ Nf4L1XPSXtlsQeaRTOHjYLj0EZ32oF3QGa0Z/CsuWlCjf3fz3xGMAWeh6TUPCqsn
+ pvs+PhpQcywbxyGE1f4T0/g467UkGNXf9Te3dSc1bX+V25BUxTCh3ftczcaRonCU
+ uAF+UVaWpf+2AV/aZN6sfXjMUJR06Y5zPaHLLCy8UC2s3/z6IRdHWhLGgTI8y/lH
+ N5c2jq6rLfKf3ZrQ53oJRX3eeSntT+55ctDkvjocj2Cyl6b+soVadQ==
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: keystone-webhook
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthority/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDVjCCAj6gAwIBAgIULBajZNt9laEEp3akx7xRaojk3C0wDQYJKoZIhvcNAQEL
+ BQAwMTETMBEGA1UEChMKS3ViZXJuZXRlczEaMBgGA1UEAxMRYXBpc2VydmVyLXdl
+ Ymhvb2swHhcNMjAwOTE1MDAxNzAwWhcNMjUwOTE0MDAxNzAwWjAxMRMwEQYDVQQK
+ EwpLdWJlcm5ldGVzMRowGAYDVQQDExFhcGlzZXJ2ZXItd2ViaG9vazCCASIwDQYJ
+ KoZIhvcNAQEBBQADggEPADCCAQoCggEBALrMm8G6A8HCTeUqrDp+fQW/BylCdiau
+ 9izUb6Xg13ZXEU9RHniGsO9m2AnFTGURsKUQuLjJ2f+mhxL+vwkZ/+aqSW/VO9/A
+ 1IWKi/QSPH675lLe8dpYiVXHKKAB9gvuMwZDGp3xwIGpFibam74XnofTOEF6hQRG
+ ti4VH8qM8fpaherfnBEiOHVrMndOUzPK1j2cdpsgRlR6qs4HHlYC8mKkVmbHzO7D
+ Gb3HK3piHkcFlhPI4JofZ42D5oBt1Jn6bbuW/5W2lXhWqsP7MBs7pIi17k8yjHpe
+ Ynrfp1wQ7Re0c/NPlXhRZROr0Ycp++JHb/OBgLglXozQR6GJfd+YvM8CAwEAAaNm
+ MGQwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQIwHQYDVR0OBBYE
+ FNUbUJeCS2sJlb+m6P/k63YtwuyxMB8GA1UdIwQYMBaAFNUbUJeCS2sJlb+m6P/k
+ 63YtwuyxMA0GCSqGSIb3DQEBCwUAA4IBAQBMnnka9p+M79ElOmMQXuK7Dc6qgbmf
+ TqEpUTPa7q4cM1zYT/Pv2FpeUm1RW6uY1ewViTJavz7sx9dF9ukAChCPoyTf5FuM
+ KwnnRKzINJ4hALL/2uIBulhugKBJyLHHjZ/9mMwO3q5PdNp+ujgxrNxJmLxNxsmt
+ RyBDcQg+hE8yNiklbkH3SFGsf0LEyJU8HXfBkOtBxix9RaCH0mGnLCwbcI3R4I3V
+ vMQOdmxyNzlcIZrQERtcZEJXFrahU38WDvW82q1It/Wc+LzJDRC19kEfvRm1s2mt
+ QwEFGNHGztz+y9ljSFW0HLobHUIgX/IDocWq9AMX7aJKlEZhrqTzYcAh
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: apiserver-webhook
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthority/v1
+---
+data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAxCcSJtX2PWzVTWGuzkNcZLoZsOEZzw9JV2euToSfjQf/zQ1O
- /hqeZkRxZKVmj8dM5eu1Np7miN1M776Pk4NrPVR0UHs8wVRYYFsmbpjoiMYAXmsI
- YAfVZDsEA618Y2nWBQrSC9NFbBOWBeqlM1719GgbjWfDbiy+OPdUXjT/eiPGpmtT
- e+m1xhlFD2OBmUuF5/PHekeccbx9XITGjKLUsL7Y/apPRWSz+I6gkQqbJ48CW8+3
- tFOtA3xjp387NIhnq/XKiNfdX0FVWGLkNDCHuP5tx8JbXG9vv3pkwt9Wasah2aR4
- bOQVoRkJ9oYm8IojGV9cdUljQBTU6yglXi32kQIDAQABAoIBAHZltvkmEPnGpYGN
- wrvRwQUzp6oyVSe8bGKLvJS8TKoN+ANHUzTh0FaeXWuIwr1qaSom+jy78R8PpQ7Z
- EUTTAHoGbibeHC/9v1J58lqzhTh5e2OCa427bLyROr0VjI1dJsfoXhyxK6guslFj
- 7s9xNDiQVoEl7rqj2zX7ZDtw9fw8aK/HIb79yYxcm7FNunoGjBe/uu24nF6sIMuj
- R02qE9I8eUUqhMDtaBU7kHMmChM+0Zq8D2kK34r7j3K3T9gQby/HxWdBEmVpN8Um
- 8x+0Qbd/sdJK0XW7GQEkokyMrZfbew5I/0qIqyzyuSFt1+VAkiMIDM5a46NWaOzf
- smawnTkCgYEAz6xsmxy1dQUXc/28WochMM4sWr4eXF9qWa8osCurgfklraur9Zgo
- nqifN1LPdb8MMqVr0Bh0XGEFtlvOFPC+5FmV7veJwJNFDFZw8/z+8nydNA6H/9M8
- b8ZrEOxAANEiUf30pnGoxknvX1SWTL65QbF8Nin/HAPH6o1NxKtLrJMCgYEA8cxR
- /FkL12JDX2q3tUpbee9DJ9fFhhJyctaVL5k/EdGf9F3WeS8AGUgYETM2nv/mUyOH
- KRs61M9HMvt6qy5C2H+XVjWCmURHyYDmBBrTm4B6EUollesYu9bak0pToTW2+5nB
- NJjnYFZPJiWWRy5A61Ke5u92HccP8HEH00s0KssCgYEAkjIX4ro7I74J3KXrSu+F
- 9g2uO9NLHEwvWiNsyVh0zHLQi4om7CXJsqeSLigl1AZCWAUL+Nq+T6odk1rdoPA5
- 8hb+7dNlLiR+n0jbC2g3Mg13vYXdR8M08JsGFEu8YtbXClF1QRcScUTrNnkdtbku
- QYjooFjANsCSpBQFg0XzZ/ECgYEA0SoiMd0FtUe3aC70w8qS3yPuP+UTZStH/bdK
- TmaOfGeNquIRybqypywKRba7pUdQgtLU9OYtOjIkMSIBt1rJUGbvDxAy7Up3nwP1
- 9c8PBhFZhuNRKCK6vqLZaVh+h5HjvDoBO/KZFGkVBra1DNYiKm7KLpMu5gtw6lmc
- n1cKxYkCgYB6PqN37EeRfiFhxTFTwf/J1o4sx96wY6ZRom4bta0xA3LayHR5xK9O
- y0xi0vmH2Hl/SYHpOqB2w0nqPb/VRgM9drPE+Fr/8WL11Efopd51ImMOtqLhHW1S
- z9fYuZRAoSj3v9uZilvturnY5atCBItqO70XMjSvYnvlmpvsnWNTGg==
+ MIIEowIBAAKCAQEA7dBXtfh0reD/KI5n14TD7Rhy5Sl8Go3iZz0inZySmPIyZ3Xx
+ s2LDAiUXDcK5GorP1KNO78Osmx0VQsnoNNObhbCc8vOk6+482GuT5UWbveRsZV98
+ bKHb1TVeFiF2+vd/FuKFMquxL6nnHxEc3dsATjhEnpLWB2oy8L/dH2g4L09Z2Ie4
+ wG1khSTQAzn39UUzHpmSybug8grUaK0picIoDIGIaMl5G8l0hjzpwdhHe3HQJuVI
+ HbB1F7Jp46gAATn8yVj0JFbjZbsoCQqiSzY6tdOXhYxeML1etTVs1XMYpBVh0jBO
+ DJtDVGLMtcZ4rBUUIBrtmiJ7Bf+vrx7gXaHq6wIDAQABAoIBAEh+fF5icN8YeW/Z
+ iVovhLJgA5ZMASLvIZcrEcROGHo7SpYzZAy1DJE40UBGnbqzmgtOBSAd3B4kzXhg
+ qEKCRySH5DBDiYDKTQ4ELT906rcGTOzSINHUvXjPHfFNHkH+9GT7hHMf15GaD3Ru
+ +QfAXOV7TZ+xT0FPZFvzgOq0EHyK831FsjfRbaTznoSmHVKOpZhuPJOadxMBEYip
+ 9ciGXgCC7TZTlOywUnjZFgPUSb0Uf/YOSQ3nN0ZSTxU2CIgHVSw/1BRzU9Bh+YKh
+ hr0tsDJGLmAP2bBKhz/hsECbUW4Un3SpUdvvMgDua9S92udv+HYTaaLpGt3jWDW/
+ wG0N0BECgYEA897ZyKzn969HkPO+fBHTIiY6l0vOQT4Yr1W/2PCQMSpT8AdGx6Ai
+ prbXZdPgJcCcpyL1DeHAejr8giBlBgXF+i56P5Uhw0qJAsFNS4MH/hMeD9mwrrg9
+ 6RmCKI15oMyoH71lHP7urgUs3Wtp2iojfEtMAK62vxGUu/8Wqr+8vz0CgYEA+aRf
+ pnPjQb/iezTXFFeKqtqKvhAsieTKl/fyb0t2g1ciHgqe62Y13wr83UiJEJEofWBT
+ KegUGcADKATN4nRrgwh+mGqD+t9HpigZ4/VorVlOHKUW48apPT8ehNxDw4d95ZKX
+ sqosCHSLprjf5CyQpJfxZimV2Bt/gSQnZY6KdUcCgYEA7PP1bBUE9xaqVN9gkDDJ
+ kv7OIz+W0rHBTmvlEqb7k6nrEOghD8o6oP47YEd0HXp/O66tqKVXXex+ePl871Mg
+ wCv0wF7pBVYgtjqYHezdETQGG6SLFdkS3rDYVQrRyTnRibV+z6Osyg1hQGsj2MTk
+ 4dpPqMIZ8qDkgZ4jqhjPDokCgYBe2TkOQRGjNYiTTyw4qlohOA9mzzZc3fSrcKVH
+ 6+AHXt+zkk13Gsp1B/OzD5AkH0LHAAYY8fhRIEcSuWCQHbOLgXq35iBm/NZ4JtxP
+ ZDp1Qm0PLRpZSG2cu5KY4CdO7vfCdcP1Ofqo677zhWJrixMZtjEdo8cu6KO1KUte
+ pp2smQKBgGevkIuPnLvJBaUpZKG4ECpTgOjWlmWhzBhcgA0j94+EF5IlZPtUKbuG
+ 7Dlz98OdiNfOa7S5HgY/y1WPIrm2Qc/fULZFSgLT0tGf5gsq2dqPAl12nRtU0Tbc
+ MIsSjo8Pb+GmoP74+ZmoUfo9eVb4QtqwaBk+3vDm4HAxgBSvTLkb
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes
+ name: kubernetes-etcd
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateAuthorityKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAtwaK9O3pc8epDF/X4wjkTpxWshaTHI3SmjzpwQMcPlu+T8W2
- tLsifbptgMce2qOMz5wM0RnMrp3c3sG6ajJFKAiS78MM+4I1q2JbbuKG1661eoId
- YteZMmVRRr4UJwmsmgyR4uqhSTGi6oasmuhK6kiszEI4dcyJNeWv59mqdEr/k0lS
- mAjgKv2NXrlIhtSKmwvEfdFlgKBMU+nuLRkR3HYVb0SKfZG+DuRscceE/ZPfT1pm
- z+z3ghDTKuH668UOT6b0AHS9nfWE/IVn+tDOOlWYO+259cGnnrlmFbAKFoBIf9No
- nrYvePkbsVgqQBeFxzwS+upEbHPh/WAJcPYhFwIDAQABAoIBAQC3ANLGTnCj9Nqh
- 5d9eQlDODWJeVVYpMeGHmSp9dFe0PlWPO/kQwyCcqGC/Z9oA8ZFlMPpbxbk0S+JB
- 1WFIuBUQD2qkU9pSTQLO59zWhaggVq9c3Gb3ou2qR0Y6Puq1keXEbpccVlCIeBoW
- +Cv0BBqMIbitz/TWTHpRquT1JV5bQcKhIAvLvPXQvNfRP1s276l4GeB7jfgJ8Lnr
- NFizCBGDDTBJkbEptNetDT+zfniHTeVB1lUs4q8ZNA7Mxh8DuIW8PaiMcx5GJ3UI
- uYIU1m1+wFnfIxzokO+Q5XVlSnu8cKJZjZuY4Vd8itjxUSqKSwETegCBw9uHg77O
- NXfld5JhAoGBAMFU4RT63KWn+Yu1XNmsvnN3oGmGf3AGztpiqXafChO2cm9DKEKh
- aA8u6Kj7PhBgIb33+zRGsuMiMqA9bE8e2UzFOQvN1LOqhfgSlrLEtoR0XkLSxXjx
- Vk/7aV1SXj96s88DCJ716rKTZ24HXq+acqj7eUwBqb79+/BG5HIQI5SRAoGBAPJa
- clT4BvTwalbnmfYSfcGRUQOpgGEm2mlUFed8vcBiNJgr+Ewk4aqF+GCeF115CbXs
- s7DVdk4Jjq7AA4Hj7tkrT+mWjhq8n1III/3cvlXtHo7cPWqM4DqzsHUbiFMSm1pa
- wOY9FpqVfyesJW391rrKWakdqycNhAS5DGM7dg8nAoGAPJJQVtdmDAy9tZTj+1sQ
- 7HJdctJt2PZ5Fpj0yTJ44MY3wj5DPeT+CkvDHzZgMpc72x33uWAxKdKMFAJKjdt3
- b4MXJWierI/Pm3KPfoD9QjCHW95XelX6meKGF3P4DWFvNnuX1t3rY3mlXSa39sKo
- C+OGFFctDKbcqWI8rrP5wdECgYEAoP6UlP1vIafT/Ic+L8l44O2388bWEbPNw8qo
- Am9LXlHevnf3Kh4WC0GUDhr3SpDtcn0boY0sWgrfThcgPVk9gebT30i0fe5vp/7g
- afQKPOqYMi78XZvYGSblQeZYWVcy/ILtQgWyzl4hailhc//8dXmWtlGPMRI5cSm8
- oO8PLmECgYA0svlz4uRD/TsYoMo5jmHw5ihWMICBkJVIcgv3mzsiw7854JqLTuDA
- XDAvtHGJXDfAkOoUNhbvEqTBsyXaPjIgo6A/0CYOK0hDZPb6SIyOFR380Vy4D+Vf
- 2EtYBuocbPkbn6wtsFbUTyp7FJb1DDSxTmM28atdmjGUBDPrwDm6Sg==
+ MIIEpQIBAAKCAQEA6d26I4z/rRiKAuOLaHCC2jeNX+CuYISfX5O+bnFmt30kwAbv
+ d/Z4Vq7MmqYx/XU5GirWvcGtWmXRpE1YtOqXso/S2QmUo3/UjIu39kByXpj5NRyk
+ O9iArOqN6tB3UMy9TiDbDbOi/UEsW9sW/EEflQ7jIPjv9MMNsWfT0B/AEc6tB74P
+ bZfeOjhQwucdMDO238M2bT4qQk/1tAtV84gzIObNkFIrNJUFLPDA27SnyqTDfwvJ
+ 7IVlcyWhFg2lpZMzMHH656cON93um9v/odZiV/93WVxMskmdDWj6AQUUzIgMUslT
+ aMqc96G0wNnW4nDQH6HGEGNcEAIGz0FaLHi59QIDAQABAoIBAFv4S5RhhcbfyJ6c
+ N53J6VvBzwIujMT+QuLGanRqelecilBOKeyGbArC0UncI/qmF9+3ix2yxeav9gLk
+ PAdh3mhlcSjTQLYPtlnTNHROIewbwp1ldxzl5qyZzVfTxahr6+KGvz6jL2zjLXuu
+ LFrljXMEGMRFwbAC6SakS0MkyVb2rLnjhgXwj5/Erw6nAUJhdzQGSBBJ6z6J3lDa
+ CFWN9Ifju1GZRDd+/HxPxKWnNObZtZuGYEp9X80j2Z8CTNu32Ia+gbJM39vzuqdt
+ i7gUU6orc/i+e2YFq3E0BdmEeDqSK6fUsFDH7xdzs4MFwBNCdSZafZdSJ3u9m38d
+ +p5pAOECgYEA7Eb/Has+TanlM0y5DcbECTHy757q7ITkXa738M/13GkwQuAHMQUG
+ MOeUR9NdmRqmCP5tX5LD/cVcwjBRlkqhQvjk55M+hiBTw/ulGQbuPm049YY+tuDw
+ AzY6jgzKUyCdP+RLg05kcpAkqx/ljMp3B2AJ3mWl2pySyVFQNdRdvQkCgYEA/WM0
+ nC7PoZXfxC5+Ze7tSKWVl5/FGzqDiJO1WUh/yxAc8AzkKfcbfSMFT+0YfBPiRrZq
+ WWBsfGdVj/PKWEMrMGMvlTlORwX+DqnJquHoEsSctUt80fnnvubAX/WtMhnzGaZX
+ MUMIMSUUS7mOLbIKDNcUCWGJmTEISJmCylQdvI0CgYEA3D+WIm71hengWMClI/1r
+ 0fJ4tfuam92JDvdB8n24fryjG0PAEGbRjZbht06FSmn36hxZkiS6g/2M6QunkgSB
+ bG+c2W19dAQAcYlLLhgyz4h69wwru8fUk/nh/XZYx8J4Mw25gm353n0VYVs7XNGC
+ wSI6MNDqGO2pOvaMYZFTzBkCgYEAt3r+vZmn//nm7sg7/tPkPpaonAK1V+InHN7Y
+ kq5M213vlmO/VCP7Y8HYNugYssAzOcEdgVqxM+QfsP13qDH7NC6eZg/4/rT4IuYP
+ gg3TXsPANgdTezja9wFgjBv6Li1cO1aYDLPdWrje2Xaj3bLuVB3qBGD8olE/DlMa
+ wifm4IECgYEAxS3ZhCAU0pC2d3xFU4gF+trfEfuDAlXXb/FvQkgI3Lb8ZSSOUnI1
+ ZLPbBWPAuwxKei3Got9HidnRDxqUIudPJcA1UmZxYa2n7LkGWN3QRfXHGTooEwP3
+ aaUYnC7Q8hNVMcZdgKV/yIULsrX0AiO9akb/UttoR8iF7xpSJtZ3FNE=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd
+ name: kubernetes-etcd-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateAuthorityKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEA39o1LM+ZzJGuaYzfdixIPM7yny5P+/d4yTo7qVY9unn0nTo7
- WyOCo/w0Q5uBl+vX1uCzlSJ5nkTlEIeytOd3MTgGFWI89DUDynnuFySJ8ekVTAri
- iiYxRuwx1Q1Vzsrpeszoh5HbJPOKMu3xUoPaUbhMRuIqEIygvDkwz1LX0hm9EDQI
- hOv69GMOGmqwHKy6w7sNRLlti17yKWxAvUsVgguDh2LQIUEzZNEaQpBAq3URDtvh
- CqAKcrV9xfUExHBgT0ChbzKtD6ortWpehZLlXAmBFMTPs+tqEE7nkm0nko6rI65I
- uGlqZNOoL1oURc1Xxoxl1l8++PFhDBY1/ZMAWwIDAQABAoIBAEAiy+N344/qGXei
- Zg/8pgHOJVOYOFBv2gqFhbyBuhPohz5ZBdKZ/P8w7mSEdH/rkZ6+KJXNF91RzfOL
- fZc5Tjwq2gtcZyxs2BY2ExJMZL2L049C+x8rzCiO2cQ6GuCx4G1PsjvNfWU75der
- tt22a2HIlQomGHk/YXosRKDSEoXeUo0tc+02iRNIyC3EwWiFV2HfBSofS6d3jPYe
- mjBJ4eQa0zkQHs78OaVDfnGbWIvjVUdmod1+5C6sl2FyeuaWsHX1hKxgY9D/7yTT
- cyz/7sI4BItAQStZIikdaMu47wpnMEtzCAcVHLAxwdJZxbiZU42is0eAYN/WBYf4
- N7gw9KECgYEA4PVv2BbBjrE9a4v8uBHp2dOszI0ehAhyG1EJwRp1Ql4KBmGQG71V
- qziorTBh6eZtGkCAaLw5gFo3NAV4QJpipJ/I7007YFkj7Wj7ztBhsT/jXxSfGjy/
- iaRw8SPR3dM3lvXLW+okwNKs/T7Bb4lq1HuMnPnutgVd2pQiGlZws5ECgYEA/r2w
- ZEGvsDqPSjPVox0rjz3fEOpe6c0Mfah33zywyw5YgiAlknDintowsSuD6mRlpxDy
- DPBpwunJjxsjxjxUEZieJdtiK+6oYVOpzL1e9igG5rezV/iUDvai/4KjYEeCq32x
- lAIFE/NTdEfl/IukyMHXNj3UbIkxpNg1/YRN5ysCgYBvNufkXNu0P8utr7dxCOoj
- 1pJHTj0X6VUATEAWR45REUzDethT3nbL/2bkuFav3Etz/w98uBF1cyR3g3y/85Nw
- 783XAMeqCmfIp25WAI9Lodo212sQ/Zdz5OgxTxQiJpoE999hwZAKBB2h1bSr/7Pg
- +HO755QsSNrthO6XNsThAQKBgQC6gEwdCo5C+oyfqdV2R0v14jlnHAADMlE7ylSA
- xuE0uLsKAdkgHq9714ignZhFyd02dEySNo1n21vq/taxMsfl3hOi6bw1J9R09Riy
- wc49b86lqcaO2HolfmKVqKJOQeyj+zFAiD4JfjMSRfVWcTJinLAgkSHtmIAVDQpy
- IiQa4wKBgQCpLeJQaJPoQFYS6YcfwflJUO5IYvwwZZ0L0yM0PG7DF0wfeE6EEc++
- elCELFbVrfxAUWRMVxIAGwpoI8Z6xLkEr4apv/mD0tGd1MiCi25Ra13+6PLKNGsq
- IpvdspGb7xP3R9W8hxaaQd0seIo8njHX+KH8XTmTZVZgFiW5jtw0rQ==
+ MIIEogIBAAKCAQEAoEbcVajwlJ8uo7lZ7dd4GIBpFoRvDUrr6CWPLdhA8rcjsdH7
+ dcIY+mZ0yowLMUHsLsBuGNhl0t+SJO0K5NIAV3mzdVms/zJ4eJ9wibbGFO/Y3Pep
+ M8xrL5EwLh8qXxZATY/74DCYRSEW/zXdNHvqXg6jQsKvWavf+FF3b2AjvczoSOxC
+ pItXQ4kHYw4tF0+WLf6oYVGvRTVJdpbqDVpUWjZev4CwWJkUXUWOCaQvYcbE6A/D
+ IiJFm3k0HypFL5pCk4AvK7hlby2IyU16KoprwiIkmHJBD5FSAZR46s9C/y6vPpVT
+ n6y5JVx7GAMTiGtyliDveCmnvgOqmCor4WCBhwIDAQABAoIBAHq4RxS/mhXyHD/4
+ N8dI6Ae6qrw3AuDmsOK7f3nWz0QIvif1Y9iymXWA5YQA3sEEfNb/OE2Fw9FGphvn
+ 9CNoOCLCaIo985wjBOM3EXAgpmJ5k079wmyK5LczL/TgoAzWeL3qtSzfiHfF8lnO
+ 4GTDTJxgENmZP7IlTARSPGTm8/bqq+Y6POyj1nzGGvzMEv6WPDxoQf0apBs6+tok
+ Dkdxl2gCgXuBj2ANKM3Mz+akGfDbSGBLssGV65n4ZdiT+yFF8kIVyXgqjMhbNS2a
+ shFVa3h61/Q849wRLE8Lza6sWttrVD2s7Ca8l7XRWrxWkJNnPi2Iyo7yIgg8GLNx
+ nInVWyECgYEAx6Idtbgu32oEAZq/XKp1GbelUJ6bKzDreDh9dWK43/vl5XHCs50R
+ Erjl63LzFh/I/OT8zPJGtlxbv1CGFoaFqz/V8AnaAT7yf2PpYF3MPGmDyYzipuMq
+ 1JhJd1PPrOdL9Usoa2P6tQFF1Gw5xCOcPobw1GumK/OcuzoCQybczGsCgYEAzYf7
+ aItNx6gSUZPzEUN7rvR6sf3JYsQoEyErJWPCar+vQSzptCifNEvh8UyoKFqN97RI
+ t6JlZk/ETRIYlSf2eTTkSPqLk6jai/ktATrroE6biY5se2p4xbCsqw2xXDi1Z7pS
+ bjln8sh6ZTf4/twLs18qmG2QRgHgaQ3n1SlaZlUCgYB7lkVGRmveK8enJqHpQC2W
+ ajaRnl75ciOUHYStsxw4rb05OiALCeWT7ZuJE3Sh8bN/vFM0nZhhNPQnkDYyo70E
+ s1RCchbgRpPhgXztB6R0ke3gTLPUFTZivpRcpyoeJGLFzG2Nbiu6+rq8MvPgFRuZ
+ KfjVyH7rHrmcvuC/qcNvWQKBgFxLslRyKg18pi1IGSEpgsNAOlDvvJ3DpJNik7OI
+ pue1CIhmGNS0YTnk0aPAXsswTwxrQzRjktFtBKPvemaQuZgYbmNvT3qRmwK8dL9W
+ rDUi16nf8UtCttVfz0pJLdpSBPR9sUKaONnHuV720bPxMLfuBnzIxr8JXLMQcYlB
+ try5AoGAKtKZFZjjBhwOmwy5npMWSnSV8s+oj+Tk0lDjai8wdFblruue/VWPpoh7
+ bRxQMBVHbdNeQS85ZPkfgXaRZcwOSpMK3q1w8R+RdyLMEPiRzRkYdiD0EtiXZxVt
+ uChBQBL72Koe7Oh9vGTVIQ9uFIqbENKmKrckHj9OSkqDau4smBM=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-peer
+ name: kubernetes
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateAuthorityKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEA0ktvchX99d8jQsp7nL/aUEv08kaJ7r0LPkJbI8imWv6vhcyS
- 2uLuWMrmXPVbWG5lrxi8tavjfQhzpnOyrgavIqjAKENGQJkn07ZTjpssGXQEt7jD
- U61IN6XhFUx5OTsEyOE1hlZBhN4d3gl0NpNmixrR7OHGpTSItjwAOiQS0+Lep3Ge
- LMEDqkuXQ2JtqRDVymHIraEJ4HBPpWwC4y/CuuidGgKOt4zJUmaI0XY8osGwqXc1
- HVV/tbdaSIwq+KrQPuJPQ1DFpBx3yHmJPoFZCEz2yh9gCUupnhDNx7E2dZs2UuAy
- bkGU0bHZa+y6YDXMpHdrtPv/CHTnzUWLQuFPjwIDAQABAoIBAG/jLO+BXfbUexlN
- TEmRFiHE2BWTjE3WjUXZ3k4CsugVO+QvfS8ysGfTxI9PCAPb8QQhYD40rzvWJFo6
- kqXe7o29RUfmy1kRY8xT5M8qJmOAhAYQKvS5bIQXINPJNXJKwXfzwxuvhvqfhzqc
- wxVKhbObWHf1hFBfzCFReTl1+gJ7ar7nRq+/WgJGRH2zO735uObc9AAWIOqvI14r
- msNPTrChI5uW5+I3r2/g7OfI8pX7FocP1VIJYoa9F4EV8sn2PIu3GVeGkgo50zxx
- O01r8Rl/80VXIgA+JozgSPpnbrZFt9tKLkWfPBUhHzAvOAIs8HVrlXKXaNfAeE3f
- /wVGWWECgYEA74VTjPkIvmcOuA5IV8wx0hP2wSxpN68KmKAQSqE9nNEOvVD5ikMS
- TJLBPDpnn7bLx4S1V292Ff1bz6Fh+Dk5llLp/B00CSGu5l5S2NoAB00cEytP/AhC
- PI1IVziGZresMMsGbp6UmzSoWFQM5S+tati/1ZXyzeh0OVlQOVL/9RECgYEA4MNZ
- i7xk0YmC2RWqnpZBMIH6F4n0LIynseqIG8pgnL9snL4GsaV1YyatZ/R3qd+EyPps
- CbOM0GEPOOENI/RvWbKAVKCYdoWdhWMKdjnxcjrfCZjgAKcMNcgo1uwU41x9mQTy
- Ww2T5dMfVhrfx6ulrafUjPb68/lpfBfgK1E+ep8CgYEAtBZfon/ftiEQbQy4EeNC
- ljxSbB2zIp3mbqjydtpS0+RPm8IVTYJucMpqpZkYLnqnLuU13367n372F9+0JIkK
- Jl9C9D8Uz8TWlvjWe5s1KEgu0q7fHZUsEBD+Ei46x2JUAf+0X1m2TBfEd10CsRMu
- 5UYAvltWysB7Gl9vtRoVvrECgYAshqabpxO16u7wAHnPduatLGKV/S9REAA8n8Cc
- +MeQ5d8nYgHDeYq6vLPHj0eRcIVGp0110osH0OKKGxNWVxskAtenbDUn7apZ/Vfa
- OfpZ7c23ggCGQJGLqf5lLVmp/O2ovbEhVpxBAEUJ8sL4NEnbEA9saZUndfZurfAr
- xKmC8wKBgDUMzvTHQIh88BpryqhxBEFJeA02VqjeUBwJugAu1mP7NUZqksR+QX/7
- poN0U8rRC0KdL3UepvGR6gDcNTySZKHXOrxrL/OozKuuCAti8kZyRO0edd+4iqPr
- TInn69lSRf/6vPtkuVddgWlv3IqF713Dg1/Bzwv9e/Bb0Ix0NaCF
+ MIIEowIBAAKCAQEA9RZ+Z0guqS85T/bgMgN+n9SOhFVhfm0iA5FkI2hlC/cWnClf
+ hyEvmKK4WCxne9zK3n/wPhKb3jswEiBIngoyuxr0DmLZm4yMdpLmVjTYGO7DXrPg
+ Nxc0khFcfI+3vB2JNjAFTJ/wGXn7l4Ow23TCgiWCjaQf4mN2tvc3ai30qxU+D5l6
+ DS2mDA0dUuL3xrxKwQNl/xPCI9fxS/zwiqAOWrP9f0G51RdIZ2UVMOWVyDovsM2+
+ 5pKEHKQqo6zetMibHdE75hui7bS8keesBO9XzIwa48WWc50LBAvQ4/aN1uOeobGT
+ o67Y7nxL+tdH9IUsgSPtUAe31/ohBS+h05vRhwIDAQABAoIBAQC7p1xjMhZf/cNx
+ IYJpaNmUAQiZ9FGwnlizyKeWoMD1l1udd+Qnr9YklTp2cJFPei9uiyDkNhVX45Ob
+ 3VIch4xuTGXfefpJqiSGSVXJXa6z8GRwZ2NeawsaZ+abjOLOSwMbFUuJbtBEgWyM
+ hw1sCos/YP8D+k1bZnKoBsNMLiGutxZ1hXCbI7klsJpZCHhcFAE9QLcas/BY7XeM
+ 2WgGTz3e/w/YBWlHITaMGkwmebA60cx6jixI+Q98QMAegzSgmmOlOpZIWDKHOZjD
+ DXEqScWQvD+G6y1mB+xKJEln5DvcnpehbsmZA1kmpOvo7A8Whta9nFb3jLzsXyRi
+ imRM5vdRAoGBAPhzp+Vbiwy2cmhd8Eb6sdk/xPZxnuFmvkKGeTGaXcb+EYDSnEht
+ LhfMGNWiovTMWFsEuVceEQogqZsY6pdQCerG05QG/sQCLFIyKhGvn9MkOJYLrGIW
+ UvUD4BXEESE0Vxf5FEm+o/uLycnP4qaaQkT6ZfdD+amRHTTElWTI6q8JAoGBAPyI
+ rMiE+6swOFcQ+6RkVLKQ5CIZ2ds1hcvW8UAKFSCiJB94adPjFa8KlTJag6GuJZh4
+ SzQ20Z9Xu3XmPIlCBwkHw8oMZLGUKj4eQ5ApaRa+PodvWeNJXEG2RjtPVX7VZpVH
+ tG4SdqX4dAo8q0HPNCYYyfzx+KLifGohDKVLUxAPAoGAdoW18pRZIRdoPKGTnki5
+ zwm8zFQnlx+MY/ACoMcjNWq+rtXJ+EMdWfzjXAbZ9i4FeGYohIazWkF6p6KbRtPH
+ 51gyVst/fcILoqqLpyRA+litJecrtR8xM/FFVRzTjyOI6MbKBuQLFlT5Tmz9krzE
+ IGPTgMHMuDeh1ypwmkO+sQECgYBFCCuLSObu/eh4zHitkIuioH7sX3qxNKlVdnVO
+ VzM9T3VmcOkk9c+IoPD16c5P1SYLzt5n8JBO6ZGiAgUMVFNOAaRgyBCChokhn+5C
+ Kz/B6tF2/lZpDjW89NGwBtjNKhK3vfkxmbR7XDaEUd9SxwxvWZllntOj2xu9ezlU
+ ugmDuwKBgCaqsgLjcoy7+gMjykr2ACBaL0Sh4jWet7FV9qoqM3vvhq/x/IK4LI0S
+ HYXHaeA+wsnXmLBODImosP7JjGFh0wyf3K+EN3FOhWujkk+Ym1e7lYXU26RIbj8t
+ PNZJ+wn3bETJ9+0FE4O7PRxzQM3Tvm0d6QRGjmH5EDNQfZq2yYja
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
@@ -299,31 +449,31 @@ schema: deckhand/CertificateAuthorityKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAxQIBfbwLeCGKEhwKFtCp6e9PHijHtBjt+hwha/eR2GkNcMOH
- kouesYuhXRdEzAkxnsflkpMx57nzTNS4wKeQ4LtwtxoFtBn5v65D7VuxTZx3VIEZ
- tVNNqs0VKPGF4+DmCki/9eSazQgld4gve2gXHGJrA7iodpLTOQmTToR6V8h2zpgR
- rqe6VuZP8njhVFtaKO44VqItZ6/v+vZHm43LGWvy0IWQSnvdTMMpaEa68AAd4Zh2
- xMjhAD4GVYV1V8iA7KCIjCSNTKdsKtv01HFSr1QXp8GsxAKf21Msb0OSOQVuJcy7
- y8mUdbziAY0u/IT7h5zR6n3VLYm0BZYv4pHTlwIDAQABAoIBACtPrZQ+6yaV+QzS
- LUWmyjQr8HDo9j6Z3HfIB3D9FItHTTUlR4DoQRM3Z1pX60AQJWCLAeWfhrEzKFIT
- 0ipIrIk7rCQVDHvz2fxSC4z7Q5eUdoeVellq3wBV5fkCYDUhFHHeXJVqlL3OtK36
- urWexLXwzSYcSq0GynkXqdLxPRRfE0DJksXu6NO18WzrZoY3v4G1MUij7iUby2fR
- KlJCImXxkLf97iIGK+zsS4B79dR8btq92BbQmKckn61A9SjbARr/qu/RTeF3L+dc
- au+M+xvXzyc9GA8Ir8h0Lg6m33ZRIrW36JSvNc3PaQpn0OJFrHio8/KMzZEx5Y0+
- nNTRhUECgYEA4KpEEWdPqNgA0OEPWoCxeQlHOmuD/nHnKV7EyT38iYYU+p0LzzqK
- w3DY3Nyu4T150swnMBrVMLfbU5Vi0pAwJ06T2ZfvXxHkmAhffnq03Xl18DJ4JAHM
- q/m30d+Us7CQvytBxSdnCoMg0WDr385jhGXtBcuVcLwdtDTGGDwF/iUCgYEA4Hw6
- ouY683T34juvZmOvdqHqB8PLMYAOIfGurw9POAzxpSloTcjvkuj9DerWtSia/KKm
- PsNiJLPk7CSeirmpg7ouH67EN7Q0F621tInsmN+tWIO13B+V653gUdcX8ldDe9PV
- VaeEClsiaSaDivxDmiDhLmvvo7t878TMgH3HyAsCgYEAy1bPzMCoxLTb6DIK52rb
- NiVDpohxKvaEtljj2xCTZRVKH5nMen8N4N5eKWhDj/FINZY5Uby3gCSoCfqHOvTt
- 4GWqQ6LUMEPNlhzd8We2E04/hGrpeg125aBa00V9HTWNjLjmCj8jb8xHA7qpQiNW
- xxpJcJlWZHaem9+3+284LVECgYBNck6AeNGJwKbshA7lUirs0Lt+5kupzjYR++F6
- P9viyIRtqLV1cIdGtd7n+EcOxO2Dj1GvgZTQeMfXuGKCFb+n1ImpIJBNb3wxVxrD
- KHpZ24FgckBBqxv758HGOmDmmLiNde252Usyj3J1uHXVc2aXPBS0AUTxxfM6fTjY
- c4yDNQKBgFVXAhGkYN/9GszLS54Km7NDB17kg9bnYNDazX2tgybfXduceyscYGIr
- w+5z4SmlqNF/YIOfhGv96q50Em/w7+Jig0U9jgiyXUx6wP92e2aray+NuhgEWkyq
- OxsZEhySKh3KfaTxOLEWarqCH0KJ8/ObZQylA8H7ZRVIA33Geoga
+ MIIEpQIBAAKCAQEA44wJi2+hLVHMMYvLlTBo1iwSWMvTsED+VPW0FGAGdRUw9imi
+ YofhB60VhUvBJolsFSbNi8OwfEQoonR8QBCHU5+GthYlI89goD2CLbiBv9ZuKqmK
+ CzeY4So6lB8/kkKmVUlLrD7h6nqrV5niiGgwUgHyss5uOqbXoOU/J32GwrhcZB8w
+ L20rXH/NLQpbV+R1yseG2CSux1pPCB6FRicoi5lVm3zYHj7W34zOVmbRGQIwELKc
+ NoHkCvwnV9hhB8vma3A6saj2M5d4SlUXdfy0HpTq1hKIWOyjnwTLadn+xm2hyPVC
+ SrTZ2k3XB/DjQCPJv0TsY6KNZzgTkiGXVpIQRwIDAQABAoIBAQDLYbJyR89nI3KA
+ YnQPn9pEe9XWOjC2nBD3PTm88Gs1IUDG9UWoDc1LwB+5KZG1cSUC7tDPeJR5La6o
+ LbeUx3E9hBuzCq4diNDTyMZfOUf3gKCtTyYMiqABuW3sUNXQU/Q5zK5vgTEKFKSr
+ QucghweRdR5JRYturwuSSvUcxey6gsBYliLtgSWhnBTeRYPgDD/ZrhSBN/DvPCYR
+ IZRRlsAiBMb9BQk8jf8gvpN96tiFh2vyYeiDD4+Pd/qhZ4DXKlC1mz9TCDH8sYRG
+ nEgmB6wvE7gRhUxmMMYP7upSLxEwT/m2KT1EvmwxhWWFtEbVMNtqMt+KoIshd5QS
+ JMAi0Vn5AoGBAP0jBCeX/uaDGu/tWkZPcRr6H9WXyd7QQ8IVbhlAmq0Efjy1a6yF
+ jk0v96fuOgW4mMKWnNJqX9N5FcTx0ECCsIG0eVtJrH3237Bk+R9/N6Kq6IgHZg3n
+ 14lC0pT5XZRT4KeBt3b8f4hbS3pbFyR5AqMr9WeutPkZ4G5oVilB2GYzAoGBAOYe
+ 7FoaloTagVxqKUd0i6L8nKttxyFGLoQdR4hMAJgkJ07SD0XADVEQsB5DS/mHphXm
+ pzPHFuMZ3MujcnyA4Va0LSBHJ3S9zT0+I8jt4r79TKdPnAz1dEUV6+tcfpYTHYny
+ jJtHuV0EOzp2w7C1L7OBOHqt1soGv/rQXZtrphGdAoGBAJwZYdCAvKGtq4jVF1xQ
+ VPFL2SHALq6GQ6KF0JUl77xODwKk5bdHzM7wi4o1L/ajNSCZ/C8NhfZErxX6AHAn
+ p2z0u/l9Xy92c861FaNEsixPtIFd/qMImzN7z5wqgnibmOfy6A4p+wM9OThEv+qv
+ 7N5ulzDO3a7XND0hfjCG+EldAoGBALOO03tnHaWiXaf/iiAgV0ig9Zpp+SQEgA1E
+ T2mRbDFKnIVLMPGK7pkffVzPw/t7leOm6zZilYA00Ozwp0dwxOODiWaTPr0/0GKG
+ FyQUQoYmXWZ7ntcZu1Sgy0oGDRwK5FScNox/RarHv3NZ8k3ywrq9DJXlCSDwbWJG
+ rZO1RoqdAoGAc1ILheDfDOzUiZVMaM50ul3k4O69RSOLzP7fbH9Tr9a3XfGV+u2x
+ gT8Kt98X70xr7sHGsw/HL/SLY8Dipk1Ra5NrzI9kVMgBl+ute2JgTSwTtTTd4iuS
+ 3fRSCKFdgntkLQTNhdP9BCrqFrwjf6Wv8Vg2fYday43Lwr0WiWwb0kM=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
@@ -335,251 +485,634 @@ metadata:
schema: deckhand/CertificateAuthorityKey/v1
---
data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEowIBAAKCAQEAwHITjRchxnJ4xFVa2nBaYpABaytgypgWFF3HXNXglgJMODY/
+ frLqZRsWKSIgreVVuNT312Qb1EEAlKrFF7w1sDFn8P6GlpPpLJ0O0XEFNEmlAxIa
+ XiQ6HiFgZj1m5YwMoTswpTgUGBt54D0Vl6CEPQIC90IWZHbr0TK+Y3vjWquvBIcu
+ Uv96hrFSSy5N8ZGPg8lhblxGXJNPtiL4zyMxmu6neJ7k2krofBmfYxjpIt+7Ysc4
+ 3PzT7n7KOjpbX8P5XKwkPyV9oY3QEO1TOUd83F2MezcIs9VInvIUpTPc8hl9pEHA
+ jDsbONk4VSnvVFpL8zat786nVYg122DgQfoRAwIDAQABAoIBAGERKQthP4f49TES
+ XGERioVsXUrQ9mE5lOlw473PoxgG0KsJsb0WQWP95Y+ZxyHvKu2vfdMGi4Ljxoc2
+ G3N9Wxcj1GmZ+Ai7UkFOdsrtVtKo0rJZzzLs0uOfsh/fmKbvnO82C7NKNdhzA2Y3
+ aUyxigG7ogNVMjY6RXefQKitNF/mmNd5PFdnYES0bjphxwy/pIKBrG11GddbGNrY
+ ooG1uC9hC2Jw5QuDlmzmyuGlhDuiqr8+YlRTIjpMZ1mivcLFja09Nstz8fQKoDsB
+ gQhCGxmSaSp+47DhrMqT8GbOdxBFujSdZchyw4FgK5DiCdg5hsFO4ZL0LHw8eERL
+ Xw0WaQECgYEA3c1cDc8+J+2emDYrm51dbFqi2TfcRnKGK8fTBO3qwFCsJ2hc/Ads
+ 7FfQFlSAjmZpnLfU8XXnpqtXH6DkRApMBWEydUbDA/ve6j5ayjOAsOAhiWy/RyUI
+ aa/fSSjPVDM3r2n7UWr8Az+y0UrPP859jT6GQyTa01v1lFzJfsRhkH8CgYEA3h3/
+ ms9P4n0oJAj9uqRyNPy+FVqrj06BPkclGZetdjT/4HBw8AnRFUq4n4sfXzAkCpRS
+ 6tH5veLjAckWd7Gh9JSLftNgQ87ZHkhGPJ4ppthxhS/cgn0p0nKpQvoMFAgDrRA1
+ 35iBqkeuW0LAlM106lzK6WphnhIJrKP7+Hj3/X0CgYA7O8KftX7l7uFxyNWwg0AV
+ 1cazt+VNsvv96SmDoX4VyfWPuKFMdTczjuf1bq++V79QqQ9nRJOOwSdNPQx41z8i
+ GKj/BNzDzZnkeK6KXWK62cBbEP2sJEmw39UDlrB3zg3K/MSvI6EVxQceOZpLcfu5
+ or78Y3VFCMP20SjGf++GRQKBgA41HQRp/lIeb1LewFwP6L467G2xPwgLnXi+VEEu
+ 0omdGkDg8FhqSFV0Uhriaz9LdQK4OhWLGM5slNioZCeD1TgvyDx0iNPNh1XIibWW
+ 6FMjxR8f0JsIJoSvkOQX2m3tlU6cmtWSi7i4nQ55VpguDCxxgwkrJNNXlAbW9mcO
+ Vc6BAoGBAM3MI8diBfyxlalPMUg2US22C0jFA7JWWa2EygSEc5eTJWqfforwvdpw
+ WGJHZ9YDWAu8gwdc2t9P2htKYaD651n7OSeYG7kLG/Ssfi5Cr+lQvGpelhoI2ZJa
+ dD0Enq45ZkB1Mm6AgC06gnmfQPnNef+B6Pw1mMIBHpyROTHj5tJo
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-agg-api
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthorityKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEpAIBAAKCAQEAv0X40lxoaOsIoFO88jzukRkSnOMrwolMRb/vt1CgAW00XNYM
+ vqTdY3uV+ITQOHsMu4XlkmBS9Ogi1C4yn0DNJ5xuYOz/q2kSnVR08K8cDS/UrDpW
+ 3XTGr1mdSN8Wfm9QCqmB+f7y4oJLa+5b0v2cUmX6qT5qmN9a2y+0dHSaadnTBdI/
+ qJfsKJVxma6FrURIv+Bvzaj+5MjMirdOLj0usHimmO4WpzoyXhCmeSjIk6ExHFIR
+ hng/YbZmLJUYAxy1AxqzPl8qN3e91ESbMkrvgmZYK+tkEBxhPqtvVe1XJy6Bp82u
+ le3l4WOxbUTXXxtLbMnqrmcOfxK8U8queVy7AwIDAQABAoIBAQCLq5y2f6P+eSIj
+ cQJYIQZUDer5hSk/NOLtS+rQAZ/VatkBsYw86kZ/jo9EmjcyByiVBoFNEemBzMEi
+ D1oH0Fn+wswXGvjXQjLFkBaUakohlvvFiBRGQi+Te+zOeZkDWmUoY/71fqX9oQdS
+ GQwUVf0AbldLnrhYSUEfLQaowzy+bXzbvPbNSpmt3Ew0r19wsmly36yT4y65wtes
+ 8vhNBzRl/Khi4GdPupzQReHyOs1PW73ZS+gV2jwZ0VC4w1RUeEz962sRwrzd8wR0
+ lNXu6NG7v9CVP6p5bmaaasa16Q2KuzjHcBZMNogw6f0Yd3GQswZKZnJ3kWSLe3pZ
+ 4yaMLD2BAoGBAPARqENELqDS4mP3hkX6SPkLnzlv+x76nfFmVxPdZR3p4kWLfCr5
+ 5qvpIewA8b+c3GOhhmrz7BXiOCBETr+Yx6PWEHKEe1DCPoETqbNIy78nLOThtP/H
+ EJlysCs0pxtDjPn7vAQ4A7otW9tm+nirqqEgAlPGfpA6f4vXyeWCOeANAoGBAMv3
+ XSe7RxtGASSm42mNZdEWjIjbEepfgMfiq9yCUVbNr40iSC8JJ3b+CJCSmBi+Zuzd
+ Qe3GJVuh1CYvYOTTtjQ8DxVY17P3PE5B97cFJiv3gPANnQQIjJfnnqbPyzj1ePEE
+ 8x83llq865oZLn/dyFuSIAVT5vkxJViY8iWT1jNPAoGAOszYXcFxekqs0Ldr1+/5
+ t6Y1Fahr5aaU0O+0HFV50t3aYhZMD2quKSUs/dUtYTVWdcC2X7Pm+2UxQhX5A8yz
+ +VkRJjt0yM8K6CqcwiDuZp99y4HNB2kGk88Xfz2iQHdHLGOQJahioVNC0HZkmvHR
+ FS314/cWQNVTMDlmZiSDcHECgYAIRoIGEagh6CY1uXuylaUS5apQBytj6foMohq8
+ +KCaOAAuZrytA98RCd+JFhmLr3X3mEaLgiWT4S39WqDAyAI1flZSVGd0Cszsk+qc
+ B150HDekBblgJ4SkySX7uKSTLAp7JOtEUfoMtmuMtgbX80Skynn4HV5ar+7G+HWi
+ pqvjKwKBgQDkVYbFvYCnI9dDRQfiUeGfhy2i6gY2LJMzseliTE+BuvGRPHYSd1nX
+ RCiatIv+c9EPEsp3VtC3D3RtovYt+W+4Z95oXxz9IE08N5nDVXmdfQLZsvTgHZI0
+ sNyYxiZgXH6oNDMWlrySXVbVRGPakWFbZOK7s6L8N8VSv2XAF3zXug==
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: cnx-api
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthorityKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEpQIBAAKCAQEAuetnhvviXbyA4YWOOjpfo7zEdP/HRRQ9cdL93id9Lg+FDMUo
+ dl1kRObQDUcUs8NU3BAWn027kN73GjAf7GlTONVgMKgvx6iGeGV5TFh0WseBjpuY
+ MFlc2FZ6BeGU76v4/coL1/H3/9egQGBWdMxP44tSd+SyCbm+o4gMxkWbZuZ16r7Y
+ uDQBUYtNRHsc4f8C9F+c2HKpFGDRAL6cc4PbFjXqe2TauhUhQv390/+KjI+S4OJA
+ AtPNXpmlaurnc3dT/dyt3V7WqIH7TLSudmwv1AmeR0Hz60zA2oSYxDsekWuadJbR
+ nSPkoNsIhK8wnK+NkxaEatq32MJ6vR139cyo8wIDAQABAoIBAQCsTL1lG4pt1ISc
+ fGmTDQYVeJuY0nKaUmefVSpw96fLSBbF/vHAwExsjnvB0l4dOqkqSL6uZBuv5vKa
+ En+DWRkHUrgSX8vn/QaiDWicmF08xCgNQaWJKUgiNgJf8O9WLspSaS0Qs+5h7DNX
+ dfCpza878aI7+nYFDV7frvYnydp7QQRkbzwhnj1tjIDmCB/nyQR/mrTuhwCDJIf4
+ 80QfQok9QWOYVTcjSJClPW7xmVeF2ge/iJxERusXkC7USZy8tCRjkobsOtWYIwaA
+ q/SOgWB6zqeKLCdSEmj1IJevaa73q/YH22uKl0NsXTxdH8n4oSGzRoOV+jW9oWA+
+ 9GeQZpQBAoGBAM0n7tw8AqiUyk8O6JRWQaRcYvR/DPnc1oRM2USKK7CCPzmFFC9k
+ sMGUrdjDOIyZYWm2dWnhkDqfXkKno94CNT2TDI+b9yDjEiuadxxXkDdWGsbhMLhM
+ cO6b3dCGUbu2/2BQ1s25/StoocWOzVplxWlQWu6Pr13g4i1gwRhghcC7AoGBAOf/
+ BULSImEM1H1SZf+TqPN2rNuQceUgL1gtk56CieaZlXCmxFSA0wZ3wz8IplAYMrB5
+ 70gu35Aw0eI0VnnnnFEf287ztR9vr1hQGxZTPBN72JOVuz3JPK9qCs7rFx3spxyE
+ hP3K3Hso+sagQBZQXCNdif0Nn5FNj8naQCf+JzEpAoGBALn/f15qhdqDc1vz30dF
+ YKP8IrcaTRBneJFf/wdV4cBYhavHjIJfXqVS/75rV+SY1ql6A79oAlQz0sjJphaM
+ l+poXFYDCC3n0Lx5gY3PkW+qAALZfUtJ+oVKCPOaI5X1llijUewYuIBXj3tGOcXA
+ SRdvA9IPsOWDEmwjsU1BjWIrAoGAVilstsh8ZDbzpCe6IhWhJerpgBJBeqtdag5j
+ SPeKZ86apeAKAqhlt307UmnP+udBzDE9IT3nYhH/oVd21oeikq6WYGI63pYINXBq
+ 3vvC0Cmq4gU2KVhX5X4ozXiaeU6vMfQ1wFxbTpKFsMdLhf4Kekf/O7CXlsuLn5gj
+ Q7csryECgYEAgQN0StUuzBAKjQj8iAIKVcsrYSxQGxd7lI9J8Ub4Wd48Z9mtmevY
+ BeGGfpHJQL/AwBF4o8OZKsY3XV3HT3CfNcMACKfeiDW0oH06Xlgp+tm2omVRORz7
+ oi8xspT1GomGPd3uCT12ww5oBU4w33V/LZ70ESbcdoMPeSvjgm5vS9Q=
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: patroni-replication
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthorityKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEowIBAAKCAQEA5qgWPhLkcPLRANGckEIFv/rnVN9Rb4qwtXl0/qMNWnAQ6OVz
+ FBzajeANo9geiCovrWQ1HOy58761W2AZ9du4qqi0nFP5MNrt77xiM8jEJFtRw3Gc
+ +UgmeW+oywDRwFksIieZpAKFLS9hT3BXnk+KuQKk0bcqQdpn3brF5OV6b49D+c5h
+ FTLdfT0v8tQbruOCwgSPituTw9HcKHbhURGU4pgB+smlB1BaFnFRrJ8D0sP5Gltn
+ nfqxx7WpvSR9/eTjnNp5PIZ6vrffPiU6RlKgefTJURq/pn/4tvkGKtoSNqfh+q2m
+ t1hqaK2zkl+QL19/Of+3JknFRjhjIAQPWNBeqwIDAQABAoIBAFoyiOAlSyfQDGMh
+ lPPknZMBbs0FtzbDKW8N2+5nnKUtBa/Naj8HOYAZibv0m5vrw1EuyoZRHDZw8UKW
+ RhCap5A1AMvRGrU8J6eEJ3LQo8MD4ulm2FezGziJrZwU6fEp7dQ9YBt+0M1mpcsG
+ x3yk5j6LBiDsW5385nkSvKhSBJry0Sba+oHcF22dxBDs8lWyEtayVJ4TR2M2egU6
+ cP+KZ38eu0rlHXIum2E17RloguSCJtZVrSoArbav9e0lyGS3aK44infoc0C8mE7U
+ LpgO4cW/DeML/GUgAfucr6HFe9UUeYl94f3BSm95JUlh9iZJp6zWbkHQcDcnKfBJ
+ IO3jD8ECgYEA+c3UbFQsj8hMu5csyjXeGIJHfARB9eXOJbBcTnoKoOoNz7sjS55B
+ Rc2pmbZ/b0ZSsO7IskEtbLwFfy+w4yUKqMvqGYvGBF+cgNmIIu4EBi+UkSKNYrQw
+ BYEvct05XyGyo6c9xjJwtx5hTZhPABdG1IPFJW/lU2hrHl3Cm6mqfhMCgYEA7GCt
+ bRgQPWM3euJL02JcomFAD1OJda+vwJS/c3RXUJMHULgS8nM1D+QTxbaJa+ciA+FK
+ CG9SugELBU1dVXU+TmsePJq07GP7rEYKzAZhw3ByKdtDuqxDz+637Bn+OKFSRomL
+ LB6+dqs8kWyMCFH0fJ4IwLLZaqNuj66vuBlkUAkCgYBPST4v9/OA22FHdS8ZK0nH
+ 26nWuf85jewFWFmj6uZutnsVwN7uBFfRUPqQuDTwW5CpadC3iypgxbi06q0pGzur
+ 4bT20L9T6gjheKnV9FfAot9zxVS8zFYlmSA3Q/IOuMJbYRyhSKcv5+uYVkxUyg6I
+ Kx6qyD4wYAcHx1iaUZq0kwKBgFok8F53W9IdYU4SuPoPO+aNEeIGaJih/HOEBpMg
+ HiBTQentmQQvHWBHCadP2o504cr7AsG+upzGww4tl9d8U9uSDEDueurfol3rhDiU
+ gnoHCvKddPHeuim1Dx0SOJoeI4NU9udHfjlBSmLnM2wE3SkdF5dtXW7GjuZqpwad
+ YF0JAoGBAPC11Ge71afw3Jy9O6a3z03pyxy7sxYJRDaV5/hFeHUN8zEwcc1ulE7T
+ 72pYroN7ScMuCqr3ujtTv3JFtK/L4FPgdGm2nDktPQnhnlMTm2ij8+O2AyPfv6BO
+ dhj/79JL9J5OWRFuHs0sZ4BnVEsIjk7O0gqE0od06H4Uko2YhwMS
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: keystone-webhook
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthorityKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEoQIBAAKCAQEAusybwboDwcJN5SqsOn59Bb8HKUJ2Jq72LNRvpeDXdlcRT1Ee
+ eIaw72bYCcVMZRGwpRC4uMnZ/6aHEv6/CRn/5qpJb9U738DUhYqL9BI8frvmUt7x
+ 2liJVccooAH2C+4zBkManfHAgakWJtqbvheeh9M4QXqFBEa2LhUfyozx+lqF6t+c
+ ESI4dWsyd05TM8rWPZx2myBGVHqqzgceVgLyYqRWZsfM7sMZvccremIeRwWWE8jg
+ mh9njYPmgG3Umfptu5b/lbaVeFaqw/swGzukiLXuTzKMel5iet+nXBDtF7Rz80+V
+ eFFlE6vRhyn74kdv84GAuCVejNBHoYl935i8zwIDAQABAoIBABLlvCQfE144r/St
+ GntYbIF2T90mshk7vf/PBfR8CJAaQtAJXtHGnoO5ncVvRkk7PumUBXv8P6eTSzrq
+ tpzPGopVU9SSd9otAdL4ryvj5GbVz3k2wLTcHBinaz60tBWE5XiOtVShLl5voqQP
+ nY3fidQn1Bsbr/U8yhVjYbH2DEzNSz0emID7+cq53Vqbufuq0J3sNhagdV0FrHMh
+ izU1SftI5+r71M32XLhdrZlXNCjqJbNfwZcwL02aVhwewyzvTPgeGCrfCc8fIJH/
+ twgt7YrBYrd9aW7+iSGo/wmSBXUnSz27d647P4Myq8PvhpNxfq4oY93lOCaByJdf
+ CSMnw9ECgYEA63NSTlQw8HCF/4xJ6D3gL09dMwqv/cOLCrdfgC2fTdW8qmSKk602
+ 8SOnBn1TWGYD7I27ePFDkCqZFu3p3bo4PcSMjf+149zFJaWOiWwaY8QXBC8ZHlij
+ ko7K0e7IZ7Rq/XOlIV9ajBXyeJNUijhWQh4U/bg9jZcaXx3l2X8gqssCgYEAyxpF
+ WEHAIuyVMORVjuS97ZAUBIQ3Sr+d8SS1vKHr+cjMDmW23FzXCk1Fhcn7LVsCfOf+
+ il/QFY99ZPwMSw+K0ijPR06F9RiPI08Qovs8hiqtESrUH7ujy1u+UKfbIZFwNucy
+ ZEcvniDucN5khYznIpKBhBHbYZzADzyHlwJzoY0CgYAI5TZ61xtyOg4V9YrlR1Es
+ +GahAwpbIAQkx4DIKvEV07lpBptlsOmeeqZYzGtVr6T+TuyCSTswOyvFff+T7PEr
+ BD37L2oDzdd08KhN8NOeaU4lTlI4n0iuxM5M2CSiJmLUaIYYmK2nFT0v6QEMp8w6
+ e0B3xXot20OXzF1etjrZuQKBgQCCFsSd4BdqBzEUDNyEVx0T4boAnpMvzIYko8fI
+ F8qmxid1fU7f3JNcJNxH8nRwu59fU9Vk2jPU64B8wzg4h676J2uEl9YTg/SCwCy+
+ x78fjIwnt9AAt1YVdiDzVmB0IszGTdWoBzSHyz4Oi1PFete8/Cv65Nkor5cQ60tJ
+ vSdFLQJ/Mk36nCuOYK/5OUH5g0UW5jAuaRZEI/cCSWIks4ibpB6KaVqOm+mWmnyu
+ 7uv3p2BKrJJUuxeLiyKY5OhUF6hzNneTRYgQWoR0KUHJ8PTj7KgQ9OI+FStQI2SY
+ trLw9J52hfQtzjYjYiO+CDC/WT2Ty2/wR44hfSmISPqZU49ecw==
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: apiserver-webhook
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthorityKey/v1
+---
+data: |
-----BEGIN CERTIFICATE-----
- MIID8jCCAtqgAwIBAgIUbLHPFiOLbtIAvW2V084HXL5sV+4wDQYJKoZIhvcNAQEL
- BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMBQxEjAQBgNVBAMTCWFwaXNl
- cnZlcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMPvfaW1wuCRZjD7
- rhhx9Fi6FA8jgKaYYc7r9iLSRrYb61sB0LmYilB+sK/ZfBFT5WOecwlOBCcd2q4B
- /fQs+1wibqDcMVWzyylemcXZPmXp3mZL0I6NXS2pKIS2DOxDvFvfQ6mq83rC3EEZ
- MayHNHCychpxFIROWK9OYfm5jKkYXfUZkU7n55vMRkMQvKWRPbfWZ7MfIu0UYZ97
- q6rdqZyReCdzuD/6y4sf3ZVDoH0sZwi4oaMxDG7dRtQAIQa6AJWTcWCIW62acxqz
- yCNeDRHc5rOvDNbpqN0+rUHtXlpiUgkd9XusFtLnt16/U2HYGkSGoIkULI+Vt9gE
- O+8uuesCAwEAAaOCASQwggEgMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggr
- BgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUiWtOJRVy
- yVlJNX/Vf8p8X0cBFJMwHwYDVR0jBBgwFoAUoe5TcW1oGUyeiRRNLcUrYBysY8Mw
- gaAGA1UdEQSBmDCBlYIJbG9jYWxob3N0ggprdWJlcm5ldGVzghJrdWJlcm5ldGVz
- LmRlZmF1bHSCFmt1YmVybmV0ZXMuZGVmYXVsdC5zdmOCHmt1YmVybmV0ZXMuZGVm
- YXVsdC5zdmMuY2x1c3RlcoIka3ViZXJuZXRlcy5kZWZhdWx0LnN2Yy5jbHVzdGVy
- LmxvY2FshwR/AAABhwQKYAABMA0GCSqGSIb3DQEBCwUAA4IBAQCx+PmFPP7Ja0zF
- dsBIJ1KFG9JN8Yxcn9afDTC4FIjs42hBejTcPZBGvZ/F58jp9N3apeFPgPRYAUO2
- V6Y+Lr+Qpt0dGqsEEYfiPsMVpok6lbADyn+otBcb/51AAGFAC5cGYXq7xLsFpqrr
- B6OZUYztTMcprTuNGL5u+oAhD2Uhj0xb7aQH0DhwB7A9Tmd9lWNjmGJGyCzc8uLq
- 31z3kwAKiCytLeLgNdFfEZI7vJz3leVZTNZ51bkCwrPeYKg2b/wFQJ7B1qd/Klh6
- QQzu30o927tnvP3OzKa30MqHPzMWtrLTbgblQ4vw6UQH5dgcwbNCLQcx+SawOpBI
- T3LkeaTB
+ MIIERzCCAy+gAwIBAgIUTiOucDzz7CWd/rpgmlVKcyYIjKgwDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowIjEgMB4GA1UEAxMX
+ a3ViZXJuZXRlcy1ldGNkLWdlbmVzaXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
+ ggEKAoIBAQCVmIec07tCPQ213BN3L7hyCTsgXt9KZvzawrRO89I3Wa4rWQ4p3XST
+ rXfjx/6vHwFPZCY2lE1JVNXqybXY4lX+FSMSnY4if5+tk6Y2iiW083niYA1wgQHz
+ olHoG9BW6ioCnHEj6u9EFxTwGe8yLhNJleUOKxx/Yz089HuUDWjqI3d+w8KwAZA8
+ 1Hpie6v3zOIy8faJIMgB3HlijgJ1kFgKHf0SzDXOhqSKQ5GyaH0WgbGLyDYHSoaa
+ cu9vFF57b/qsRJqe/0VyAkWceShpJqnLiIJcAMo2LZzprZuXR/V764LsrdeN+7Zq
+ 4hj4RKH2r7BqLZrwhC5/7rVGN461MXxhAgMBAAGjggFmMIIBYjAOBgNVHQ8BAf8E
+ BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC
+ MAAwHQYDVR0OBBYEFDVD0lwM87tLRTqRAZhLVkqJyQEVMB8GA1UdIwQYMBaAFD8z
+ pPdqsSCn8qkyxyZlmdTStRKLMIHiBgNVHREEgdowgdeCCWxvY2FsaG9zdIILcG9k
+ MTUtbm9kZTGCD2t1YmVybmV0ZXMtZXRjZIIba3ViZXJuZXRlcy1ldGNkLmt1YmUt
+ c3lzdGVtgh9rdWJlcm5ldGVzLWV0Y2Qua3ViZS1zeXN0ZW0uc3ZjgidrdWJlcm5l
+ dGVzLWV0Y2Qua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXKCLWt1YmVybmV0ZXMtZXRj
+ ZC5rdWJlLXN5c3RlbS5zdmMuY2x1c3Rlci5sb2NhbIcEfwAAAYcECmAAAocECgqW
+ FYcECgqYFTANBgkqhkiG9w0BAQsFAAOCAQEAzy9J5UsQiLXdctzW/XAs139qHaUn
+ lUc3vwMBeGEpftEmYVdWldUfjszwxSZ1DsAeSj2rVBmIqj80oynaFzpDHvBTcwo4
+ PREyUYJvGPrYfbx/9pO/qGq0ZF3jGUY95u4p/qNtTsuxqm/xI9rWQXA6Hw6eDlkN
+ VDf4KylV7/QpEaB8RH2lxzfqTygb5ngBKdbQ/O9d7rqm1UuoLthTFShpgTJpgiE5
+ jtpskCOBNtL0bN5rOCRuaNJc9b2ule03zzpzp30ZwYqE2Ms1tkD1pLSfTe+NHypE
+ CfAlYMDOy3yX+RQqC+4+c6ifFd4k63vXB38bYTNUXSBRxoW20ZMgfe4ciQ==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: apiserver
+ name: kubernetes-etcd-genesis
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkDCCAnigAwIBAgIUeI3p1Y8Y1g15ej3p8SsfORRKBkcwDQYJKoZIhvcNAQEL
- BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMDkxFTATBgNVBAoTDHN5c3Rl
- bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTEwggEiMA0G
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC0shawhklpXufNIwgyrYaQpUGwuFLi
- MuWKvd2c2UwcPYnkFZVnc1cCI+WNKKvxym9K9olVROIbFJACwnCy3s2O8vZEowq4
- F6mJ2ocAzGoxHp9t3Ce4k7R3t4Miegpg7sIozG3iXRw6VRZ9aq/hICnwjf95DXqT
- gNrf3yZAs9B5Y8n62or/G/uo57kI3b2FasdC6Hqx79GTRwZw+MPrIYHOqqVMfCSA
- /LucQo6/KGF9l1zrW1Plj5pS9V+XWGm5neDWQ4n/eqpQCE3Lmu9Lyezi+NixTR8Z
- G3zHK7qXozCfflb5tT48ko4MIYT4sXYcwPIh9EReqxbJGpIpF3h7+OhfAgMBAAGj
- gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
- BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSAvYcbSKcGR0LQ2qgmeFBdQHrl
- 8zAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzAcBgNVHREEFTATggtw
- b2QxNS1ub2RlMYcECgqYFTANBgkqhkiG9w0BAQsFAAOCAQEAiuyC6oyawIfh4MOm
- HgHeIqsJU2k1Pi+ZQTzT5rkJKWP5LmWd1kIJLqCjm819S9OKRMn1Vgc+fpbdCe7e
- +oYV0kaiJAkyTkwDEy44yemHz/iixwrMR9U7KLmOJV5xZyj0sTMSn0FfEo2YANA9
- nz/AEHOAkvLUiYQBhucLZ5lpEy8j3sx7WoxVeYXz6wNUwH+7ACvq4ZkHDCGmu3LN
- VLB9GAFLtzjsk+NiG9Sp36OCpbDf4Hbjm7VRdn7CtsrBTQRjpbVtwng8duZaEEQ4
- OmCrZFQhCkRMKzmV4CfsBjUyhQ6ZKGxssfGzWZ9SZ4JKpRBJ27ILW17PrK1IUJ1a
- O7iJkg==
+ MIIESzCCAzOgAwIBAgIUK60z9+7FrsG8mAxGOFU8Bj0PrK0wDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowJjEkMCIGA1UEAxMb
+ a3ViZXJuZXRlcy1ldGNkLXBvZDE1LW5vZGUxMIIBIjANBgkqhkiG9w0BAQEFAAOC
+ AQ8AMIIBCgKCAQEArRQ7FMe/7r0+tuCsJlEksxBnEJ7zYWsmiJRcy7dIO1yx5kdZ
+ qVmyCLXpiQruaDHdbZdZAZ6Sw26IkJ7tozpK3jWjfMSCXRWI/EJ8Tl+8mEJmKfk1
+ q15itACVTUvqeZ8EqpDX+cNogMkwYPElw1p06J5XgspxZ4DCv4kkO2jCZuHfMoIX
+ kiYaVoFMRymiE9J1SHS77MHCQe/19FMSHUPiESNS94kaUWCrjlYQ0T6J8ANWwZFM
+ LJBYReEUDUmY0XBDy85FrEpbu4h8z7klLDJPvSNeE4Sv7Umnf2RY/UD+sR4rNGVd
+ Jtgo96ulCrWEQHn3A7JLiE/epM1lZodzT77kkQIDAQABo4IBZjCCAWIwDgYDVR0P
+ AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
+ Af8EAjAAMB0GA1UdDgQWBBTdaF8dBjtZLioFFaYpZDiqmyx9azAfBgNVHSMEGDAW
+ gBQ/M6T3arEgp/KpMscmZZnU0rUSizCB4gYDVR0RBIHaMIHXgglsb2NhbGhvc3SC
+ C3BvZDE1LW5vZGUxgg9rdWJlcm5ldGVzLWV0Y2SCG2t1YmVybmV0ZXMtZXRjZC5r
+ dWJlLXN5c3RlbYIfa3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Y4Ina3Vi
+ ZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5jbHVzdGVygi1rdWJlcm5ldGVz
+ LWV0Y2Qua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXIubG9jYWyHBH8AAAGHBApgAAKH
+ BAoKlhWHBAoKmBUwDQYJKoZIhvcNAQELBQADggEBAHT4/dhBtZIqugpfxrlu44Eb
+ 6Ik7T+aUog6iJ7BPKNUuTY9UbKCvy0rK2W7fB7ymcEHAQwobzGxCJilNqEzcDMTE
+ 8SGutMJQqrvaLFYIKPT7+mcU3p7rcXyN92TbVVEuz4JyM55r7MhpqZPPrmp7peZ2
+ K09uLjEhIj8nHNfyDW9nWow+EBJ9cMycV9bOOjo0sFk0/4qc3wwNtcl89odExFeX
+ hS9yT4yt/RvDcBILh117mJc0FEWawqMYrEUWced/3kv52JN+5veih7qn8toXoegh
+ 0yzabqSdzUgEpMMU5uR3xYLRGKdMpoqxakQXzX4FyQwUtGiIPzhNcfdC5IRAlVY=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-genesis
+ name: kubernetes-etcd-master-0
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkDCCAnigAwIBAgIUHPN+DEQRbkDQ6xkG/buFZ/NOAT0wDQYJKoZIhvcNAQEL
- BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMDkxFTATBgNVBAoTDHN5c3Rl
- bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTEwggEiMA0G
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCyittkIOWBVR4mzeKjPTXocjWSzseQ
- LmXi4mImf6UkUEDGbb3JxGZW7OQ7R1M7QmvpA7Hesmm2ywLignGyRC199N3BFWQO
- 3X/yNlVLwMbFhFtsl1haI0BFGDlwgjOr7UcL2DfAkuunjw9sSTF8ZOTMkTmbxnN7
- bEThev0PWEILEJjdLQm/8BYL4uXoHrbNYX2C8taCn2R9E0eUVjZINMDHvvbQhRek
- B3ys+nO44Y3kPkZjm4MNz6/DdDsrOqqDIwctYVn63kH0qsWHonRkpXnpEmFeV5sE
- GGuMe463XvLIHQG0g/KeUOvVaNK9Yp7PU1kLDa687rXi84OYbcLDVHYjAgMBAAGj
- gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
- BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQR+Vh0QZthupymCE6w/4R7TqxX
- fjAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzAcBgNVHREEFTATggtw
- b2QxNS1ub2RlMYcECgqYFTANBgkqhkiG9w0BAQsFAAOCAQEAFtxyTRbfi8LIMDQT
- K5pek8o1Xrs/P9tSD5myJjaS4grAayPd481LsfeD2hk+4lymZr/ENJPN6dEvqrCH
- ucO0FwrMc51+UhqbXilRtnjylS7Dl1nul137uC1ocA4YPVM9wiTEiDb8SK+p0ymb
- oBK+eU+kloC/NRBRFH7OGFM05ujSqgoSbVEOtqeNftzS1ezluvhxXq2m8DQ8PdBx
- 8vgMXHmQHwNkMHl8MiwMyznVBgp4JHohGLYGT6CnIdT5z4FcBJ1MHTic1ygAemvl
- Q4TeCLboweXJa27ne85HcLZ2GUmAKi5sDk/BiWJ1Hha9Hai4KnU7CJHrepEOsQXz
- P390XQ==
+ MIIESzCCAzOgAwIBAgIUR62LLqygPPw+L70fzOJ/S7XkKQcwDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowJjEkMCIGA1UEAxMb
+ a3ViZXJuZXRlcy1ldGNkLXBvZDE1LW5vZGUyMIIBIjANBgkqhkiG9w0BAQEFAAOC
+ AQ8AMIIBCgKCAQEAqfV8ltpEPF3lIM9wHn/3k00dgtQ9dC2smg4Oei2GLIe/DQqQ
+ HNOAbEvmP/O51Rhxj69OsZhj4ufK4v/vCvGjdR40x0qYKT4xmmGK6yZ6RFhzSb1d
+ qqzKpLKlimG9TXRSSji8mrZ/LIgK9mSYB9+rt2pgXBS5GKyKxCyWFGHNE4FR+Q+Y
+ 4vgIChowjb5kg3wgiWq35NQ38bN7TzdR+JCIdMnc6BiGzBNHYVapB3bgUtUYoFEj
+ NWXJD6Mqqp0vgQvv3B4P34vvGTO75Vh17o/axezTHlDI03pJmYwNF57xrXPGGjc5
+ XMKZMj8GEhBo73wCixxKB46xLRJA7o7aqQZZswIDAQABo4IBZjCCAWIwDgYDVR0P
+ AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
+ Af8EAjAAMB0GA1UdDgQWBBTzbVKfcBD84vJ2aj6RiueJDUE+YTAfBgNVHSMEGDAW
+ gBQ/M6T3arEgp/KpMscmZZnU0rUSizCB4gYDVR0RBIHaMIHXgglsb2NhbGhvc3SC
+ C3BvZDE1LW5vZGUygg9rdWJlcm5ldGVzLWV0Y2SCG2t1YmVybmV0ZXMtZXRjZC5r
+ dWJlLXN5c3RlbYIfa3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Y4Ina3Vi
+ ZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5jbHVzdGVygi1rdWJlcm5ldGVz
+ LWV0Y2Qua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXIubG9jYWyHBH8AAAGHBApgAAKH
+ BAoKlhaHBAoKmBYwDQYJKoZIhvcNAQELBQADggEBACyjqZXaTxrJgDnd4yK/jAoO
+ 52ZbdVYvH6g6httAWoa0abjbzZZIQYgzycbgOufGb0On+Xlcv0gx0iI/w+XvVcM1
+ 8EDAEThDtScbgSWnZHCpl64SNDut+P1vR+pFsdI1rOOwfX9g7VIP+jieY7DrJE5U
+ BnEbUK2+OsJoODxkbpOC2PnR/HDlHkSAWVh0KOyM+tf2JaWK7yjmiPmy7doPzMTr
+ vG9AicqmMrNwmFaBXoPCE0BcIIBYqDeNhXF2qLxWUisXIjLueLCaKjqf4LumFCRD
+ H3n2ClT8QIjMMMiNt24z03spNmqcxWhAd7LIkdLjhlzE1bvaFC5fNeH0bxq+Bs4=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node1
+ name: kubernetes-etcd-master-1
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkDCCAnigAwIBAgIUJJsGBbG+BVMzt+Zn6+FJEAhKyLIwDQYJKoZIhvcNAQEL
- BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMDkxFTATBgNVBAoTDHN5c3Rl
- bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTIwggEiMA0G
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDs4LEuWbyPOWbhCLNmV//TnJPpYirp
- wzqK9FBq+R7+Pys8Kq7p6ztVY9dQ86WLLzcU4ji+m65KcjxgUVZh+NQYmvVWbAHh
- V5AMQ1R3SfLYJSWKJiSiVtklvJa7QeZ3q0CisD4sFb6TwsiMTVOZLItGArOZuwGY
- PNmzj5z/16D+FGLAogRmD4zcfroZ4sVaedHYZyi5o4Cud8HHibHpfUZhc5PB6P2W
- Nb6HoWQiV1SEycjZqh/tVFDTECBhgvSmn570uW7vpIURD/5voH0yggeEQbAgZwbG
- Btc7hcjkbmaGlAlyGlH/Xn2jf0uCnGKoHzQzY3WXh9i2JnkyCme2bZfTAgMBAAGj
- gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
- BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSSkEkRzaFIm1Ediw4X00f5VeHB
- BDAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzAcBgNVHREEFTATggtw
- b2QxNS1ub2RlMocECgqYFjANBgkqhkiG9w0BAQsFAAOCAQEAhgMQmXZ7RwDnkhD/
- Y+MbfDASKHaFUvnyc7a+1q/2RLKbpWc+SoQLaUrHY0gG6uyJamAIoI4D8ZeXyHrA
- 2/50ulYUQ0DDXKQD9YbPHTTBq9Bd9dBaRnES/t5k6nf0VbCmXp1nfHXsBWmIfczg
- GRCBB6YT2RObfytzHBojQZkm70gZh48KJfkn21c8K8cpoYkofvCZkJxd6aArbI0I
- 8NK0gTp9IJ13GieE7KvFap4rvIXrUuB1kvEMdxlwYJ2xyDIKzHKR/ltYy1xeHGH2
- KivJdMgLDS+GVrWuFj5pNwDB/kK6CTTWvdcH1/klfplBIZs0O81mo4rRWOWQQgKs
- uq35EQ==
+ MIIESzCCAzOgAwIBAgIUaDYSCRO/ALyMbV780ZLqh0V2pa8wDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowJjEkMCIGA1UEAxMb
+ a3ViZXJuZXRlcy1ldGNkLXBvZDE1LW5vZGUzMIIBIjANBgkqhkiG9w0BAQEFAAOC
+ AQ8AMIIBCgKCAQEA0brYiHSbyWWA6+bgWzbXwR3PJDdQ7KCYxwHwxDaxBlerYi3B
+ jp4JQXi/5jk0kAFZxexm2OngP820wXpsQgW97VhBYpliWIM7c2zECCktAfLoXyu1
+ 21pyXNTNc8RunAm+VzgQHEf6dwt4W4KlTPxRhc2Rl1V26Kj9LaCfJQsTILnlbZCK
+ UmVWaw0oeXgwq/D5OIXXFgsLJi1GvR9cXSYyzBYTc9OqgMswwaXi/fqUG4u170R3
+ oej+jZM9gBuGHs69+8HWZfAA7jWXnUpbZumGUAA6KJcl7STb98sH7bTsf23l9S9A
+ iocVrUtMCMBr39npV5coI6oMWpAOVUOe/qRNBQIDAQABo4IBZjCCAWIwDgYDVR0P
+ AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
+ Af8EAjAAMB0GA1UdDgQWBBQYNt3QViuVHLYNTbp1SznsDANZizAfBgNVHSMEGDAW
+ gBQ/M6T3arEgp/KpMscmZZnU0rUSizCB4gYDVR0RBIHaMIHXgglsb2NhbGhvc3SC
+ C3BvZDE1LW5vZGUzgg9rdWJlcm5ldGVzLWV0Y2SCG2t1YmVybmV0ZXMtZXRjZC5r
+ dWJlLXN5c3RlbYIfa3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Y4Ina3Vi
+ ZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5jbHVzdGVygi1rdWJlcm5ldGVz
+ LWV0Y2Qua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXIubG9jYWyHBH8AAAGHBApgAAKH
+ BAoKlheHBAoKmBcwDQYJKoZIhvcNAQELBQADggEBACRrf9P2uM9nqqwie1e6St85
+ LD3X4TQJf0lD8qBznVT1yfw8URJTLZ2M5/IQs8WUp1u0i97DBaQVLK4fWLX9Kecd
+ Fxbbzw4/1cUt8f7tulA0PH9wt6hAHuRBLQm9iWwVhU95NOo+3YIFOPM5q2oU9iQh
+ izLUms9QBOHLiH6FQKnsQeJnFP215g95meM+u+tKXLAoSUfDD1I7/NDbTGSEVRuH
+ Ma0fbRuHiQNhViO1+klHnkzPHxMDc0J4+q8g0WuBcioXGBStORN/h5PM9kTRWAMV
+ M1sJHzU/5nOcdJ7DlolAlJQbDIpn5R37hFyS4PdnRC9adS5KnycJ3q0dcX3QvNc=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node2
+ name: kubernetes-etcd-master-2
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkDCCAnigAwIBAgIUAQ6H7jXX+Sfnj1DQTXDP8ig5hvgwDQYJKoZIhvcNAQEL
- BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMDkxFTATBgNVBAoTDHN5c3Rl
- bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTMwggEiMA0G
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCkAXgYtT4lJs37wT7kEDefTHNitPPI
- aUn9it2i1fjpUslDse+xZTZv7gXm9U05ZYaBqMJuhzpdY0XuRk66ppIh+POayT36
- v6SdlytteE7QiRI+Sp7P6n7zYbRV/4FIJGH3NlUaWJu+UAEVsuZ3YfJljmg/uksr
- slghDTW96xaszhynE40r0b37X8iTMXrltitfOex65t27BaOENQ3RaBuaFAXJeuk6
- oYU+tPByFsFsxNNFqTmhhwfd/AaKKNRiEc5MEBd+VYrSSe3/UhKGcBI7o0U3s+T5
- 2Ne6fL05DnUYMT/SSnvGqWJK2CCPsmPsF+OlTSZ0A9D2CeiMyb1fMv8TAgMBAAGj
- gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
- BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQbQ6Q+lKgIFD8hn4Ya4ALomzZB
- kzAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzAcBgNVHREEFTATggtw
- b2QxNS1ub2RlM4cECgqYFzANBgkqhkiG9w0BAQsFAAOCAQEAdfesLgCg8Yh+6XDj
- Ft+0mxuWBGjODNiVtQRU64Zt4u/jqxVAOyw7Ldz87LjqecFOaH78LD3fTvn7z/9j
- sefWFaUmuYOxqPSBAO4qI60ll6KfP1uDtBozvo0kNR3/lVI7Aak84ig1tDEHWMSG
- mBGdSTYi4tsaJU3g1OOgTVrTxnsd+hZRBLFaoEJCa9kOT5Fmsm6IqLOgnd35t6Xw
- vYd3qFEbTj0PeD2HrttemLtuiqWBHRH2pB86mHXPBOqJzqLVBZ3n5lUE1GxzXucu
- PUYsCA5j7EBPPwSc8saZWVH4i2N/egohB2mGkmFXgjBB+ROG+I74oZGOZskNFxyP
- siHsNQ==
+ MIIDUDCCAjigAwIBAgIUZsvupPn9wnVanPK6bpz+SGTFpkAwDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowFDESMBAGA1UEAxMJ
+ YXBpc2VydmVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzAKkOG/c
+ PnrfWGQD5AtQp1Mt1vL8s1+kkXTI3bVhRbxIJdaOGrFs2HlUc3NSv5n//B3naiTN
+ r/5vogffqyCOcmg9JZFYeeeMaZMx3/UZXOcm6qzNqCL/VCCaHLYOvFS7XbnUedTC
+ vHQ2u5hkvThPWeIFfv56JNfzZxe3YiCQ/nzZbn+LShwfJ7E/+ZvQAxH7+Bvg4GOx
+ W0ABEktdtJNMvkOjArsiSXMbZtg2VolCpGSU7eEREkWczZQEPR0p1j1UKzZqIoPn
+ rmErlWvtxT5z0NfDOk6q15MuysBYVN6tXScWvKUXzCnJsKdO4hMw/gt2hLVBriNy
+ jbkxHJ7SOGrvBwIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYI
+ KwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFFvzhQcW
+ XTdjSZl4hXIcIDEK1pp0MB8GA1UdIwQYMBaAFD8zpPdqsSCn8qkyxyZlmdTStRKL
+ MA0GCSqGSIb3DQEBCwUAA4IBAQCxNkW49CLCqY+xRFcg4Hd8wdTky6AEAmZodgzW
+ wA5yUdK6qSr9jj/KRxweZy7H0fGs1cNBNNgK9hHehuJN7khu2xS1BxsMNmJjK92B
+ jUpUIT0tvsOcSJU9ozjxRmP3++TBcTMIgBpK/WNS5ox2PWxgZLNt2vspnr5MedGi
+ 3UBx0eY3gr6liZeI2DlBtiU/o1WBPh5hluX+0T7I3DwYGOPn5pumc4LVVsFACL55
+ zCRu/Wy0rQBOvaBr+2YDyrZcUyQcy/myNFJz2XG9rgVLzQ+YqXcrrsKM8KpsNLUP
+ mtUXrKgtu3nOZYEDWc+kx3AHsGg1ygz+yhpjPPQXP5dR8mpF
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node3
+ name: apiserver-etcd
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkDCCAnigAwIBAgIUHiDObQiv3pMY1koopRzis/CUhogwDQYJKoZIhvcNAQEL
+ MIIDTTCCAjWgAwIBAgIUdMsHM2z163cGV9I2KsFt9ga4998wDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowETEPMA0GA1UEAxMG
+ YW5jaG9yMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAshTgCyUlpo1z
+ j9ZT9GRXMBRYRVXHquKHMcevA7ePZPXHTsGOHAcWuEjWdIH4ZxGkxAsQRcnCgPZv
+ Odoo093L4j7Zl0Jpud0kiQ3pvCKXGi7biP+hqiYjJ+YlhoTD6IJrpBv6dC9hX2EF
+ qzTZbqmd7wEH9/DrBNwwFY/l03qJxebVys+HhLSpvZKb3xdBa4abz1Yczs5Jf1C2
+ hCD3+zJ1+epaTy0pIzI/9Cgn/p6iRPZQ5r2CxvFWNsVInPiXu57ALTbcIYkkP3J0
+ dlog9cp7psuGSaUNdbZGvIFSeHjmMLBgmDfcTfbQMHg7x+AtTmfcLA1HgM9EO1Cb
+ Ck7tSu5BVQIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYB
+ BQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFIGUGQtMKIoT
+ K2KNcs3kYJB9JWTYMB8GA1UdIwQYMBaAFD8zpPdqsSCn8qkyxyZlmdTStRKLMA0G
+ CSqGSIb3DQEBCwUAA4IBAQDC/ITaeCZ+5Hd/77yhBbX1b3OQflUl3DaFk39r4jEa
+ Y6ZG8tc8SgSc5a/YWFTqYyibfHtaHcpDkxsbiYEGvDQUQuPrU/3RFIUUngWWx+be
+ tHFVXRdqm6xvzMCfb60IheyWDlQkSPPRS6rVjMlwLs+Xk6KsLeFkj4nH+G5XWKR/
+ nrsY7zQzpeLygUtezxD3QAgKX0E+mRr9FEf1vJbFloRkjZ19hIPAa6IuDx53GOhW
+ 7coi4zTihPltxsbanL8GWdX3Se0e05h4LfYRKIqPmR6HUumaGu9fss7o443NoNkh
+ 3I43FqjSlGfF57nT+0PhYsa1S1sTmwhGsSDAXQFMacvJ
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-etcd-anchor
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDWDCCAkCgAwIBAgIUJZX6Z5kqoYgtk9HVZkmKQSxFthgwDQYJKoZIhvcNAQEL
+ BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
+ dGNkMB4XDTIwMDkxNTAwMTYwMFoXDTIxMDkxNTAwMTYwMFowHDEaMBgGA1UEAwwR
+ YXBpc2VydmVyX3dlYmhvb2swggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
+ AQDlPj1WvEGNzNQg9WbJll/zS8j9joRb/yTanyv7cKPxTxjOhDDhAi42ZTL1i3ce
+ nzIQ/RUTh2cq/vjnYkYsUG1A5b7qOR8hbqP13ht556GU6qC89MxOXlHIQ/DO83xk
+ eLryE5Ma8TTZy5HCMuBedxfOaKY+tKrZDI1iQnqa/uiXX7xhPEk5WTm2Z/RgT/Df
+ 24h4Bnk3VCofYWIpvcBvFJ51YAAFWq8TJ6wuKM5Mm6Bc3vOJJCWqHzSJbrWnJr8V
+ kBij/d58lGnGo5Q5fjhhYatHFch8LhL+xJZke0jZT4sTq8B77bIhyDEfFqZS0uuS
+ oS80GMHUexkIAMgaQXu1La0bAgMBAAGjfzB9MA4GA1UdDwEB/wQEAwIFoDAdBgNV
+ HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E
+ FgQUbaxFkioG8aCDSt4Cm+2EBKw4cjowHwYDVR0jBBgwFoAUPzOk92qxIKfyqTLH
+ JmWZ1NK1EoswDQYJKoZIhvcNAQELBQADggEBAAtUbcNIuDr3cc+g9OasIn78bIA7
+ zbrIsMFiUwvCSyyAJzDYT+aBaGx9lDacGImp+abfTy9LqhiPVnvMh031ITxk7uHo
+ dJwAVoPX6wNTMBW1cMA0AqebpB7PjRR2bHYmhOJ/teMfiVWNvLnAZRVpC/3QWKmu
+ nRJmC3mn+3c6KhaOwZ913sn7PpE+79AIB/U70tMsJHoDb8wjZVChsLysoeW0EJ3Z
+ h8XZjT7tzqFi7c47kkEms2VL1pfIiUxY892757AzEq1RoXIFFEAw4w7Gxrk3V+ff
+ rEsgr0k5QZaJb8ge7Scm4HpA9niuxkUqaxcj6e2XN9u4ojrQzoc1F/J+gzE=
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: apiserver-webhook-etcd
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDnzCCAoegAwIBAgIUKhre1qHpFy9pKYXyBa1Xnqua3+kwDQYJKoZIhvcNAQEL
+ BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
+ dGNkLXBlZXIwHhcNMjAwOTE1MDAxNjAwWhcNMjEwOTE1MDAxNjAwWjAnMSUwIwYD
+ VQQDExxrdWJlcm5ldGVzLWV0Y2QtZ2VuZXNpcy1wZWVyMIIBIjANBgkqhkiG9w0B
+ AQEFAAOCAQ8AMIIBCgKCAQEAxVyyJXMZ87FsDk58jfDjlENltvM73jtmoNLFYuvU
+ OnAxEFSBZfEH4SQh3aL0yQy1HwsWeuRS279Zmx4PYvlBZid+SPteWdioNQyt/wnZ
+ 5nFHTkIU+nSHMGtxFO5bjGTiGQZG5PLzaDklbZCCN5tRhkYltM3T3uAffW/80Do1
+ XNDZqVzLL0BWHTZ5ABgdW7Z8TESt2XkHYAj70ekYxkTw8EcOYjlSfIGxxiXFFElk
+ MDy0wXvCKWahjAz0LJ+GaW0Z4MeNrMdpCwP/yWtq42J6xHSkzeHiFUgajIosgXIU
+ BJnxZbMC9AuyBZfC/qLwr8cqfsDHxPEmK9bP23AaZx2tpQIDAQABo4G1MIGyMA4G
+ A1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYD
+ VR0TAQH/BAIwADAdBgNVHQ4EFgQUrkJapWFd+8T9wXB9aLxKtSMkMCUwHwYDVR0j
+ BBgwFoAUIXm43UPw9Oz1TGNzUgW1Lfmb0lwwMwYDVR0RBCwwKoIJbG9jYWxob3N0
+ ggtwb2QxNS1ub2RlMYcEfwAAAYcECgqWFYcECgqYFTANBgkqhkiG9w0BAQsFAAOC
+ AQEAZISDGorqMpDjhlZqH+uoILh3jP4rJDk8ZP7CFNknV931lHjYOf/xMVBJs108
+ 6so4rfoQ7CsloEM6uXuybOrIu44DfhYD3lJ56HbWArE+tKeUSlII8wl1+CxtVyfD
+ Idv2I+XwFfnqcqhDcb+57wGyG1hSkWZ5/QdoY2fVhSh1tHXwdrnOxhQOH8ZBaBZr
+ BuvSkzVlsHDZUylfgVQqCGVrzNdSkO1/2fDGf0CUJd54glgKxiHdQdaEBv+Uuys0
+ G5apdX6FRtJPSBmy3E9MwdqmeUi5VH1OmNtPamTIwW/IafIWODP8fnWYv/7xRh9y
+ 2WXcYbP3QwkG3Zmnho0B2olQfQ==
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-etcd-genesis-peer
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDozCCAougAwIBAgIUS2vaNQgvYEHZtoNEtsjGLRjwLicwDQYJKoZIhvcNAQEL
+ BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
+ dGNkLXBlZXIwHhcNMjAwOTE1MDAxNjAwWhcNMjEwOTE1MDAxNjAwWjArMSkwJwYD
+ VQQDEyBrdWJlcm5ldGVzLWV0Y2QtcG9kMTUtbm9kZTEtcGVlcjCCASIwDQYJKoZI
+ hvcNAQEBBQADggEPADCCAQoCggEBAMWU/WxIuNeoEJKdTLcxl3ULhdWn3Crx4yko
+ GuZU3EtukM2Cz6CWJ5SHjXCGWmtBpoHBNccDIM7rf7Ek1mehbhc1HEdsqZt9gUJc
+ 9/7GYftu8I4QZPB48eXuo7lRaYyjtd1BEFNg+tAU4j7PBeAEO3q+M1NKQW51EKTv
+ sw7dGfJV9JodS5NH7XlTrsR2EagR0wSHqdL0JiK6EVtbOtqmArqJC3dKrnSE75Kw
+ Ru5hDjaylGv1XBZuKmF8ZaY+CKRUQbT3KxFfxrn1eqmhae2F7/aeA8XqXkSQoKu5
+ x9NQaW/B6mLKYub9hyutRQxwO2tbcnM+ReNGif2ZuOf20jZHJuMCAwEAAaOBtTCB
+ sjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
+ MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFNGrydEaNkat4SSB1ND41iHLOl/NMB8G
+ A1UdIwQYMBaAFCF5uN1D8PTs9Uxjc1IFtS35m9JcMDMGA1UdEQQsMCqCCWxvY2Fs
+ aG9zdIILcG9kMTUtbm9kZTGHBH8AAAGHBAoKlhWHBAoKmBUwDQYJKoZIhvcNAQEL
+ BQADggEBAGhZnDM+nTvXjDHokXBx9Dqoq3WMIFqz697sjk2rASGxqV+qZfqXxRNb
+ 2Tw8xibM6HwcdpCAfPVP+0LG+Rm19eK4WZPxKPWr4idvpG7c1SG9nnL5JIIQnnKN
+ kqtgcA1HqMSkxBs369+4PUslbtWB3dPKBHRp/9OXd9ZGbcF20xrNsBEKx0VTPzp/
+ O73VH0eunPqt4+ydh0uxRabezqDn1AkKul6Wes1V1YgobWNcmFrJZNidb7PrgjEF
+ zUzpfaK/4IrEIn5PQpT1KlQmM/eKy3oXBDmIEEVha2r0/JN5pQ+lkFUPM1+Zc7Iw
+ yBvg71eW5PRf3rK9A0X6Rv5OkKSlM24=
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-etcd-master-0-peer
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDozCCAougAwIBAgIUElyxrSP99FC44RDcwRMKQCaim/owDQYJKoZIhvcNAQEL
+ BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
+ dGNkLXBlZXIwHhcNMjAwOTE1MDAxNjAwWhcNMjEwOTE1MDAxNjAwWjArMSkwJwYD
+ VQQDEyBrdWJlcm5ldGVzLWV0Y2QtcG9kMTUtbm9kZTItcGVlcjCCASIwDQYJKoZI
+ hvcNAQEBBQADggEPADCCAQoCggEBANYlKNr0D6PrMCEszx3o11TgHaT93JQm+EWp
+ 4LitJK/Ag3y7c/8scJ+OdvJYzSys8cTN7MLWwhmNx/u/Yu5DxOinoz5SOLudMlAv
+ XS3axRWLMHoj6BR+03kFfVcQZAHgaSSOshmoogzkRBHDYGb+ebiIi5VBj64Ag37U
+ q3dY5CSydy3BuaqUJig538/YNt71KxMNX6J6KTUG86dRaJrDqPuCSWPVOC2CuoEJ
+ q3NRl7V5Drjz0quBd3BFg3wXt/9V0x2JTq5mHB2czpBcjNSpv/HoLbIWLEpqfGUP
+ VxSjDJHvkHxcNwfpVpzNK6RwnH9xrDP7HidE5MgIJ6fD5UfCzHUCAwEAAaOBtTCB
+ sjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
+ MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFJnk+T5aRNl26M1MHQXGyC8pREdUMB8G
+ A1UdIwQYMBaAFCF5uN1D8PTs9Uxjc1IFtS35m9JcMDMGA1UdEQQsMCqCCWxvY2Fs
+ aG9zdIILcG9kMTUtbm9kZTKHBH8AAAGHBAoKlhaHBAoKmBYwDQYJKoZIhvcNAQEL
+ BQADggEBAH3GOiPeF9WKQ81QDbG4m4QcveLprBOjxtOS1u9r95QROm1pwxz4Ki+5
+ AyI7kwaLRlhZwA2kMfAkBR25JFgj0JKUP6TbE7Non55mQ95Pw2Ri9Evly1yYxU/d
+ ntlWeI/3MSlpXkmxUoliyzJgdDPQ4RP5cRBnKKsRQPhOEhjxw/u8YC6Y5vBWumyA
+ Mv2NFT56JTNHrUp4UuJRAEX6l//a/JFw39LQJU3EmAZmjUHu/DFNWlvfebfFz8bp
+ dXsZhvfjddCM1xnTkouv+urxBEJRtpRenZC+KeLeKLe47Txe/atEvjdGPeYZL2UE
+ 42A+v0W71KcziokLTp1hDsLzoIyUuSI=
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-etcd-master-1-peer
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDozCCAougAwIBAgIUZvLXiO7wqT9NvRHuOQgGfLmiSbkwDQYJKoZIhvcNAQEL
+ BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
+ dGNkLXBlZXIwHhcNMjAwOTE1MDAxNjAwWhcNMjEwOTE1MDAxNjAwWjArMSkwJwYD
+ VQQDEyBrdWJlcm5ldGVzLWV0Y2QtcG9kMTUtbm9kZTMtcGVlcjCCASIwDQYJKoZI
+ hvcNAQEBBQADggEPADCCAQoCggEBAMqTA1JPqoDFBZxEIZoQVJwdSe1wtXMz3lz+
+ Vd1Nm+l715JHaiC6uHGQrzz9wZvHrfsmLWmFclxMUJgRUDQfa2LJLGszgz1EmmEk
+ 2L1PYg1EOZFk0/WbEBveE2GjogN3Tna9AjgQVy2j9jMJvLpbs23UnD6gu8L0bCr9
+ odQ2JK3upt01sGJgSQRkaJDIbj2y4F7gpMgUCuRHpTZjfjX/vmB6tIu9BeDyDyEg
+ tsAlbdAu9LWFUNa+e0tilqaQuk3LyCLSYVDz2FcFYDmqQuvm0RBuLPda4Bu4jj5y
+ nJQSN8KbWdaHk/YOGYgcZjIjvxCYjmOyc9AosriPpjUWKZCRmqMCAwEAAaOBtTCB
+ sjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
+ MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFMXSzeiUCyEHMT0LjJa74AkNCNBDMB8G
+ A1UdIwQYMBaAFCF5uN1D8PTs9Uxjc1IFtS35m9JcMDMGA1UdEQQsMCqCCWxvY2Fs
+ aG9zdIILcG9kMTUtbm9kZTOHBH8AAAGHBAoKlheHBAoKmBcwDQYJKoZIhvcNAQEL
+ BQADggEBAKjofYSZiqnyfrK/+qyfoN490Eo73JyEyWaey/K1ZVQItMrC6fQ3e/n1
+ bJ0vQmRIH7ocZSa8cRxcuwWg+GTb31HTrLhYi49PMWMB/tbhR8iOol8q0naUMlmx
+ 1YLRVxqLBF1tf204zuDFV1Lvzrt6pgyeQ6vFpy0fq4DWXFO2ipNPb8qs/fI/cWJu
+ fCyPcf04ExB130wDKDJkz4LU1S9wdS++3sSYwZQKhEIG0OHg72PhcUtBVgoRoF85
+ fiQrcCcQ9WEXLWWXT1nw4L9VK0JVxDv8QEdLPOdbTWFQogEt145veqqVswWbl3qG
+ EB7FPn+b7KhcqRDTBnzsItSl+x6zV/E=
+ -----END CERTIFICATE-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubernetes-etcd-master-2-peer
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+---
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIID8jCCAtqgAwIBAgIUWl/2vWSp6vHipccyGw4ytwTOUCswDQYJKoZIhvcNAQEL
BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMDkxFTATBgNVBAoTDHN5c3Rl
- bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTQwggEiMA0G
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMi13j4TYfCx46/i6AlbmVcoZoHli/
- JEh2I7WIkBNh6GL3fviLYavrFBNeGK2DjPr3dbyY2jTWDbwGXtB73Ak2Yvv6M2H/
- k2peYqvxZ0ZSYw88S0xUazzfKl4Z/nEZAMM2JDimDecQ4wL9xwbJZKTr5i7LzRWX
- cqJGeKOsBCf4nti0tCgpquaS6xrXhDKHksVNrkfkniSWedzGHj9cJHRFMVXP5hrK
- v+IZloeVCjLHy7YJQ2a7aRSmf0QQgrlMmwUY7bA4FCfsAe1g1823xtqZTpd10i8h
- u95aJZXGQOjAkW8UZaS1EJIjm3t/Qf7EqkOi5yLcFlLBbCfBBgAGSDHBAgMBAAGj
- gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
- BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQweNNlcW04q1RXdJXxnW2O8en6
- 1TAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzAcBgNVHREEFTATggtw
- b2QxNS1ub2RlNIcECgqYGDANBgkqhkiG9w0BAQsFAAOCAQEAq5/bfcYU0S+T8F1B
- XsM95/5KCbs5H7Z0WP96dVs2wFZzwf7Xt9TNmaVd6PtpQHfBzXuEDavg331Pvg7G
- nuEywYkqD/7I0looHQTpoYQYqtVkJ+W91iXo0ezwLRV/fzhsLin/mPUCuENg3+XH
- +JtQjAnUDbNicpMlJeGYy/UTWxECoH5/yv2/fvT1xEM55KoBf5N8qFhbLoXxxInm
- Df3DOx28XqNTbO/h05RNSz5jfpRkt/1wUuDmC+9WtQCKlvuZ6EcyL7JfPnl5yv6W
- vHYcmCyMNOvqfArePE5wfZ2L0Y8dkEXpMuFs1k1uPCBdIe6vuxEmQ2l9L94qVZ5f
- 2zJk9w==
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMBQxEjAQBgNVBAMTCWFwaXNl
+ cnZlcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANvKwU7ccY8cFUGZ
+ gNMjf6b1zMwmsZerK/dP5Vm6GWOLIm+iM3JoH/H4Dd9OEcWmKy9stswtuKOQ0hp4
+ HXQtT23boLeh8Pge/zOHdvSlt6ztiIHOl1fVWhTmI3OSbitB8Zm7c7YkO4KUGka9
+ 6o/ez65VNg/O4a+tDQm4bcrQTDK+Cg1XXWbCwOjHlS2QE4e1QETccmUwshYQLF8l
+ l/qHocyToZZBwuXP+ih0Uy+H1LGuvEzCF14I/TOKrnEa1YHU0A4LRygKjZGLImGa
+ Srmirtt97zC2+1rELiBiPZoKV8LOLC0L9psYXviuwuvLP4sPcoKtHTKa+yLscql4
+ WNMJzHMCAwEAAaOCASQwggEgMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggr
+ BgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUJAtf7I1+
+ jImwbdgEEkmN6MpRVc0wHwYDVR0jBBgwFoAUhS4/+bohTvBjb9M0T2U9OW7r138w
+ gaAGA1UdEQSBmDCBlYIJbG9jYWxob3N0ggprdWJlcm5ldGVzghJrdWJlcm5ldGVz
+ LmRlZmF1bHSCFmt1YmVybmV0ZXMuZGVmYXVsdC5zdmOCHmt1YmVybmV0ZXMuZGVm
+ YXVsdC5zdmMuY2x1c3RlcoIka3ViZXJuZXRlcy5kZWZhdWx0LnN2Yy5jbHVzdGVy
+ LmxvY2FshwR/AAABhwQKYAABMA0GCSqGSIb3DQEBCwUAA4IBAQB/a9KX5zVCy9lh
+ NQJPD9wd8LZTjBjOwlTTVx+aXhU3+YJFIXfM0FwE4PSYEQ6rEiGkStiRpRMoqnSa
+ PClSeh84z5SbMrqkJRDGqSliXdJRtPT21J2T7muCrlvhp9bGdJR9M67XLPaKEfgf
+ 7t7GCKQhrPvIEG2zM2LkgTiUYrZosT1w0FBnWPThMrE2omjIF05ZrsMzlCFKVoQJ
+ seFsUaU96P5J4mMu/2xfaVzT9idOgG0YriGv7opOJr35qciQoqSIJgIgamdXSpzA
+ vcwr7881MweNL6+HenrIfVbt48MlWg2vp/7lYXUvd0rPctKJKzgWGBaLoGD8GDwS
+ tVmKxxZY
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node4
+ name: apiserver
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkDCCAnigAwIBAgIUZY8uoWqacyYGhJFTBxAn3s/6OHkwDQYJKoZIhvcNAQEL
+ MIIDkDCCAnigAwIBAgIUfbEPzhl5nl0TEmO014kWP0q1bWEwDQYJKoZIhvcNAQEL
BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMDkxFTATBgNVBAoTDHN5c3Rl
- bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTUwggEiMA0G
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDR9OuH068GlLZ8j86Lgc38V5yE+Npd
- JZEbJN63IpzlsC3HAT7+Zv5hR+kR5H+IkjsMe4LhRDUAHzPYBv4qZBFocw7L3+F0
- 6z20W4PX3DA8VYUmU4HkT/CL7Pu6vWNJsff8EyVXktPUdkP1CtPs8CeBHAPchgYB
- /damSg+FfVXtCprQT3347C/TG1vjEvXOQ7kERHVdkPc4j2fjz0tUsMwZ8bfHmxW4
- ZftyFSxsQUZMEfa5OHf3JQe/6FvfI2SCfmXf3L1VUL6ahsfmcAnnZHd2ggnL+ln9
- hnIcCn06CBSRJZHQpsApR0MiAk4X0lO9EjchTHVmUs8JEM0Xy4UBDE6XAgMBAAGj
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMDkxFTATBgNVBAoTDHN5c3Rl
+ bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTEwggEiMA0G
+ CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCU+WWf0D8aFe5irUZQxkZY6lJlU0dD
+ vnL4gEQpO+TBFIUMUgPOgzIXw5jGd4hYVyWy6iNtHkik9WYv7IQVCM964QbQt56X
+ Op1xm3FJ4svMD52Bm4CG4BWAUo1a+YlRvLVcUdavysr7V57UwoQIq2jwokHCzMkb
+ l0FGSRZPGS/Ucw5/B/lUCvcbgqYO3mxGO4GJhnp3BA5SUyR7GaVMlWhZPPNt0dNC
+ 3M+IHSHk5VTicdbdOZ5GwfAk/O5tcAXHMRwsL2CNEft7/3oHcQJBAElFDmsF7wgz
+ CFitHjpJVjmIcm78GoIJR9Gqz4aE6dtn4lVK239klnYFx6NCiG0GTmd3AgMBAAGj
gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
- BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRKiM+XWchqU5Nz8gJhACPj5xPf
- oTAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0txStgHKxjwzAcBgNVHREEFTATggtw
- b2QxNS1ub2RlNIcECgqYGTANBgkqhkiG9w0BAQsFAAOCAQEAGm+zWf6g+b7NL/Im
- WrM1DFyFbZzpnitPlj+aACAFERPdiwIM4s9UoDIAeDXx1W3T97DVbg1zR04CkWEf
- V/kbOvFlJkdUJeDzfNr0RCHyq+s+ZxtijfG0lKsoVWgoisVx0PhNxV5uCpJfR7qO
- dmcp4/PMhus8V/xzLySBCvvcDggE/rnQeRMo7rkgzHtlrXK2y8Pz/yJgzZaCJUFl
- 1B4IgRtxx7cSLbfBm0QDtJc4Xq7XL/LZJPtEINEQO6y1nnGDXBCsKMya38/ZlTit
- KyU4uEoY6MqAozENUfy6wPK06X/d7fwAe0xv6LF9tMQwnAMycqfsjE2CTAC8iSH3
- 4vNvNg==
+ BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTABnzFW9epRSZx4cNYL2AbexDR
+ ojAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzAcBgNVHREEFTATggtw
+ b2QxNS1ub2RlMYcECgqYFTANBgkqhkiG9w0BAQsFAAOCAQEAGGt3icBsOmM9KeUC
+ y1ooQOnpppGnKQ5ABXcsTbQdkPbxh76eHRxFuPmU9YfbbjN9c2qT1N9psxebDM01
+ HOxsBk54K8TSzPEh/mYxJY/B1hQhgeG2kzc3xw0pZj0ei601AwFjYHcsRNTb91cE
+ f0Fo/cSU3G8/MF51IEGlWIqrR2uoNnCw4GG4ebrf1OzxPatl/m/6FHhJnzU5Dyd8
+ B1/fs9PHRHQ0Jk812ehKqBS0F+rhmK2vOF77CBP6TKAbrydpBDK26EU2c8GHWNFD
+ JEup0/Dr1xTO5uOe3svV+C93CZWAUhiJSed8W2Ne/zYS+nND3YUe6h4TNSRaXbgI
+ AF/1qA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node5
+ name: kubelet-genesis
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDVzCCAj+gAwIBAgIUSAEv2BjvmjQ527csIIit7+IfCT4wDQYJKoZIhvcNAQEL
+ MIIDVzCCAj+gAwIBAgIUd0zBkT1/PYkIppWqcFA5eLfsu/cwDQYJKoZIhvcNAQEL
BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMCAxHjAcBgNVBAMTFXN5c3Rl
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMCAxHjAcBgNVBAMTFXN5c3Rl
bTprdWJlLXNjaGVkdWxlcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
- ANF6rvod+hA4JTryPAXEtUmvF6XcI4dKBa90W0Jhpnnkou1ZBSImWX2IYxUW/wE1
- gK1J/J73pcICM0wkju5ofU3XEe9LRRC7ZRLnUwKqIZUDsCMl4J6CaFjvm7wtxpxf
- XEk+5sjNMtmTUmohyRQZkPskfBpwDFMpPhABfunHPxcf7OqcRxZy2tcRuZxLxQV4
- K3opKiKZJh1TFGVlUYxXDw2dG5mNP1vfRZpxsCjZmMKlU6F+V9Z+o4tGUIn+U/ld
- pTi4BQgTgd7vjzhJMb0lsgLVWdpsLW0G46OUvAalHQZsSF1cgj6iXeNNmk6ukZq2
- SonAP1gC6pVVJw1Z0IXJ14sCAwEAAaN/MH0wDgYDVR0PAQH/BAQDAgWgMB0GA1Ud
+ AMl0IG1fd15hdQt8ie5jiBAA4TQq+iRuicZ1WANFFcPJs1K4fGebTefW80AL6txN
+ DjR/ioWeTaW+1WNQw7w3RUXkAZ16RzgM8jyRpAyWCiIAmqFBkSyPIKnD8lFDbROF
+ qBgdL+MwZR18Lt5lhyOsZBtYAODa/YDKin71Vk3T0miENLG6qoc/xBfUuRfQJwSC
+ jK9tRy7Bllnf2OyLfqv/2YM9vcrFseQmRGn7Y3d18IfELRldweWVUljN3iNJoGPn
+ NquRYcvSohGyItzSOCQIZrt9h+qUZSqzx28zsu9EyVUnIFNAcxXE+heNFs5oHAaa
+ Cce2iyo7YcVtKxyT/W31gR8CAwEAAaN/MH0wDgYDVR0PAQH/BAQDAgWgMB0GA1Ud
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
- BBR7ppy3HqgRgC4PwjM+FiwWk3u9pjAfBgNVHSMEGDAWgBSh7lNxbWgZTJ6JFE0t
- xStgHKxjwzANBgkqhkiG9w0BAQsFAAOCAQEABSLPj/FoIzeuA5n8iS3ZUcmJmpRc
- BCx7L/U/qk5gL/0K/uZnNImtfKGa8JSmOhT3RUPQdfdF2d1MNhyLmDvQ90+6KT35
- OXswNicmdOyAxGH9r9hmUKxYPqq2bYP6tj5J+v8g7ZcQz/dXVO4mC9S0R8j0DO3k
- nvfgNBlvDKNcZxHn6HZLFDrEkM6rVhJZBrlquHU6OS1QBm6JuH+/ZCYIbH72eoBa
- PRKX5YZxaFo4X7WPqUdVj+2Gw6IPuMbrK0ZsObRwocepzXV0BRt6kv/Supca9kkp
- NH25lcT6JlMo4/fZw3Mw9A9DFN46Qb31fjNYgnB0dh0YaQMQ1ek3owg3hw==
+ BBQQJ70AOHlfUpGvQFhnKWRRBHlqEDAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRP
+ ZT05buvXfzANBgkqhkiG9w0BAQsFAAOCAQEANPQxynC1WpZfzOKcDbCW8EfrgXH0
+ Zyn961WIeuuQsqKCG6fdTr/Pati6Nwm/tAMefy/nrCME4ADuWQ5tC/NEW1lPG9mQ
+ Yomg14Z9oB7U9wr69NOXt83y6hIpat5PRLwX4lUcupTxBhYPwIk9xmBE5842gtUq
+ ec8qFSgJoWFPFWM8wUyCh6jBT0AU/kXIxHsTUw0HqwOwN0WWd4mpKW5sL0942PMy
+ mQ0qaVY5wT4k4vjdQApZNHgC75qh8rANFKHk2425BgjNPU2Ap5b9QoR744PIL9Rm
+ Kxs6620OYPkv3o27He//jLzqNgA1T2jcutZSSlfsb3QSBfZQ0dy0YhiOmA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
@@ -592,25 +1125,25 @@ schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDYDCCAkigAwIBAgIURAnOf9bMH3lTJ63NtzSFdxM9JOgwDQYJKoZIhvcNAQEL
+ MIIDYDCCAkigAwIBAgIUEr7P5shTargs7DToECCzLecXmT4wDQYJKoZIhvcNAQEL
BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMCkxJzAlBgNVBAMTHnN5c3Rl
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMCkxJzAlBgNVBAMTHnN5c3Rl
bTprdWJlLWNvbnRyb2xsZXItbWFuYWdlcjCCASIwDQYJKoZIhvcNAQEBBQADggEP
- ADCCAQoCggEBAKTUXzod1EnYLJBWr/565EEds6qG7yxb0bvqJLvZgmp/GZMesfRc
- dBFQ49b+bRoASGLIRZDJBuYFgaVMAum6vnwyiJQ6zoH/v2KYbLsBXwbfnlWvmxr/
- bq+jXy4I7t0DvOhE9rR900XecJ8IOuMWh34l04GX7k8m5/0lvkZkWurhDjetLcGS
- /6f7uQBMJqYg96sOHRP4XnBtlJZWLDFODkgCEDxVHo/yWyS2wwhPRaRhVpVpyrqn
- uFV7SPx0SMpmFjyLRfd72coEw8v9N0iVjWQelbJldCW63yfIW+yxW2VcxbuH6SMg
- DAhPSr3WeMPNpNHAeieafYj1M520DcjIJ2UCAwEAAaN/MH0wDgYDVR0PAQH/BAQD
+ ADCCAQoCggEBAK6gQ1cPjOJbb1AwDOwahyJ4r1Sm8eki+yKi32H9y2OW70BlN7yY
+ cvwxNhLPOg6dOeCYI0O7QA+ZybXU+Cx1R18h46wMbXW6uf1JpAP+f9O6PwkKRdlP
+ GfBB6lL4uWX7xd7pppH2tybLrZSKIBvOOB3vsMrMIUN1iRpEmJhKTZC1BtNcKZFl
+ Qpeo0LzU5I9vKyTmdtAY5s4OvIhAEVE+i/2Dm038vbLUHOeUvxImR0JAY9xe8i/u
+ QrGygzvWcuZ1NrvF/dr6hapuUUF8JKvP6TRmNVmvefhO6BtTYHVl5CxkJ5wjYDGd
+ UurbXLIvT9s53tZe9aDZqSQjIJ8GsMgHJIkCAwEAAaN/MH0wDgYDVR0PAQH/BAQD
AgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAA
- MB0GA1UdDgQWBBTYne03TtUnu2JQuL3HTpw/d3GOHzAfBgNVHSMEGDAWgBSh7lNx
- bWgZTJ6JFE0txStgHKxjwzANBgkqhkiG9w0BAQsFAAOCAQEAS0aQmePd0OYpbE07
- WxRp8fqEcHKLJMZIrUhOcKecuzpe+1arwPMJ0MOVM2tljYcrm2NlYVfNgC+T63yK
- 7LIW1ChnjAmdzN6dYHic8k6dbR/Kf6Tx1NXi0w2qhvvFuboHSyB4FlSktN2lnRk7
- FWdzNV19h0xUNt2767hb8VBP1bIVWKjD8yAEClh9HZau6MEcFYdNBrRE3YKdk29M
- YexwASFqj7Jih8Up/yps/xjE2J/UWn7un2RIi+7GR1tjDnP4sPEmEp7v71rMTDmj
- T1qrlNFlJwhbZgDv9jSjvr3QLCh0EYS7VVE2Tih7QLRb6wBLwZLMjQPNN1GkG35P
- SSAwgQ==
+ MB0GA1UdDgQWBBTVQ3FLfhWsYDe5y1jyPnQ7Z5a9iDAfBgNVHSMEGDAWgBSFLj/5
+ uiFO8GNv0zRPZT05buvXfzANBgkqhkiG9w0BAQsFAAOCAQEAX+k7ADB2aVTJiVAS
+ GO7qx5CNoYCdX8KkTdQO9q1EXg/b1oTkzSmdTcjKlS6LfGLOZ+bRKWUR/gdPpeai
+ ynHMwb42q8uUjhXh+yGi4LKL+DjTx8xVirc160VYo6k1/53D0DoZOOU/vXYPdkH1
+ dmdjTlhQxPkZqH9YJ/TupB7y96iPmWZd4BTjV2khEKuYVq9U8fNbC0nhbrJPFepL
+ GoLC0unzAblZWnKfaA1ekFrojEpe0JhWpzApUQT3+QqzrzYsk5w6jIBK3WlAvqcQ
+ AowNMNsl5+T5xh/FwPU0DqogZU4E4nOZyuoTOaC0B2uLea2UDX9mYZjSR2e7Oc4K
+ PW6B/A==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
@@ -623,25 +1156,25 @@ schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDYDCCAkigAwIBAgIUDVuOb/s12+4utcSFpn8HPlYHUaAwDQYJKoZIhvcNAQEL
+ MIIDYDCCAkigAwIBAgIUP2xj3piYvuNWi2CZNF2+rFFvdAYwDQYJKoZIhvcNAQEL
BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMCkxFzAVBgNVBAoTDnN5c3Rl
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMCkxFzAVBgNVBAoTDnN5c3Rl
bTptYXN0ZXJzMQ4wDAYDVQQDEwVhZG1pbjCCASIwDQYJKoZIhvcNAQEBBQADggEP
- ADCCAQoCggEBAJ4gtveC2VKgWPpDtLMa7wi4hMafPDeEoyH6/0kYGJXAzM4nTNy4
- Yuuet+AeGC6rzpsCDmFqPkVDQ3Vd0K+wNUIvf8jYUyLmeWPFq5+jWnRhzRmErOeA
- OT+ILkJE1CwOhOlKc2PtN8OS7EmTu6lddt89s9gS9isfnnIBf6bHMtgjYbkdA3lD
- oEK/o6U/KvJru3v/MHEyzUL0n0xPzG+vOT4iEVQWp73z4wh3jSxHCoBbxEOaNNfJ
- hB3E1FaI6Lcu8TwVvvwY+Gsvw5DWnRyUw3/DDQzM0cPfG6YCfyhcBEIIBydKpQ7X
- /MgJx1euBdGuQaxsZ4xoKKZen/AhBmfCMEcCAwEAAaN/MH0wDgYDVR0PAQH/BAQD
+ ADCCAQoCggEBAL9B3rcmbKplZWdRkHpIvGs0YS2LbJAl/pZY4BL2m7yB67w3mQlx
+ TQSm2lojKLy43cUBq4QYXFtip1CdBb77awqzoiw/x6BY4ipCKHrvOJHFWKga9YA9
+ 3lhGstDjF0k4xzatfpAY4QCR8zBjUBclrObuIso+ThsgAdBYGmQsBA5AIz9M+u/g
+ B+nYQ0quMqMd3pVLzoJEhK/JvgQbKnOO0ba80W+FGR8pbO5tdej8pcdYyHaWJ/4Z
+ Ky81qdte6pA/HhcElTriNSxP0SXcn54mYeXQw3usxv4pFSQScr51ZRwul5gkP+eC
+ KF7IkUO1LxbgmYcEYzkCTW1y4EyPV7xD8j8CAwEAAaN/MH0wDgYDVR0PAQH/BAQD
AgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAA
- MB0GA1UdDgQWBBRLaEUYtQhlLBqBAKIu4kP4pYhQNTAfBgNVHSMEGDAWgBSh7lNx
- bWgZTJ6JFE0txStgHKxjwzANBgkqhkiG9w0BAQsFAAOCAQEApiYqUiC24UK3f1Qo
- 2zua9S+5ZyfW98/posX5EgLvsnnbbhitEyzmsTPhmr56vZcdVUcopx4W63Inh4Ta
- GBPT25ptfHTA5m3TD2+oWEAyJ0xAn4w3Eiw4abf4h+5CBeNoeure9xLbR36vYHoZ
- t4iY5CpkhxnwuKWAYNq8kilA9oS5vnnguC1aRDrD9m2KfY5ikbFwFYe3G4KMp2iH
- YZb1Lagpedtcm2R6xMgDUJKJnCyXZHqzuXs3OXuM1QW6e1YvUMZAGLWnMbBvKs35
- r1GltV99HtXphNpjxWzkTMKK6+L0CLq5wnqVcW3T+V5WNGnHV18A2HD3CTssQZlA
- nileWw==
+ MB0GA1UdDgQWBBROGiXsY3bYbp2j8TweLqKXcOMo1jAfBgNVHSMEGDAWgBSFLj/5
+ uiFO8GNv0zRPZT05buvXfzANBgkqhkiG9w0BAQsFAAOCAQEAj2wStkU+XQ/fKR8Z
+ SXfU5HrdzqZg4RbIWPfAeznut2/1NPU0dhgNLJ7rLV0ioa61tOpmT6r9cTaGrCYu
+ MeB5dLiStskEHRgmhAKTzWh8/iW7oLSfFowRLnjeXUc2gL0AnHNgyxiab4KLY+8E
+ 0qkUz8gofa+74yV4fRY9zRsRi/V+qmuruaqJxC8KNxTyEIm7d1C/H5Kcd/CFyX2X
+ tcbozoPtyCWcbnVTgtmKrvdW7OGzzN1padCLrGWF7pkesXJcSHcqdBrNtKVXi+qp
+ rcNXGzUt5cQgm7CdvLFuuJ7ZHOvAldYCm8FbWD2ym+Ewiq13z5OCmrVG5XonFlIU
+ DkjqUA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
@@ -654,25 +1187,25 @@ schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDYTCCAkmgAwIBAgIUalNlJLFfpr/Gh7Mw5t4a05g6uygwDQYJKoZIhvcNAQEL
+ MIIDYTCCAkmgAwIBAgIUB6QAtI6MoBNvyUoYUqycZMewufcwDQYJKoZIhvcNAQEL
BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
- Fw0xOTEyMTUwMzQ1MDBaFw0yMDEyMTQwMzQ1MDBaMCoxFzAVBgNVBAoTDnN5c3Rl
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMCoxFzAVBgNVBAoTDnN5c3Rl
bTptYXN0ZXJzMQ8wDQYDVQQDEwZhcm1hZGEwggEiMA0GCSqGSIb3DQEBAQUAA4IB
- DwAwggEKAoIBAQC4iej5JvHtxmEc6XoriwZvkmpQlaRQ2xdmNJ6p2pM73c80IqlT
- Ge19a+jK10xzfoYW8Qz1VBIzeBPqMfhEqTWnSgVwHZ1Q60yS7Yu0zEDZ2PaecLCA
- WnOf1BQYquV04b8lcfXVGPyKWZtomtKYm77PHpEMDzrqMXjUQ4xFCJKqSmHxZJTo
- zhk39+6Yj6BNfzTPDDRIKrmt23k/4ooo/NWYQrf/9eIl21vYt4fV3kohFOBzHMzf
- 3DBmRvFbwaDq0ZHzBSxo06aa51ZVUKDfTTfWmuD4bKnV+bmAbmoUJCOeMOzYuQVB
- MSi66WmsMILeAeWlaSCpL+0V4GEUk02PXJdJAgMBAAGjfzB9MA4GA1UdDwEB/wQE
+ DwAwggEKAoIBAQCpWo/eiaVSmCUXq2ibjKRMbHFgucQOlAh4lEo4rOvWRRSeX2SG
+ mn0C9K+iROWpcb3izvK7UMHF6jq7iwIJ+qsUyi4XTbcDxfuDQx3xv0pcw1E1CpSB
+ 8F96j8TThxKmkjCm2WSxuXAmy2myW4ZI1V+oJ2BopFioehddzOsoi7nNRCp90BIr
+ Z4kISfzYNmIM0rUNJQ3OIGap1ir4x2fJB8fkeb6ru2hnIycbG0U/Xv6u9eFFtWVf
+ SfqJMxI9KCZO7uCxEMu/CYJyN5Eemtjo5rgNDRB9VK+AHwnlpcov6hStHXvltj7v
+ Xhw2Mia3SLIw9wih8PROtWGo36CgUdANvyLJAgMBAAGjfzB9MA4GA1UdDwEB/wQE
AwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIw
- ADAdBgNVHQ4EFgQUnMdTKIGmWrYIpxLZFEAZZ8AM25YwHwYDVR0jBBgwFoAUoe5T
- cW1oGUyeiRRNLcUrYBysY8MwDQYJKoZIhvcNAQELBQADggEBAJVGzx7vD7Ur9vTf
- yDC3Y/610wnWezr2IGFA59j9/Y4NiW+GrqFaipPjJBhm1A9YYAOS8K4cRw1ryyGS
- QEOGmSlcDexdP9pFODUpwUy4bmNnIMBoNOJWQA72lA1hreFhD5RRukMLiqSjtNt/
- DembnN3XvI79xzgWiFVh7D43xZDP2kqd7YxsD+iUuZ9/R9d6tSTmRdLzVpIQtfP4
- qKGxl1JpKjnejHB8OCQyj/VfRxJpimi0xSiovB9XNo+2uGx59LDXHS/oy4qJV+zA
- 2vQsn5WwXf/PogjgIr4MwKfqJ3n+F9dWWX+MZmpKk0hAQnNGeqZK/rUiz6F6U7en
- RdzvX28=
+ ADAdBgNVHQ4EFgQUCCwE4LhCnL1pKh17V9rb9rqa6JUwHwYDVR0jBBgwFoAUhS4/
+ +bohTvBjb9M0T2U9OW7r138wDQYJKoZIhvcNAQELBQADggEBABaZOV65oVmCr5zw
+ 5uIkl2A3EsDm8QGe0vA4USdAdoyF008kXjwFePGfJLtj13VwtdsqadHMxz84C7ed
+ I9CUkXq1YDeHy1+XLyDr1kzvSvH6dJdi2O9krAr1mi6KzC4h3b5bt+C/LmZefuHt
+ tg96rybjlMprPZATnJI1uFGlMKtk+Xi3Cf6Ig4kLoIw1arbAgU36nfLHj9G/m6WS
+ 8cGfBnlsFDk5NibrYiOuO4poG4B1LMzeLXc8UrVvJOQ7zvYcn3y+WljGi4uIk2kt
+ kNFnEPorw4ZUR38eRCW48U7bVrsMhPQBMVCK5GQ14EIy57Vr1TY3vsz7Lu1DDCGk
+ lfBJqpQ=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
@@ -685,1729 +1218,1886 @@ schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDUDCCAjigAwIBAgIUBH8wQBihC5wZ/grBgM2yKeAvOzQwDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDUwMFoXDTIwMTIxNDAzNDUwMFowFDESMBAGA1UEAxMJ
- YXBpc2VydmVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1OxkNW5Y
- UNIyEmTSYt98xvhDrJz9SkoLn+fQeKJwvw2a0/sdClyQQ/zkNiSH9QVD+jzFXSkc
- Yz/jbsA3jUxR8cypqjn+eSlItBQwwR8O440i7YoHfMMld8lcOp458/K/zgWAh9U1
- GEsgACtCo2VGZfrhTAtbux1T1eCTTaSWM7J50ulsAyCBTUwZwO5f8zG/C4iKWhu8
- 5gxgExiucQ+ul71lzgumxwAojK2JBuH88IQt2aTrKw+sn16z2G8Z8E4FoxMCNxYD
- kV604V5c9dBSZKlwea+fk/pMzwvxIA6tLHT0AbW84CdAoT2hDZbxI4pnrfIhwgqc
- vjxKc/gEEESWGwIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYI
- KwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFM1mjh+7
- d+as2M/vrgKW2pw0tKmkMB8GA1UdIwQYMBaAFBQx2TQa92btcDTQHKCYb8xWb+6R
- MA0GCSqGSIb3DQEBCwUAA4IBAQCvg3DxSGSVGydKEoNBpvjHNwZZ3Y5DZACcWXBc
- 7lAbfFjFekw8RqTAYRF0FRsXG8F/9RD4MaGfa/JdCtaM6VZHu7vB5QY3hoar0hZE
- cFbOAM8QnAPDiyd3XGUWlhaehbn8gOzColcG1gPSncyaHUMypCYmZS7YAwbcsB5h
- WfOHUytykwBjddmKwSAgESBP4OtQ3iLRWC6XV1gw1xooVM5O88STmZFmlnmccCQ1
- GQ3awOVPcBCCHHGY1AKRxVCQ3IrggbvX8/rbAXNU+w8Kn5OaJPCbWSaIynZKNaux
- y4IrlW+obqh1U1S00TCW3gv5+RdXvCNjuYvett/SJ6UUkOM9
+ MIIDUzCCAjugAwIBAgIUewGQKl8XBXFurn7t43pxLduOH2QwDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE2MDBaFw0yMTA5MTUwMDE2MDBaMBwxGjAYBgNVBAMTEWFwaXNl
+ cnZlci13ZWJob29rMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs2gf
+ E/kmRPQPwQKEjJXBJu3xDQqccbDYwgnC7nR/Q5WjbmayKH/U2Ne2UtlKIsXJB9JF
+ LPPfWmnRgmDNz+nOr6V7AoK3fyZ2E6PMx7cCjhdC7X/9d4kHDX1rW7opym9sNCGn
+ CwFGLrwI3pCOVHmpy8zUgwzn5Q7XCZ53nWmeMrQlzC3FJNyrVIKuxRqfgJIi5A+/
+ NYhcr2QTDcYlezX0IGDGiFLd5xuSQEwMxiLswDJJkjb2Iw/R+UNq9hF0x/sPG7P7
+ 2jecLfYlXozpijfXTTNiBSxgw8PhYWaz/n+xVEjOxTIk7jRVjm074Yj98UVTlM3+
+ zamNJJmsGoQTYP09rQIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYw
+ FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFFkV
+ n3tJMeUSx9KlYO9esZO/hj9QMB8GA1UdIwQYMBaAFIUuP/m6IU7wY2/TNE9lPTlu
+ 69d/MA0GCSqGSIb3DQEBCwUAA4IBAQB7ot06lLTEwTjVVB1s2Z50YdWf7EeMYKvv
+ yBut7WJOgQ8E2OJ8cstiGjWQX25jn8lAswetT2ufr4amrE+we/nGPPWG1I6HK4OI
+ 1OZWQKTh8Ki6rsgzYHw106vGpNEVeeDlymtWOSpiccojC5UC+A8FNZrW/SvhEK8I
+ 6LIAy+if/hatGRmLwZMtUvwRNmzjsb6n8CxuOOcEfbyDCigLodEBlt3S6pddtMP3
+ r359JH1x5DdtJgvn3g6HkCen6BP/whOucRDz+c/SP1JuzLIqoYCZijdkru2jy2xm
+ 5FaWkz/2iav6XGfcNpvaskKQ3bLOQKJKJgRJ+xJ80U2h6l/0BcIG
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: apiserver-etcd
+ name: apiserver-webhook-kubelet
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDTTCCAjWgAwIBAgIUOyiZ0qgN1iK/edpEjMLJVafLd/MwDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDUwMFoXDTIwMTIxNDAzNDUwMFowETEPMA0GA1UEAxMG
- YW5jaG9yMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA37TdSlQy15A0
- EY2FLM1sHW0U79AxBlbd3UG7eErF65fgxAPoZGLsO4bkwH6N9bv/pbKLzq5NIrK2
- 7NzCNk5KK34A1ILBtKIoWwWQBGcI2kEAHLezUj9plygr99rJb/9eOC4dym8jmvV7
- y6TGWDzR/f4ShEuA/Q6iNsBXjCBoNP0LC+z0jcREx3QTVWMBKumlduwV0gJJnESm
- 68NZBKD5iCj5r5YJTUWmm4tXLBgB8KWk4hUXv9khNLGPQ4SJf+wATkfNycujTO5A
- Qp1GIJniSpwcKh/nJbbeiOJWyUFiW+ObnxAUIFxkaoymuck5xa4XsZrdYxUnJ6jv
- 5CyxawaXAQIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYB
- BQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFLRIY4VeiRS8
- LsFaoaLNZTYBdl6tMB8GA1UdIwQYMBaAFBQx2TQa92btcDTQHKCYb8xWb+6RMA0G
- CSqGSIb3DQEBCwUAA4IBAQAdPhcvTbKrxPsqYcguzcFIp/s2Cyq6Fz9N0D/mJ/6R
- RnFuzVq0S3TAVsj9ciQbSi/u1sIRJAEggzL6mY5GDeqI3DrW2RgW5GCgMQDcJWO2
- mIzIlzqyPenasXa3/GCkAZIKHyCrS9652G6U4w+3UBrnWvvF3O6abiMLYjYC3R46
- DhixRmhdNHmbPc21JzABJlYTmxxd39IR04NwQ/KKrXKpExqKGMJJRCrDp58nYbMa
- JbmPqVRoU4z/JUomASrP/6gljO+sAUZeBVE+t+tpOBwPiHfZWg6g4sdEZ0N+PjyL
- sXbbhaa3heBibrz8ZGpzGHPpCZ7PvhBjzEhbEPN+Fj8i
+ MIIELzCCAxegAwIBAgIUBgesAHGnFRKpbuO3dPjoGzjqA34wDQYJKoZIhvcNAQEL
+ BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
+ HhcNMjAwOTE1MDAxNzAwWhcNMjEwOTE1MDAxNzAwWjAiMSAwHgYDVQQDExdjYWxp
+ Y28tZXRjZC1wb2QxNS1ub2RlMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
+ ggEBAKnn8yUvHtt1GTwPyCfIFUK51WNhUQCiT56YqFoqKCYbCMlzwyfHaZ/yke9E
+ EqaI9IPPjVoAlbiztbvlqeu/HoJamA8uQW7ALLWsFJPI6SB6fUKGEaS/pB5iH/AP
+ LD/vDQr1joYvo3FiiN9bbwQPza4UjW6ho8JmtP23SKzURqqMBkLPsHXpMs6rUuKL
+ MBAXx33P6qvVzYx2pCGlQZXdwfofJ71CXLsf/gKTwcdod7grU9XvxxSZj70Ea+BN
+ k0Cr7cRvLqZnsaHHqBixJCCWOmqKOBee9LQjcRpSelEtWsTjAKOfAc+dRdOOHCsm
+ k0apenlCOfhifQrcmCT6lzAl0dkCAwEAAaOCAVIwggFOMA4GA1UdDwEB/wQEAwIF
+ oDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAd
+ BgNVHQ4EFgQUsuj7tmPd4fVP+skfvjgKp3h3O4QwHwYDVR0jBBgwFoAUExleeJit
+ Chzmy8YGnXiSIWlIRGQwgc4GA1UdEQSBxjCBw4IJbG9jYWxob3N0ggtwb2QxNS1u
+ b2RlMYILY2FsaWNvLWV0Y2SCF2NhbGljby1ldGNkLmt1YmUtc3lzdGVtghtjYWxp
+ Y28tZXRjZC5rdWJlLXN5c3RlbS5zdmOCI2NhbGljby1ldGNkLmt1YmUtc3lzdGVt
+ LnN2Yy5jbHVzdGVygiljYWxpY28tZXRjZC5rdWJlLXN5c3RlbS5zdmMuY2x1c3Rl
+ ci5sb2NhbIcEfwAAAYcECmDoiIcECgqWFYcECgqYFTANBgkqhkiG9w0BAQsFAAOC
+ AQEA6ZOcHtgpbvZpFXtyPHiQhwczDnOVCzVezCuRLVq9B2enQ18EfeMp8XuI0tvx
+ eiY94lYHscBYj0SmFstW3vnAq0ldnWw+b6Hx45xXyTeNgi+XflfoMjXFLbb1ZEU8
+ d13jJxsBtxvptNjf1y18B9+PCwQ4tO01HgdcNY0yfGU/Ai+Dq987iZQryOMdbxmt
+ wQ3SNiXiJq7mZJeYjZ3udo1W8szndoPyRjlUNU8ESQ9wixDwRegDFwn3m7kai5fp
+ 4yIVMsiSPQpx9xq+UiHQa6niJexSroJQHAz8xTxK8KreB+useFsyst0zexOe4Vbq
+ nOQbER88T7ElPI8ZCCcH8ViDew==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-anchor
+ name: calico-etcd-master-0
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDxDCCAqygAwIBAgIUHgYxrRK8asXmscNp6ttCXRoD2s0wDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDUwMFoXDTIwMTIxNDAzNDUwMFowIjEgMB4GA1UEAxMX
- a3ViZXJuZXRlcy1ldGNkLWdlbmVzaXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
- ggEKAoIBAQDS2anS2ftj9gOxD53wfeDiZRuzheIKiPnIh+s/qVhgaintqjVgNCI8
- q1phupSuy0G+6HxkU5C7qWZIPANJhaH77SRTnfvRiLXHswS4qfk2tEA7krNPR/6B
- 2AIPe2IEQb+44CIOruhv0R3aXoDZClTaGz8mDa0ag8SJ3XLGY3IwdyQEq93boc9l
- eB7M1z/ssgyat7RP1ZZdvehFWblLK2LWJKhQxJ4brFh9S4Gb0Vfja4bP41ZxET7n
- LCN9LEt9h0+PKiscJkWr1If+jzwR36H+fIF2zk8TheyPPQUHxaSrjzkrwEmnv3d0
- /s7xWBZWLsQ5XjzXaRS6OCibxpgQRaepAgMBAAGjgeQwgeEwDgYDVR0PAQH/BAQD
- AgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAA
- MB0GA1UdDgQWBBTlDSkltgQOMuBMXXcmBxdsexg8hjAfBgNVHSMEGDAWgBQUMdk0
- Gvdm7XA00BygmG/MVm/ukTBiBgNVHREEWzBZggtwb2QxNS1ub2RlMYIJbG9jYWxo
- b3N0gi1rdWJlcm5ldGVzLWV0Y2Qua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXIubG9j
- YWyHBAoKmBWHBH8AAAGHBApgAAIwDQYJKoZIhvcNAQELBQADggEBAFwKLMiqzzJQ
- arSAXrbKA0StyaqqG8JnM/h+OUZYwHRdmZbxxFRi8H0YT6rWwmhQcbeWvvlaI79e
- uIy0kzRw3LdnxxpEAkZcZBLBYcvnbN7OQ0bui8+Ip+ghZ7WVPuHeRnvI/yJWOX6V
- oNRTC9ngaAyff9k9BD5KYTkNv2Rl10ku6eJKnIRKwpokyMY6usvefKLewf23jwUK
- lOZGNiSV45EvflU6Auz6tCk9gxee6w8Q2s3Q8or7p32sG8ciKwnZxRjTLarVwWj0
- 0mDjvrbPh33B1u6p1Mz2bHm5xy3mkBykl3tRQuDkgVVGLvHOvhYWiEJBc1CTsyLq
- zFMmvtmUJrw=
+ MIIELzCCAxegAwIBAgIUAuZBtkb+UNIxWF/nYbEUDoldvpUwDQYJKoZIhvcNAQEL
+ BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
+ HhcNMjAwOTE1MDAxNzAwWhcNMjEwOTE1MDAxNzAwWjAiMSAwHgYDVQQDExdjYWxp
+ Y28tZXRjZC1wb2QxNS1ub2RlMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
+ ggEBAJoXYUJwWCx9J6FwPmxUEksLcIvC1Gb9Vy0yY5Ogx0XS8zh/Hpo3LkVzduCW
+ Es4fQec5aU/OL2cGg+eCpiovxJ7bpB+ZL7V+/pEedNco3YwWngLES0OH88uN9ZxV
+ vCyI+MKFCxSSCLoIbTXs7DI+OUH5Uqtxw/RMl6/J9WotU4ekv4cKAuR7H1XMhsO3
+ VpqxB/XQOpr7JtdGqitY/3O8Z0hTUvxOfQ2qXkKpcHFYmmTB10VrGD9OR5LruaYi
+ v9Ok5hbhE/Nr0SZjOzUZjk73y5Rfz6iMlKmiEIP19wVvPKuAltI0+EwYSs4Mt6BC
+ u1MvmGK0GqW/6QAH7umsvsiMZ5ECAwEAAaOCAVIwggFOMA4GA1UdDwEB/wQEAwIF
+ oDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAd
+ BgNVHQ4EFgQUbzWS2uVEZPznXfgaVESlhwOLVXMwHwYDVR0jBBgwFoAUExleeJit
+ Chzmy8YGnXiSIWlIRGQwgc4GA1UdEQSBxjCBw4IJbG9jYWxob3N0ggtwb2QxNS1u
+ b2RlMoILY2FsaWNvLWV0Y2SCF2NhbGljby1ldGNkLmt1YmUtc3lzdGVtghtjYWxp
+ Y28tZXRjZC5rdWJlLXN5c3RlbS5zdmOCI2NhbGljby1ldGNkLmt1YmUtc3lzdGVt
+ LnN2Yy5jbHVzdGVygiljYWxpY28tZXRjZC5rdWJlLXN5c3RlbS5zdmMuY2x1c3Rl
+ ci5sb2NhbIcEfwAAAYcECmDoiIcECgqWFocECgqYFjANBgkqhkiG9w0BAQsFAAOC
+ AQEAjKzvmMory/0OwKlOb99rRXCs3bI12JiPBjVoWHjWi9ZIJ09ZAo2Fci4NYkdy
+ odGL6IFVek+JN+987vXyrbA4idpE9urbwoTGwq+AeeZ6RtjKNh5OhRSEW3z97X81
+ R3afTlHxLT7N+/Ta/dspnRqEXnYVAdRc83/V7ihWL+i13axUsBS13hquO13bNDoP
+ bqTPIXyhKR0Th8uGukxpjME+ZZJZtfJOXApMA/Yz7kIYOHFrihRJsO+CYK2jCXDL
+ LIPDTzaBoAOZfsVMLyjpPWdEje+SXdbaO0UVmhpKkRYIs3GEy2fZHc9KQLqnljI+
+ 8BnaDou8uzoACJscLI0JLjg9uA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-genesis
+ name: calico-etcd-master-1
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDyDCCArCgAwIBAgIUPb5OXU60Bc/7xUV2mqnDJDjXqlAwDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDUwMFoXDTIwMTIxNDAzNDUwMFowJjEkMCIGA1UEAxMb
- a3ViZXJuZXRlcy1ldGNkLXBvZDE1LW5vZGUxMIIBIjANBgkqhkiG9w0BAQEFAAOC
- AQ8AMIIBCgKCAQEAujJSrpil7jhn6cg2BX85ij5bGnKZijN0RKzOOQ9+eza/8gpn
- N77LXOrd06D2r8HOovoG9T+j6syLycrTYM/MauwGkpqOxCZnLLhpbaD2I0UKm5cz
- Kx2y+NOBXZpRf13GNua+fc5hN9gtQNwFYZFeNl5rVzx1HiQO+CsY8ihXAVFF3ouY
- 98FKF2YJSC9l4jRCKuY+AkLAILci44S8GKEzQvIb3zLoI+B9mhBtu7C2CBANSCHB
- 7rN54zOPJu0+1iD3TXP/8c9USCm4CLfHJUhE0EuFvBpICWIBaN+DwW3GdofWrxIy
- OHzHkK9fAAPlA/V4o3qy86nWRn0SeLqzAoBbFwIDAQABo4HkMIHhMA4GA1UdDwEB
- /wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/
- BAIwADAdBgNVHQ4EFgQUxWY6iREf0i10/XRR+SjIaD+GEuYwHwYDVR0jBBgwFoAU
- FDHZNBr3Zu1wNNAcoJhvzFZv7pEwYgYDVR0RBFswWYILcG9kMTUtbm9kZTGCCWxv
- Y2FsaG9zdIIta3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5jbHVzdGVy
- LmxvY2FshwQKCpgVhwR/AAABhwQKYAACMA0GCSqGSIb3DQEBCwUAA4IBAQA/VFJG
- 9h3djDv0oed/EPN/4VIy1O4q/quiUnBXjeYDUIJbYNdhqbZ2ienbCimax4VqcJI2
- InoV3O0H/XH0KkDs83PFyHqQ7+a/z7woAn59pb0NMvIWl0sqrQHFjbV+Gm2/17dm
- VdpPyJC2kW1DTzRzSIJaA24GgrTuLYT2LosQ6ysq2r8UE8JeXmMEvMI44EyRIL2H
- jMMcWXv8LfMFzrArCKS4LoL4p6WfMzs2MQhXXmraCQj62mG+ARZVcdyU1pVAqD/6
- 2Mq8TU1Q9f2e9rpLlAOHJ25yzWwkibLZWbI57z41sBXJio9S3t/eDgZlM1G88xlB
- /FhKxXU9Qo1bn/Nq
+ MIIELzCCAxegAwIBAgIUUYZik54PIXGoYK5Fzi0I8cUjJBcwDQYJKoZIhvcNAQEL
+ BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
+ HhcNMjAwOTE1MDAxNzAwWhcNMjEwOTE1MDAxNzAwWjAiMSAwHgYDVQQDExdjYWxp
+ Y28tZXRjZC1wb2QxNS1ub2RlMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
+ ggEBAMWrgW+2In9MeYfSUYmklH/8LbExaxl1GlyFiZWz6wTAYHVtUwI6Zm/U6j3z
+ 2zo/lXX2qUQlKDxno7nzjwb+3/NWy6hCU9GlU5H0lQWEKRyZEO9dD8HNpw4Ea6dC
+ vLd3GMb5St3NLWkd0dM37dL9tr/1GSMUgbSYCHw+RWXMv9jkJxlkD6Hx1OAGijYL
+ b66HIs90wKFqE66Ov7Gho6KcKZMMqtxZ0ITsqp0Mixb1guB5TGEUAYllk+XkM8Dn
+ rCFaq2yLkq5CYVfEHJaxHJ/cjIbWGE9wA7EeLrpop/eH3Wbo60AAE0kGzuXpP7XI
+ 6CakiyLEWM8DcfXOse9WzSBvquECAwEAAaOCAVIwggFOMA4GA1UdDwEB/wQEAwIF
+ oDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAd
+ BgNVHQ4EFgQUKXQffihQ5pJWu8X3lkiwo+C+nB4wHwYDVR0jBBgwFoAUExleeJit
+ Chzmy8YGnXiSIWlIRGQwgc4GA1UdEQSBxjCBw4IJbG9jYWxob3N0ggtwb2QxNS1u
+ b2RlM4ILY2FsaWNvLWV0Y2SCF2NhbGljby1ldGNkLmt1YmUtc3lzdGVtghtjYWxp
+ Y28tZXRjZC5rdWJlLXN5c3RlbS5zdmOCI2NhbGljby1ldGNkLmt1YmUtc3lzdGVt
+ LnN2Yy5jbHVzdGVygiljYWxpY28tZXRjZC5rdWJlLXN5c3RlbS5zdmMuY2x1c3Rl
+ ci5sb2NhbIcEfwAAAYcECmDoiIcECgqWF4cECgqYFzANBgkqhkiG9w0BAQsFAAOC
+ AQEAI+3hP3KRbfHdj6J8ItD42TIBZDiWIuDduWgrl/Er71JdtB3ZqvmgOVTqCBfv
+ Q0NqKYmq5EbcCf7j8EuaSICkNL7mKmAAtjvE1JicirEMoJcBnLLrSYKiq6DPEpUD
+ +W5l43iUaKAIGKZwDmRiwUwRQ0D4sGQxNPSEa5xuzHvIAJgMaffsMHHQH8u/FG2t
+ 6q+kVBObzBqZZoayoHmeeUhmtmmK7n0xdMU2+EUfblAUbwcIACkJDe/mOsjJ0lna
+ E+/OC0KV/hqfrHRBNC4X8jaFAvFP3dF6e4Yjy7fu8Xnvrdr3Y3SeAVB5xTpRaq1o
+ KEOX9Klrh0l4EjAgXap/rn4hyA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node1
+ name: calico-etcd-master-2
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDyDCCArCgAwIBAgIUM1bBisu94/bruEHMVuWY6qBsG3MwDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDUwMFoXDTIwMTIxNDAzNDUwMFowJjEkMCIGA1UEAxMb
- a3ViZXJuZXRlcy1ldGNkLXBvZDE1LW5vZGUyMIIBIjANBgkqhkiG9w0BAQEFAAOC
- AQ8AMIIBCgKCAQEAr2fk25eCVhfxE5WiNlce2ydF9v/a7rAZNFhzM3aRunB0pI5u
- gyjZJsB1nd8wx1Tcp7lMyXKF5n6aFF4PP58oCknizzHvoTgmKl1Z37oWDm8g3DWW
- LWVN0Hcp4NvTLLN4ukkSb0swa/zNM3PtaJH9nq2NIvJGST9G5CKVx7dE04GR6h52
- UCvZu1EGiY09OUSCRTSi6sti41HpCZe6LX4PELFMeoQ3fBa/UVWHV8rVE/0ZvMNj
- 8TzgstmDk11n+CW2mJOMwpJaNVR9yn9kf8Qg61OnaJOqyLPsgp3VCZwiGch4WrPd
- FxE8OpXt10B6Fdm72F6yEG8yLKlL89/6qGsoLQIDAQABo4HkMIHhMA4GA1UdDwEB
- /wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/
- BAIwADAdBgNVHQ4EFgQUGPdRHIxbWoYYoXJkmSTwh8YMud0wHwYDVR0jBBgwFoAU
- FDHZNBr3Zu1wNNAcoJhvzFZv7pEwYgYDVR0RBFswWYILcG9kMTUtbm9kZTKCCWxv
- Y2FsaG9zdIIta3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5jbHVzdGVy
- LmxvY2FshwQKCpgWhwR/AAABhwQKYAACMA0GCSqGSIb3DQEBCwUAA4IBAQCB17EQ
- XS+aSKFeUdCASx7frq3D+rQO2LVna0SQYjMI5BZr7uBMwTkN/pWYrtbRyF6ZdF0Q
- CWNAmCbF/XYypoVZ/LogZ32bP28EXqr5o2X6XxPl3cFURWDMpd9AYFKHmdBxcM7M
- UgbIvrC1dc6a+UjThR91jBEqMB0LQVyMkanm9NWWDQd2qWuYeNTxrulyE11pVOgI
- RYhwLgZzYqwyuNh2UpoTq0vkD7QZNand+R2MxBFcNWEwsxUrTIk+jRBEGSZ1VJho
- qKdlDLLpN5VgW21wZ0LwlZvFw/GVlUiVkA9p4xX+WN9uDW/CYByf8GG/BJ0c04XJ
- ATn60pW4Wh5Byyps
+ MIIDSTCCAjGgAwIBAgIUGm7B25llB06YGizZFyz1wfpIA0gwDQYJKoZIhvcNAQEL
+ BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
+ HhcNMjAwOTE1MDAxNzAwWhcNMjEwOTE1MDAxNzAwWjARMQ8wDQYDVQQDEwZhbmNo
+ b3IwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDOCpTWnurOWo9lW6g5
+ dy7lMGATEwO3Hdke+TMbsGV71ios2EPHISGuWVf0BhFA94U01UMEK5POr/BECpRh
+ UCEZr05BNE8xD0ad0k+tE3DJj7KV3ayy58RNQNUtyztBRjYIpL633MR/efNC2Bmf
+ 3i73xDQm7DjslADSHBXLpAXi5vyLP7y5SqzhFTn+5EFZb4n1FhEI4XzzyhTZp+Nt
+ 4ToUQjZm8IoOU+azJBgsDNF8eMJoFRprsX+y123/Vl9XOyUUDV5BhL4Sm6tix0Xx
+ +WbQwnxYE/1UR/U49V8o3FLrNQ3TMfVWtmp66egMIA92KecWGnd3J6fvwetKOkph
+ dkMlAgMBAAGjfzB9MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcD
+ AQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUwg+g5eCkr8cEsjj8
+ tGtyTj4CM2IwHwYDVR0jBBgwFoAUExleeJitChzmy8YGnXiSIWlIRGQwDQYJKoZI
+ hvcNAQELBQADggEBAKQl44Ue6KMP51kRnbtkCM70/aoW/oPREs9fiUUrJsZwNZMO
+ tqa0CwoSk0bU/bVIlDuILfnl3DtnJ6v9T0+o7gxa3/HnX44HSn56q2myHUBeubwU
+ 7YTzeT9uYM02ugGPba0l+N5cDFVP0C/2bLEXpwgn0N0XgCtp1lsYVlQu740Bwxwp
+ 0PrnIIEgmHfe+h4sixJOYDxBVC2qei6xg4+STjB9GmXpPDcFFrvjmDA902gQ3tpU
+ KEueY9DFD4Ogmld/IYFp5E4sIgVKz0wDj20RxgIC359xd9Wb9Q9jn6Zk8hSQBuHK
+ rXtcIc+7v6V0xWjoom2Khm6oaF6iAOyAfjTVZbk=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node2
+ name: calico-etcd-anchor
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDyDCCArCgAwIBAgIUHZB4Lc0HwU3WW3pdi2M4QirQrtYwDQYJKoZIhvcNAQEL
- BQAwLzETMBEGA1UEChMKS3ViZXJuZXRlczEYMBYGA1UEAxMPa3ViZXJuZXRlcy1l
- dGNkMB4XDTE5MTIxNTAzNDYwMFoXDTIwMTIxNDAzNDYwMFowJjEkMCIGA1UEAxMb
- a3ViZXJuZXRlcy1ldGNkLXBvZDE1LW5vZGUzMIIBIjANBgkqhkiG9w0BAQEFAAOC
- AQ8AMIIBCgKCAQEA0ql5A5vFqwFwxADXxs8701D2bQk360Qz/ww43/rY6w984APi
- 3gEtYznondWBgTYTp1dr6vHP6PC0UEeEUHb683C+ePg1/T/v2Qc3hV5Q99A4RoI4
- QXc4R8R6GEpncsdHI7gn/7fKPKD9diuE2AfNGJb9Mv3qWMxOx1J9BxxdmyPpYWkW
- fQWLKELpC/dK1DmaalkgUeuuaOPrNQbvkqQOItZB4ToR416VyYu6/qIhUBTKavs5
- KYvjrT2WvLAkOQvXqe6rd8gMNcTlLn/u/RR+MYj3gRVfoPDYJdi5zDTeRJ5ya6vr
- 5OC9k0vY+z8YIzCqRunmD+2q+sYE3mR2gnxJ3wIDAQABo4HkMIHhMA4GA1UdDwEB
- /wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/
- BAIwADAdBgNVHQ4EFgQUWYIFRafHB1YezORb4v6QeWOxqJswHwYDVR0jBBgwFoAU
- FDHZNBr3Zu1wNNAcoJhvzFZv7pEwYgYDVR0RBFswWYILcG9kMTUtbm9kZTOCCWxv
- Y2FsaG9zdIIta3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5jbHVzdGVy
- LmxvY2FshwQKCpgXhwR/AAABhwQKYAACMA0GCSqGSIb3DQEBCwUAA4IBAQAENv1m
- yDDH4xVEJonz17uvDVZ3JHE2v/aTrRPZLn/A+QmjAcQa3YmI0+Mi9SCWKWV66yVw
- zumCPymmGFM+LsxxxXDuYZWbM+JEYalGd2Mn5b9BWV5j+wc7hSJUR5yjEYRVQaHP
- YntKwQzJq/pFMDQQ7yt4nRXq+LJoFOkiOnbu9cgYDy8Otn344JDwsmhg4hOnKV2U
- I9hZv1d4FIPtsQaF57RkTZT1ShHXP07cmoPZqWpSVm16WLliiwUJIGF6Rj49cDEl
- cKum6j+5mjROxi9CLi/xc0Qc05jsTeivevWQJkalF6nTIZZakbmjjze6utVvt17N
- Uf9pejgkrwqvYyal
+ MIIDTjCCAjagAwIBAgIUfJrdwjpDF5TXlDK5T4dSM4S+nqQwDQYJKoZIhvcNAQEL
+ BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
+ HhcNMjAwOTE1MDAxNzAwWhcNMjEwOTE1MDAxNzAwWjAWMRQwEgYDVQQDEwtjYWxp
+ Y28tbm9kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPmW/xlOLZUi
+ Sa6BbJyz9oiw8Wx604+xPDVm8LTE+aDusz5T4oGA4KA934+/lyei5Iz55xktew/R
+ SgsFcex0yQl6wwakh0Q8dN5M8sNtmcoZ2DjZBg94l4nGJeI2vPIoGJH+v23Gk1/Z
+ RBiOEN+5nrAJVikJqcI8rqtS+I6rk0wkxiXH4z7AFFApuH4aHYrfQLk6ITK0n3pd
+ kSO/AMm1qfBvN7yheG71RcgjNUdP1ldJ+JDaBwZU9aXYwJz5UNB3mxq6UOcy1uLy
+ md6W+BfVBZaj+pRdHpcwaaO67NaQEi3KHMNvWrHirw23bs/zIRdhvAm1Ky6zkpqG
+ vo65oaFVY68CAwEAAaN/MH0wDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsG
+ AQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSq3Nrn/zvO
+ eQ8yZYLYWCuCtnyq3DAfBgNVHSMEGDAWgBQTGV54mK0KHObLxgadeJIhaUhEZDAN
+ BgkqhkiG9w0BAQsFAAOCAQEAb4f7tLKnK1VsefE1wWOZ0Aqd4VQhkObDkjOjXTzg
+ Df0PSZeG9UKuhkF7dUSH0+21Vb8HntFVTotgYI4Hv4iHqYDIPQHDq0Iqx/YxjEw6
+ pG6FmQmf9wjzAcvFCXjwRdCSztnOvHf7jH7yjCCOIHClbpjFfyN23TxWq1j4hhsQ
+ kfFNVMRNwb2vo/3ZIlsIPBfqUIhqHZiaMmsho0768BwTobMPDw2FDYzs5f4vzLda
+ HwEz5erz2tV3HeLGB4jyTizvZjhbTkZMgt+W9FSGFabJIeNK6/RMmr5eJhlJwHW8
+ 2LnkphHEbEvhbn8sl5kwC60SJWHuIGbQz6zj5A1xvTLgyA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node3
+ name: calico-node
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDzjCCAragAwIBAgIUFMCgXlXP6dZGwVLeEJ3Nib8Xg+AwDQYJKoZIhvcNAQEL
- BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
- dGNkLXBlZXIwHhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjAnMSUwIwYD
- VQQDExxrdWJlcm5ldGVzLWV0Y2QtZ2VuZXNpcy1wZWVyMIIBIjANBgkqhkiG9w0B
- AQEFAAOCAQ8AMIIBCgKCAQEAoCCx9m9J9KAt5GuuIRwosVPCp/OlWXs1DANK3LmT
- F2Wo6BboMYiarxBWRDYz3YRV+3JZ3TCEtRKphYFBnsK3yRTtZROyvulJ2BNRPMN5
- V6cNy81pnk7QPYxZcc0+ed7jG0CnLMbc5qeFp94oqKoXt8MoFdMvzcRrGoQsXutx
- YiROTxhgLKIPzsxJYfdZf/kzBzcMPwtyERJ8taLNKB2jDu6ls5xTOGgcTb+Z8wBm
- aH9LvgpouR8Tk6caPsqK0BtaD//XHcxPHRgw9B/yLKKnEz8mD0ItwFwBccG6bXhJ
- YtpkkVydA3xcFNHoS+fWg1DPallolFLVxL/CGSu5dsZu0QIDAQABo4HkMIHhMA4G
- A1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYD
- VR0TAQH/BAIwADAdBgNVHQ4EFgQUNpp28YWu0JpMHkI6/Cxw0yvQpEwwHwYDVR0j
- BBgwFoAUqvYPfg9bkAppfVRSn1a3KAivKA4wYgYDVR0RBFswWYILcG9kMTUtbm9k
- ZTGCCWxvY2FsaG9zdIIta3ViZXJuZXRlcy1ldGNkLmt1YmUtc3lzdGVtLnN2Yy5j
- bHVzdGVyLmxvY2FshwQKCpgVhwR/AAABhwQKYAACMA0GCSqGSIb3DQEBCwUAA4IB
- AQDDY2i2GumixPiT+9OPIqy6hn5B/uncJVTsE5eaHSek70kgxmnE1LX7TMu8jSk2
- m/XeXAuOwzohYZC9f7PnKijtzRFMdpRbyAvdRNrLh+8urr17eDDMFIhfF7Ut1r11
- BiObL4MRQFNOuorthoW77wqd69L/6d8y5NBLUcNp4C+gqfEaTjUnNjcS5dzm1kcC
- pvxo/BgZG5EyjCehU1toKUV0AyOrGA3z2gh1jv3dDmAOjyh9baBVdpM4yrP38ppu
- UL9DkqVUbb5XhtIUomPh+7XBG0vxpBv0WddMm3HVUk9payuinGnqXMXSZsnZKow6
- uoH9C4KCxUNK/Ntt+COsVb3v
+ MIIDmzCCAoOgAwIBAgIUWyvGV6MB9ynIYd+bt5XXbOSdQw4wDQYJKoZIhvcNAQEL
+ BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
+ cGVlcjAeFw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMCcxJTAjBgNVBAMT
+ HGNhbGljby1ldGNkLXBvZDE1LW5vZGUxLXBlZXIwggEiMA0GCSqGSIb3DQEBAQUA
+ A4IBDwAwggEKAoIBAQCu5Vu0MeAMkVZvhTI/6FW9i4UBjGtxX/1Mo5MecwlJx6CS
+ 3yFaMH70gRwowxiqtnULFdj/rV7Xj/26ZOahAtt3475iaxZUQ6+DrdtD95zgRDDP
+ VIaa0rFRT42uhA46Y9Ha/vQxYvXm2YA45aBLiPhxmKIJJql40l5Ptu1Dvvvb2ZGS
+ Jnt/n/KqfZYKhMGjrJ/YIELGAwF9DuOiqTHlDZghHKK9UAyqL6x/uSs8dv0/nZOn
+ JKBQNOitkpgN0D1g8K8rYRILdo/Wr1KAsMzcMmvgUYx6Fa1FAx3FTYuGJooUJYvP
+ KSq+fihrIOwuliLODwWMr0sWfFHMuJQAZz+/cB4NAgMBAAGjgbUwgbIwDgYDVR0P
+ AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
+ Af8EAjAAMB0GA1UdDgQWBBRe+OQO9RE2bAcXKzjL6s7VThp9ozAfBgNVHSMEGDAW
+ gBQHIctKzuAgPN5tyT9e2vxggek1tTAzBgNVHREELDAqgglsb2NhbGhvc3SCC3Bv
+ ZDE1LW5vZGUxhwR/AAABhwQKCpYVhwQKCpgVMA0GCSqGSIb3DQEBCwUAA4IBAQA3
+ oFYq8vNaNhTjQErtbLMaKvMV0aRxjyd2QEUW2znWvenLQdgpwoI/9snhyFarirqz
+ l6mg6jJsulCthWS0UGvJsLvV7w9UAr+iJZInjavA5geghwGk69V9zqQAnCaTVH9c
+ EMrRImPOz2tPOEwf1IYTyoc8iLwPRotFmBNF64lHTdJH/6s59/Zh74V38didViGN
+ O0jPCreS8JIKvzv6OTIIhL6C5k0YZBEp18G0x+sOj/IDrb9eBJLMZYyyhbca+WhA
+ iNnGz2NcYtOw5MvJpr19APxSySk3X+4jRAQEic1d1Gmjxcc1hzRFqNRfjjjD74n/
+ vsi/1IqQsD+3/RwEFkyo
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-genesis-peer
+ name: calico-etcd-master-0-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIID0jCCArqgAwIBAgIUOvty5PiB3xzWuzkUkIQZPlVbo7MwDQYJKoZIhvcNAQEL
- BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
- dGNkLXBlZXIwHhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjArMSkwJwYD
- VQQDEyBrdWJlcm5ldGVzLWV0Y2QtcG9kMTUtbm9kZTEtcGVlcjCCASIwDQYJKoZI
- hvcNAQEBBQADggEPADCCAQoCggEBAKg3LmXxJxpsMay5PIGgvk7fjeCNy85Syn8x
- XSrwpbqUNmvobBD3EJQYDgSm/NBydQU/v5gIoLgMnZS+RI0X8NuNH32DuKZAmLr8
- MZvq3UjCQla28nTFcx/gEd9kr0UXvQriltHnddLAlEJvlBtDf+Ti6PeglZQph6Z9
- 33EeslxuZT7NkJyvzuk83tH05EO1XJ3qe4NaC9s+67RZeZH6ohPPLo3jOHlMSEng
- h/LywX/FvygJg/GmBPED8lml+rNGd+OIiyn8QV042y570PCYYuSX3BtHBH945OC/
- f6q4gFUH+4J5Ni5BqRfjMd65ipr+qHf88d7Sac/M2R7LtJTFt1kCAwEAAaOB5DCB
- 4TAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
- MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHLrpKbEMkNFml9NXFF827eFlg7oMB8G
- A1UdIwQYMBaAFKr2D34PW5AKaX1UUp9WtygIrygOMGIGA1UdEQRbMFmCC3BvZDE1
- LW5vZGUxgglsb2NhbGhvc3SCLWt1YmVybmV0ZXMtZXRjZC5rdWJlLXN5c3RlbS5z
- dmMuY2x1c3Rlci5sb2NhbIcECgqYFYcEfwAAAYcECmAAAjANBgkqhkiG9w0BAQsF
- AAOCAQEAGKMyC/XHF9HJMOCxqo6FPjjUQ76U6zXzBhNTkilP5VuktQhyft0yG+Ml
- g6rgWfwHC0omJGEq0xyS5rJ1KMgI2ZEepT+OZt9g8+4Xm7onotnsMx3DMh7csOrh
- K7ANvBsjHTP4PtGiFGnU3DR7tq4ixx51W5N+BFIij8AcjHIZoRFfeX9HAC1J+7Oz
- Ix1GOM7FhhqpUKB/a6YpJkepa1ObqOA7Var5keacmH2xKrunrF3WiFPfdts56c0r
- BdIqWZ4E4pkNgUurDBxuxJDPWQkPdAXpksg5pd693T50YNG4VyFppMFhgJlgqnIv
- PXwl80meM3FfE4qF2o7nTFSAOF0O3Q==
+ MIIDmzCCAoOgAwIBAgIURfumZCPFLSOmxizq15KzTtAr4ewwDQYJKoZIhvcNAQEL
+ BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
+ cGVlcjAeFw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMCcxJTAjBgNVBAMT
+ HGNhbGljby1ldGNkLXBvZDE1LW5vZGUyLXBlZXIwggEiMA0GCSqGSIb3DQEBAQUA
+ A4IBDwAwggEKAoIBAQCi75dy0hzHPJydFf//hUrPuFbOYMxYi5ZhFbR8VVGntCph
+ on0gnJu0qu8HvMQf0m9ZzQc91KGUqmEvES4SzkV2NKd2ONAwI+uKGZp2kCs6Atkk
+ GcRUaefDHjR9VgoPJL6bQkMhm0/tY185hnLpBOouvELNo/4o4Mj0xKtwgKm/JEx4
+ V91hON7Og5QOaF8ZkAvA9JZ6jZCKlKbq8BbV7PWhNXDw4zQ36FQJswSX0wBX9nqX
+ tR6ewEN1hbdPEi2XA+ZbjrTA1Q8LeLAaxSEdW5Hy4CvEiVsnbC6j3RGCRUZLhqd4
+ x4B7nl2QiQNwey/Rw5Q7G9ah4/bAcC+mZRhfw3QRAgMBAAGjgbUwgbIwDgYDVR0P
+ AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
+ Af8EAjAAMB0GA1UdDgQWBBQy2FiPBYopQ+1laVXohMCweINm2DAfBgNVHSMEGDAW
+ gBQHIctKzuAgPN5tyT9e2vxggek1tTAzBgNVHREELDAqgglsb2NhbGhvc3SCC3Bv
+ ZDE1LW5vZGUyhwR/AAABhwQKCpYWhwQKCpgWMA0GCSqGSIb3DQEBCwUAA4IBAQBM
+ QWcVVvipX0tXXDarvB/neMEfqWixjVf7DSGni+R1E3IbVXQ+QE7/xKvGPS2rnZtP
+ 84RWZMXOQOo3SjEYWGquQcRtxtJOwpEmk7TwONusLQ6/0g9TN/T+7Mpu94pL7Zqw
+ Jyi++XOFoHkdQOlvf48aAoS17a/HRJO/DSSyQRj5f8DaNpKJtLZKixg/LjSLvyNG
+ ie4SgxWdp19w9ijMHXTNZGR932M4I9hetBCkpXruXZ9U+PD+Bgk8hvhSiiZbsAFk
+ MtZI2vUddpt/rmELBaxMCXK1NWDSAUEggO8uRkJiee9oa7ZB117zlwd57NO+EYBB
+ yrQWfGQ+xl9lwSiS9K7L
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node1-peer
+ name: calico-etcd-master-1-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIID0jCCArqgAwIBAgIUUeEO1cFHRA6DHGH9rHOuP5Eufx0wDQYJKoZIhvcNAQEL
- BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
- dGNkLXBlZXIwHhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjArMSkwJwYD
- VQQDEyBrdWJlcm5ldGVzLWV0Y2QtcG9kMTUtbm9kZTItcGVlcjCCASIwDQYJKoZI
- hvcNAQEBBQADggEPADCCAQoCggEBAKwoFWLanhmaTJSwSXZRwiwqt1dhVdDx9rPy
- BFKw7b1UdtgSDgY1Gc5Fms2OsNY3if9I3ACIDA8Pvv7wmmPAO2RPqaIJXUDOzWSy
- dwSvL4Cy7c0S2yqdyKT1s9NVRvNpUpPr3cdEe3uO8HiVjV7iH2t2xHUtFwOryKS/
- MdSl1QiwOGAbb+cj/JGSrzo77Wgk5HPTfSe5YUvXfNgnMwRWTAskY0Mc4NjsVky/
- UEuh3lWKruq5jJR1J53bRu26+n/6fNDzZDd7Hjy0ZA6NJ7OmSgpqaACJcESd67vy
- +PovKjWvGw/+Xa6pzhaYSMARL87n0roeDMV2xIe3tELffzwpg40CAwEAAaOB5DCB
- 4TAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
- MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFP7mWhypakSNFVKh/VhXlTVD3vcGMB8G
- A1UdIwQYMBaAFKr2D34PW5AKaX1UUp9WtygIrygOMGIGA1UdEQRbMFmCC3BvZDE1
- LW5vZGUygglsb2NhbGhvc3SCLWt1YmVybmV0ZXMtZXRjZC5rdWJlLXN5c3RlbS5z
- dmMuY2x1c3Rlci5sb2NhbIcECgqYFocEfwAAAYcECmAAAjANBgkqhkiG9w0BAQsF
- AAOCAQEAPCNhZ8sW4+hrptDoNeez780AzWkcmQEOSChFygE3oMqWaQ7fFow8rFsP
- rgqWx9BfuUWo3eYaJuiozPSBc2wTdIeqzk5M9NvSaiIX9+J8FOEiDV2eZaq6dhXV
- 7eQMeSNQB12ZUQ3tNc68MDC1PfOaZbqNMDpNnsJFbYirUbYgNrNtiiOMCWG0G2/O
- mXhJKSNgUfAtLZSk2E7g2Buee4dQiJ0nY7/k/kFXPq+SBNvHhG6+NgGLBhVysBb6
- 289/XH8HUl20Ih7nKHgcRqFuCbGpAVRuCKKpNUWTdTmCo1/daFI2+l+zoDg5fJli
- JlwLxlcgA17iD8lBKyFfMn3Y7LXKYw==
+ MIIDmzCCAoOgAwIBAgIUW2voRgcYol4bYMcZ4g6CZMnoAFkwDQYJKoZIhvcNAQEL
+ BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
+ cGVlcjAeFw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMCcxJTAjBgNVBAMT
+ HGNhbGljby1ldGNkLXBvZDE1LW5vZGUzLXBlZXIwggEiMA0GCSqGSIb3DQEBAQUA
+ A4IBDwAwggEKAoIBAQDPgvdROTmGDCIADg4HQB340OI3PfIr7bwgsppIr6zvlLm2
+ dUDVNmPLb7zD1Dmt7XRT5+/5/XUkGUaw6HACNLRJuqkaLEMXAvuccPZTu2hOkcGv
+ uM5PNTfvSnwk439iuNDxRW1pRwFZ1oGMNj25EO3nkW8QyRRz5At+nAsKe2Srp/mK
+ x/IYV4ZwPPumTWDpptiJcHZnz9+lU/lmFWDi+VAng94s+SH8i1lZumFk2ttl5w+Q
+ uW3lpYY9AqYE3vcqDas3e16VMK7gvOeri28ITetFjmfuPo+EU3zkInUN+uQ8Ar8g
+ Pr2Ig0Dior1gLcKlUD7COLJXq+OLKLzJ6lHIUhSHAgMBAAGjgbUwgbIwDgYDVR0P
+ AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
+ Af8EAjAAMB0GA1UdDgQWBBR3vCRGX9OwebqoqzyyYg7Pz9UfXzAfBgNVHSMEGDAW
+ gBQHIctKzuAgPN5tyT9e2vxggek1tTAzBgNVHREELDAqgglsb2NhbGhvc3SCC3Bv
+ ZDE1LW5vZGUzhwR/AAABhwQKCpYXhwQKCpgXMA0GCSqGSIb3DQEBCwUAA4IBAQBe
+ cwKff9ZtDLbSbTLR7EBsfhOiE/HJsvDubw/hGEIE4o4rbvf2ijVeeD/NxFuv7M0p
+ LCCfQq9I8/uQIF+8+qeiQLyQUcDwnWXyyCoMZY2Iuz6xG/dUwJlomEnP8lOl5MjD
+ kmTiLyn7fRsJS3IJmOkmNJhQwwKE7Os+5F3oZnKyjPJ7Yhj/CbQ6Pw2pvafcF0Pw
+ SpMqfG3XEeUGZvVul3JeLET6B54cixCYfxNn8R5OvinHrOn3I5fnDEDbVQNbfoCD
+ OxPpUiUhtJjgY579M+EMMjgnSDx0sjOAMbGgaYv5opgkg/AYbyWlIX7OHv5TwZuE
+ BIIjo0KOXfIOTLU86M8Y
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node2-peer
+ name: calico-etcd-master-2-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIID0jCCArqgAwIBAgIUBue/3ultcQMirSS5fZE+55lQFxIwDQYJKoZIhvcNAQEL
- BQAwNDETMBEGA1UEChMKS3ViZXJuZXRlczEdMBsGA1UEAxMUa3ViZXJuZXRlcy1l
- dGNkLXBlZXIwHhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjArMSkwJwYD
- VQQDEyBrdWJlcm5ldGVzLWV0Y2QtcG9kMTUtbm9kZTMtcGVlcjCCASIwDQYJKoZI
- hvcNAQEBBQADggEPADCCAQoCggEBAObILFMOukNF58pL0piHn/YTaA/akcLgKdsp
- ZO1dkEylxTd/JQzZSNr9wcoaml0otTYx0zrFMeoKUBJdUFC5FuAA+F4agdCDax7h
- LUIrtTEypTSACthZXyArnPlkXFRbSSpdGdV6W46LMNgSDrbE53wOXK4ceeHbxPLz
- WicOfzX/ra3SbwTMWht8ggaj2ouipt+veOE881qqPEFKFVitjAp7n6feWUb1miD1
- zSoe10Lokw3mPCArzJQ/DhXjZ9buaVgU3zx7RiZ/ObJL9gSjQ5EZc3a+dj2nphcB
- zOtfk0YNp2Sww6IngkTELNsg29wIdtICmfR/NsFBp8zmHupfBUECAwEAAaOB5DCB
- 4TAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC
- MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFOONvXm0HriRGwH8KAMYmqUszJQdMB8G
- A1UdIwQYMBaAFKr2D34PW5AKaX1UUp9WtygIrygOMGIGA1UdEQRbMFmCC3BvZDE1
- LW5vZGUzgglsb2NhbGhvc3SCLWt1YmVybmV0ZXMtZXRjZC5rdWJlLXN5c3RlbS5z
- dmMuY2x1c3Rlci5sb2NhbIcECgqYF4cEfwAAAYcECmAAAjANBgkqhkiG9w0BAQsF
- AAOCAQEApnrsB1DhRvtJEoCtu+5lA3hGUqSn03aW8cUKNl0SM4uvabUzejtDXgSn
- qz5oLcUp6J0gytQRT+eDn2nnt8OpIWy4I5KwYXKzKk3att5ldftA1cLu2rFpjQrw
- XrB85cBfB5Tj7qMN3ItELeAlzQDS0woJCzLV0svODWOpXr9Tj5avR35bWBK9+RHO
- vdnPb60rmG+TDcA0VT652tddOo85dS8c74sqFCqkodBSSqBFyh/OVgwZX9+r6dtB
- ZyM5dDJYk9XcVI3JiPZWr++DPnaUGwFELUyvSlSRDR6pB+ytg9yEikcNwUMjKzj9
- ePjtS6OiwU6m25uFQy0YRh4BY8gOtQ==
+ MIID4zCCAsugAwIBAgIULP+O4Q1FazFmbyCAfHAUI1dfCq0wDQYJKoZIhvcNAQEL
+ BQAwMjETMBEGA1UEChMKS3ViZXJuZXRlczEbMBkGA1UEAxMSa3ViZXJuZXRlcy1h
+ Z2ctYXBpMB4XDTIwMDkxNTAwMTcwMFoXDTIxMDkxNTAwMTcwMFowFTETMBEGA1UE
+ AxMKYWdncmVnYXRvcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKmU
+ oeLD/TKaK8/DnjTtiH1bzI9G/4WkyZBC+TKiVd+WIBxaAFgfgg4H7rOlMRrdJAGJ
+ ty0MY6MQv41CIvnS3TM2bwQkpJGKbBkZ5uaVVM7Tl4FHMp03QLI163+6XCiat3Vf
+ KUvU1mnBC6RsJCRP67KDa0sAker6okpi0ilvAsNdAn+2B19Z+6VmTeIv/kaP6g8V
+ OOJEh9khF3CN/wvNS2tHxujliFyQqfSl9cAyiCfsWJYiS84LYtoujO48TzuHBX7U
+ bWJm+vsGpzdwrgFHx/ZHEItpwe98C4aDpeyMFgASxBou32nGx9QFr8UBmu2b2I1f
+ rhzaEl5p+D2JwOSkrk0CAwEAAaOCAQwwggEIMA4GA1UdDwEB/wQEAwIFoDAdBgNV
+ HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E
+ FgQUI9Njs4pGUHBWTO2nJg9LnkFVf2owHwYDVR0jBBgwFoAUycfLGZl5SMlUcFm8
+ sosbWfBy6XUwgYgGA1UdEQSBgDB+ggprdWJlcm5ldGVzghJrdWJlcm5ldGVzLmRl
+ ZmF1bHSCFmt1YmVybmV0ZXMuZGVmYXVsdC5zdmOCHmt1YmVybmV0ZXMuZGVmYXVs
+ dC5zdmMuY2x1c3RlcoIka3ViZXJuZXRlcy5kZWZhdWx0LnN2Yy5jbHVzdGVyLmxv
+ Y2FsMA0GCSqGSIb3DQEBCwUAA4IBAQBASEQIjn0SV2YA8suOG7c42RA5kDWyXmSN
+ ByVczdUMsp75iKUPMttVX8/riElCyZNaavIN5tvz3yqRTJjiGzglHSnchSmx7448
+ pFDIFoAxmWHBxMj1pALjOG71x/bVWKQloHLQPAezOehTT/EDyMO/TKiwSe6koSw5
+ JwsYRaKy50uZCqLyvVsGsV8HlfKWpkj5HGUTjmkFFeUfL1rjsDkQ44lFShpg2RTX
+ fvktu+gLkN//SpvcDeA8/Fcm9PVdLWA8T6bbsIduq2QA9j3C5ah6aoWRAdx5C767
+ IqHFCLZ4rhG7I9wdRXkco+R3N6evDlfNGCzf/XQXtrNLwijILO2m
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node3-peer
+ name: apiserver-proxy
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDSTCCAjGgAwIBAgIUBlqdKQx4oYac7e5/mxYUpzfbejgwDQYJKoZIhvcNAQEL
- BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
- HhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjARMQ8wDQYDVQQDEwZhbmNo
- b3IwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCkj27h21b+EyTaNtl5
- kWTNo58XlsuAmyPVdN+JGhAdcHcoDaHkn0KMZscJfYGqkN5cjSLBXSFOvZbCRjht
- dCekytzjtbiaBRvmNjL+jX9SyUys5fKFt022hIreBolT7iRH8/x6RuVFIW6caQBp
- K84XaFZee5l7nkbVBPWmTlggCYFqOoadIhyHp6FaFY4etSE3i1iDfeJDJS9oae6V
- J6LBKV5EGFfCRv9F+wBb4P1OkflMscmkeUkhhqStcdNHV6/6U5efY7HxHte3H2rh
- 496Dn7y/W4YApTKbKSxqwlzxUQR0GrzBQ/zcW8/5Y99eqs6dnP0KJ8iRD9UkUHzm
- fJIRAgMBAAGjfzB9MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcD
- AQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU6BjXSGqt0eyRJO7i
- uSm7mgqYzQowHwYDVR0jBBgwFoAUwmdoY0QJGBU3jYBO9ip6FsQEjqwwDQYJKoZI
- hvcNAQELBQADggEBAIt2zRWc8qAJN6NRRhXIwj31JeV6A+28lM/8e9t6R5+wzogk
- 2potk5b3EjB2nquL1WsnPx+/mKTp+KpazcgVQypvgca472mQH33pM68gfns2KckO
- kuH8+8sTbtxNJgGBVKBvREMjCeUu/h/8L6rELHOTIQxDunA3LATsOefGlmiEPc2x
- fH9GTdNnhyYhig62gnkgcA7jsOqRIYRT2SyRYS/yIFf8Zx6o4IfdvyIxfRUITYY2
- mgELgXMIL0POQ/SCg4c24fHktthlNQaiyWZdDi+Q1KmN+IV2TnIxqTM0vw/+osTZ
- EPeYAPO8zGwSVSrLthbc8mIqHRwpUu+xfFKxs2g=
+ MIID1jCCAr6gAwIBAgIUNzhI9Vam2bmw/c1Z0nWr2n0F9MUwDQYJKoZIhvcNAQEL
+ BQAwJzETMBEGA1UEChMKS3ViZXJuZXRlczEQMA4GA1UEAxMHY254LWFwaTAeFw0y
+ MDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMBIxEDAOBgNVBAMTB2NueC1hcGkw
+ ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDha4audmdnUNw3YFdrfNRQ
+ vxECxcTASO6zohPJVXBJM4g+8ojDWICMUsMG3XLA5BxZrP+xt7WaShOK2hAMW8RC
+ KUwEepw6271MBy1JrQKGeHTtCb/Z+wX2JSDYWKdCX9R1YhUc/LCOsvRx4vm/jkQI
+ 3jTNNeCw8QEaZd+b9pLCrpW5NYYgGdutKEWxwZwOx4vOEKEgxSmGAZ6qz/0cVu7v
+ cPYECPBp70J5IzGUDsFne/U4IrXrrJQrf7V41dwa3/9j3cxumYyDm5RZFy4jPOH5
+ hkgyZedPG7CyEypyBXAGFuuLOM3HtBp+RzSOJhexn46D3kgKwrgs+KwsyVA/Cf6h
+ AgMBAAGjggENMIIBCTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUH
+ AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKFgwObqDTAJCsq/
+ e2g0x0YGKcgnMB8GA1UdIwQYMBaAFLPcRkqGmKiL9SeL0s6uqYf2nWyqMIGJBgNV
+ HREEgYEwf4IHY254LWFwaYITY254LWFwaS5rdWJlLXN5c3RlbYIXY254LWFwaS5r
+ dWJlLXN5c3RlbS5zdmOCH2NueC1hcGkua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXKC
+ JWNueC1hcGkua3ViZS1zeXN0ZW0uc3ZjLmNsdXN0ZXIubG9jYWwwDQYJKoZIhvcN
+ AQELBQADggEBAEZ7GdO1tiLwotHHVQBMa6uLnfLfcRh2CZARXDe97PNzXpvdsCmR
+ /aw42P0aFhW6mcHgoEn4R8nidQp/g+549SFboTgBQoxBjHLM79dQIHpvM8SD1XE7
+ upSXUrJ5//tLeDS31DdsLA9k3aB2vRbKznjnUayVkOwsiXJPUJBtq+YhSfu+KC0M
+ AAohy/EgP5R5gGWr5wrLV7cT4nk2FEGH1smpPAPTxGw7JlR/s9LaWgEV+gszg25j
+ Q5XgYKnLnI/64zW2jMfz/PxBcmEYkIkmVvE+u5N5nJe9F8GBmDXgzLFRs3nO425u
+ Av3O3Y0XmjL5zmiQl2HOyyOMir/pWeDbeNg=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-anchor
+ name: cnx-api
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkTCCAnmgAwIBAgIUaUhNNlUtZXqu6lIjcxiK1gjaLsIwDQYJKoZIhvcNAQEL
- BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
- HhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjAiMSAwHgYDVQQDExdjYWxp
- Y28tZXRjZC1wb2QxNS1ub2RlMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
- ggEBAK+82kj2ahlXwvy/vhmOjid2EVjzS5EN5zORkYfNmf2j6Scqlk8VR0PJLzTs
- hsVwEtvUwTVOvMk9umPbWRaiOVL4h1ny+otvvpVlF8FBi7N+a0CtJVNf/tTG5yeZ
- 2ykLFrGMbFxsyD1Q1/gqby1Rz8QJPg1sStRKuZyc6zgRUCkyc61iUOUuU1ZNySlQ
- DmpWWlGsGeNsvX6YZZKSP6BtcGDqR8v1cOhyIW9m4M3X4uFzC0KFWRQ8948Ce3x7
- 4bu8Qj7st9DE+UQoxu8tzRpz0RfziZsP5M4F7WZibPdboSsHq4SVLlH2Nw+FtHkq
- RjyHA8QSw8gvSCJlBkOidORYdFsCAwEAAaOBtTCBsjAOBgNVHQ8BAf8EBAMCBaAw
- HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD
- VR0OBBYEFJPFkweC3RTeFjQW+30mTlgp0EkqMB8GA1UdIwQYMBaAFMJnaGNECRgV
- N42ATvYqehbEBI6sMDMGA1UdEQQsMCqCC3BvZDE1LW5vZGUxgglsb2NhbGhvc3SH
- BAoKmBWHBH8AAAGHBApg6IgwDQYJKoZIhvcNAQELBQADggEBAFQ7O2NYvxk5nCed
- ZVDGB8ASlH7JVQlj+99DQrjngDlJKJ9rE9CXzdoisY6hLGTb3GFIqFamhNjp2zKl
- HVEMQQv7TVrnXHXwOnCKLynMSl4w5r7LbKD9zvZ+/LsjwM+1gmGQJ9DQ2Re6rNUw
- EElRDOwRK0rgBKLg9jF4g3Znz2VTroDqT9rAa3ERDUCgLMXsr7N78hbZiDPnEJIX
- GuUBRQraczt67SvrtqMKEnLpqD2PZ0K+2qjp92GFRIGqDJJLFQGRsM12KYBLd8vS
- 084hEGRs7tWKhPTyJAzwsZw2BLuKSKEVZIZAInFynjeaAQJz1A98OShYrDtXqDQP
- NFG/iJ8=
+ MIIDdjCCAl6gAwIBAgIUAJSNrBh4PQMUOanJq9zC/ZdzC2AwDQYJKoZIhvcNAQEL
+ BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQa2V5c3RvbmUtd2Vi
+ aG9vazAeFw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMBsxGTAXBgNVBAMT
+ EGtleXN0b25lLXdlYmhvb2swggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
+ AQDXToQgKQU6+I65EVc1VjsIsvzNRl+FgluGCQQ3WijaiGkEBjottcw3sgYOZNQb
+ gWcNiRGBIE73yKokbj/N67gdrsHJFRRE2fVNBLYN9YEbmYrJU/nePRjD1Ec6Uo7e
+ EAv1Ts8bvmKbctMd0VnG1JQC28zq10cv2SCz98sWL+0LCZa/15rI5LkyybNT0uEH
+ sal4Er8eZ/aTUcj1HTOM1AdtI9RhZxhuW88gZyMBqIbsl1s85cw+gN/ZR7NNw6mF
+ H3Of8ki5plXfrcBOHOimp/jhBY9UgHbwKIUT1Ig1d1z66uJHj1xFR+OmJCluKpiG
+ k+D2SRIkHm4B2lu49eby6GsFAgMBAAGjgZwwgZkwDgYDVR0PAQH/BAQDAgWgMB0G
+ A1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1Ud
+ DgQWBBTbqzAw+BGi9z3CdVQLbj01CCiucTAfBgNVHSMEGDAWgBQjNAQ9DUXrBqJn
+ i3IXwLqZslVvOTAaBgNVHREEEzARgglsb2NhbGhvc3SHBH8AAAEwDQYJKoZIhvcN
+ AQELBQADggEBAKSPGbsPTd7MtklWmZ7GbrVrJ6l+5uGx6go+K94xiJUW/8MnK5iA
+ T+hf4Q5xnyShhGJCG7tRyBFymG2/4gFuuRPT6IuvRUOMeEqKKiliEn6GyvFAlCmg
+ 4zR9ld1tyKjJG8Y+IdAF0EDPGf0BSlk6GInI81zbqVFO3tjEaD6MVmhYCCSXU/YC
+ WyPr2iZyYvaSPf7oW8VIXqIj3ZfLsOoGbw6tQTyAG+L1wfmWeOMjWRUj+yqF9cct
+ BnW3QQ80c5akn6p0JjCqVeNn0TDVZdontRnGUy1P4t5Oge7CfBSnBFhvw1dh41U/
+ M4h0hAnk6pN/iTq1MYjRDI7EEKGoUgMUnvk=
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node1
+ name: keystone-webhook-server
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkTCCAnmgAwIBAgIUG/HxJEfNK8c2J9T7ljGinRbQRXwwDQYJKoZIhvcNAQEL
- BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
- HhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjAiMSAwHgYDVQQDExdjYWxp
- Y28tZXRjZC1wb2QxNS1ub2RlMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
- ggEBAPYf37iyRGEDne8OambcL1884sIsCDzWdUvgEfi4NS/tK0FntK3+rNgVP8rf
- G10fsTHniiXUlmnP6KqQG6r8g5iyRAzmW61DICIPJv0k+wJxAPCWYG9404WtQ1ij
- 5MXKHQYaAWP72+dPLeDZrji6H+J3mePLuPusFKDeEzuo7WDXHu1uVzhn+/lryvHd
- +u2uTKv/Wo3nEMoA7Nr7oox0th4RzOfJ4bH3W/yVwLESEy9kdnRwOXGeK0jC33ig
- lDQzxDysb9mVq0xF6FoYxGmPrUPKdLFljNsKXNYRdr6bucuayCBxHcnk/VPGyFf5
- 90YZjk1RGsR4tt2YFpfJrrjyB98CAwEAAaOBtTCBsjAOBgNVHQ8BAf8EBAMCBaAw
- HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD
- VR0OBBYEFO1E1SrKiRQR0e/Rd0SVV7ENJh63MB8GA1UdIwQYMBaAFMJnaGNECRgV
- N42ATvYqehbEBI6sMDMGA1UdEQQsMCqCC3BvZDE1LW5vZGUygglsb2NhbGhvc3SH
- BAoKmBaHBH8AAAGHBApg6IgwDQYJKoZIhvcNAQELBQADggEBAEOcXCuPlGzhUQQj
- ucNIjRV2Tq8k3Vhbh7sUaD8SU4rulfQ/IvfeXucq1V4Ba5BG6wB+TGp5NGBumFsX
- faybLTu15sslS79gXPI+2zgyACDH69WEHQm1c1Nw2z1UytZ738iuEw6p4CeJe44e
- WQ903+gYSQWtxZNtCEbth8qrzq47PbLNGwQmZ3KoBqpbsWJ6vZHs5inN4QSR9JTW
- cOiI+nW367YfAjIjwYs4scoHPWjGTtPuSkILY3n80bsWtZuZtHNXlFWK497z6x0y
- XLeYy/gaE1rYkq/9jFx/ij/5pJ/PkNPEIGM/2peL9jYqK7HJoczle4aej203S+6D
- F2RxWpk=
+ MIIDWjCCAkKgAwIBAgIUNi+zLK54A0whlWuDgwevaTh9+YEwDQYJKoZIhvcNAQEL
+ BQAwMTETMBEGA1UEChMKS3ViZXJuZXRlczEaMBgGA1UEAxMRYXBpc2VydmVyLXdl
+ Ymhvb2swHhcNMjAwOTE1MDAxNzAwWhcNMjEwOTE1MDAxNzAwWjAcMRowGAYDVQQD
+ ExFhcGlzZXJ2ZXItd2ViaG9vazCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
+ ggEBAOOLfL1boyt4m0bY3xXXBOT48Fg0O3/Ir49mJa+mh95RGdDNZSkX0ctauzsz
+ Lvd4uXLwuXutNIYqNbGIdVEkuhS+GJ+jKEWWlPOwPljPwChoyN3znH68OHjP06aT
+ H6+v11hgZtZfaBTvy9RwljnvoajIUmYRGVhuWne6BCQ2yvuoy8iJ3puanE0PG3pC
+ jag1lM0lQSkN6T+ieq/kn/oi982AjK5xu87MMs/7v88KE9hq3CHU1buC2Bh4b/DL
+ 2BthnzyUa0/4eVSTZkcJ82gRihAwz6xQgRxnhBtX+XNt4gKSU5/g2ZOAjTK4rd/H
+ fuADuBxYQG3qclnlDqNID3ErLkECAwEAAaN/MH0wDgYDVR0PAQH/BAQDAgWgMB0G
+ A1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1Ud
+ DgQWBBQqFm2qmen+zh+tOn7HQUIcjbc9WjAfBgNVHSMEGDAWgBTVG1CXgktrCZW/
+ puj/5Ot2LcLssTANBgkqhkiG9w0BAQsFAAOCAQEAkf1GZQUxam3ROfD2INPVKfeB
+ CAfNG3VygFFqfpO0eZsMRlbBTeoPUqMlsKwfbIVJlNoRzfTCLmwea3uSf/EGw/06
+ o7lvpdC0INLqK+i3AZYdc8nJdsyo1S5ajojeynkfb68fRZFO2tevwCRLXzbDVUsY
+ 2Vw/s72RGxsK6rEOvx8NxxSE+ZBC0+B7zR1VR4LDM9Z7iFrLrGlczyXp+DWATYF6
+ YNehT7NZB0p8c9CMO/eNUvHPBrYZr+fbRBPZHGzA8kXacU3SPngqmw8WOVf42fi/
+ +CL3CqjLg6ApAMV5eK/3qfpWT8BVyLecmILNYzXBfeLYtA9ZoGIR4QFJTLXxrg==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node2
+ name: apiserver-webhook-server
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDkTCCAnmgAwIBAgIUZ1VmiYn+1QtFYmd0Z7+742YiC+0wDQYJKoZIhvcNAQEL
- BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
- HhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjAiMSAwHgYDVQQDExdjYWxp
- Y28tZXRjZC1wb2QxNS1ub2RlMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
- ggEBAPb7nnKOp8yW9k2vW/JhMYtS36YEtPPp2hL7g0Sp29RQbI2RX97ELFZFSLvt
- y3A1J2OwQnYhoJQWZwxOXESmKdO9+X2qcMPkAQDdjrUEXdbsvaFQ349x913CWLpk
- lPznP8JlcLzy1x05JKxQccgyZjwlxFf8lwLnjCWHA+KTqiHzil3hk6DeHh7b5miw
- PD3HpRyup6oBNMOJrDffHuHZCAnqzZvBt7amUtIFpXcXgkR0fqaNkrM1zy2OBdDn
- bW9kmt2G0lv0yNPsBwBbPOeXKqQS102WK/PAbY1OD865QeuZFiN0NggN5sqHw4Ek
- +nK76zYsGLixgztpVMm0DI39WZsCAwEAAaOBtTCBsjAOBgNVHQ8BAf8EBAMCBaAw
- HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD
- VR0OBBYEFOlffk1fIN68LBcIsmT4CPCC9IlgMB8GA1UdIwQYMBaAFMJnaGNECRgV
- N42ATvYqehbEBI6sMDMGA1UdEQQsMCqCC3BvZDE1LW5vZGUzgglsb2NhbGhvc3SH
- BAoKmBeHBH8AAAGHBApg6IgwDQYJKoZIhvcNAQELBQADggEBAJlBEC/30i7sLtjA
- XUYwUAo8DYF5HOZkXKQ+LtNW3N2KKTNJHuqSG+cO66nyEDDFKOUECOgDcEL75SRu
- kCb4e3bCEOcc9sVyjITQ+jg3jhH4TzuZcHkIWqNDCVTHnHNRXfJqPRFntHakhbDU
- wblxOaHe1eee9edGI4rx2aEybYBwhhisxNaPrI20cjR0LClPcDJBQe89L7DSXVc3
- saw5/+Mmbwj+VlplbgKE6o0WRjR6b5fp7oVCV+WM6QxQc19WVoi5R3j/TJWh+inh
- Mcer46YxNf0Lc+jxxRGXU42A+Bjw8vNy9C3QJA30Nr8D8LXrSHWYfTGpHqgXaPSN
- VOMkgmU=
+ MIIDkDCCAnigAwIBAgIUX2IW+5D3+2iBqU2isfU5NuW31vYwDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMDkxFTATBgNVBAoTDHN5c3Rl
+ bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTEwggEiMA0G
+ CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCr0zwf+DglCmN4s5TTclnawnfq4Y1L
+ cCLLwqLfr2qB0MP4pjmw0K5dUeLgeStWkfE3UDANnawBVAbToTuzptU2IV+xRY7A
+ nPgFG+Zkuxa88tdcW+gjWY6Th2ywdcYQcswBdhCGe83g77daRV9tj37Y0SqVaOeZ
+ BJlTJnUvmkXgYJHZWg6ufsdG4Zi1oKdQczOZLwH6rF3Y6OJYXMuPcap3phr55dSI
+ bmj1AXU5Vh5g0Z3hWCsRtXg1aNGNQlbt7oyRNw1chXRGsTpixzuQHIi8fc2OhEAf
+ YdoI5Urr9DHkOe2IUQPQb9rQ78U5lXMxxqoWJnvuTe1IdM52J7EnQXk9AgMBAAGj
+ gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
+ BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRyKP3DRrtiZl7gcdPHW4t1IRP8
+ uTAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzAcBgNVHREEFTATggtw
+ b2QxNS1ub2RlMYcECgqYFTANBgkqhkiG9w0BAQsFAAOCAQEADhd2P3bUK7Pv5oGv
+ CDYREYrB8X8z9WS1ZY6pDApWJmfqFI+zPuyQYn3OfQNGdSP/SwVM986EJntOT1I4
+ +rc7XYxLsmNn67moAiY7T0tBg0XzJbQAshL2WQC7Tu9IQl2oXUK5BkYJCOc3OuJ5
+ SjnNuvwDb0IDHihAfh7mpxWIgu6VcAfmo3P93O5SUWgbjdD64Y71ndpl3AKbC71d
+ Gy7BZNM8yqy3d/ykeSK1tHassQpYRuyrfvesl5bv9bvSeaXX/AeimDwbxWfmlfCf
+ EXzEvmcc2LDprG3pUBgwABYO280fXaYpZ9D4Bo9lIRfsDcdd+8OGzjKlM7uN2DvP
+ AxYU8g==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node3
+ name: kubelet-pod15-node1
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDTzCCAjegAwIBAgIUDIR2JwNf98wq93B/4iWlP4Nl0VwwDQYJKoZIhvcNAQEL
- BQAwKzETMBEGA1UEChMKS3ViZXJuZXRlczEUMBIGA1UEAxMLY2FsaWNvLWV0Y2Qw
- HhcNMTkxMjE1MDM0NjAwWhcNMjAxMjE0MDM0NjAwWjAXMRUwEwYDVQQDEwxjYWxj
- aWNvLW5vZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYbqzEO5VA
- KCLQ8p4/OH2O9lC/yvtYvltJHL185BFbOVUmkSDX43UAuOngW6BjTJKCEcuAls6M
- EVkL+ZZk1Yy5ylLXQMr2N1rEMyqLQwGaYVEAw4Waf3/aaJDK4HgbvqG1SUZ/xQDe
- F9aT3bHNGu0ZHU365Z0Fk46GmqqLJ4P7jps0slU1kwmqTvn/0fdZyVttlS3Qz6lg
- 3kD0CjNnUwmjCWhkddzlzLDdc+4wj5YLnxvalScLrACn3jyrbo5buXHHAgiwiVnX
- TgwcnHiCgl36TOK8TIAyvKKFCJReM5nvShWZN1AM2kKMhOMA0fNlYRG6pLB8tkvZ
- TT4R75fzHmizAgMBAAGjfzB9MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggr
- BgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUDqis5BI9
- zFsEUrdnnugu+HiHf7cwHwYDVR0jBBgwFoAUwmdoY0QJGBU3jYBO9ip6FsQEjqww
- DQYJKoZIhvcNAQELBQADggEBAMa68AQlTLVOJ0dt2UQR963MfWX1aiAi0R5Ivzw/
- WqJCThma4s9EuOZLTSpBnqfvifaG9mBS6YTI0jnQJsJ+yOSDJWwlQFmAvUP/bcuw
- aDuf68SbsOAlqS037kf+/1CkeCfGzsG/Y/ZZOtht2tMk9plEz+KUXDcMNr8LdrkO
- O/QtdMwLp/omXy7hfI8J8X8tI0c1ujflkBdkSXXPPfnXHfUpiJdgMsFj1rgX66ef
- mGFruifunzHuSeyPA1Zb1IivnVvjjUVwcEHV07tRmkorlMhkNGs3vVpOMfeJGxEB
- ZyS8C0Egmb5BrWV9LO/vLHHxkNXk9QiJ62pLEkk6rRuojVs=
+ MIIDkDCCAnigAwIBAgIUIfcgivW+f2rrp8mim2cIu0nKoHQwDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMDkxFTATBgNVBAoTDHN5c3Rl
+ bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTIwggEiMA0G
+ CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1iWZQ6SFlhB7NuU+TRuCiIVOxADbF
+ hesI0GdhLpiss0tdHwOJNzMIYOB5JkYycfA+On1tQ7F574/28pB95eMf+FDtlQRI
+ puQfB9JD6fXSSO6MIbcJFOjIHK748mtLEhxuCBCTUv0Zn58lpjlqJLZa27Oz6mw+
+ f3iI3IVLWm4zBLY8g8jN1JG8n1MGR3fSIEYgExfp18J/J8Ix4Nkww6dtdXe61Muj
+ Q44Kogku7AeSL+Q7+6lR1z1fzax7R0jTQtzC/NEJfSOHw89DLke+ERiLD+ykOh5P
+ DdRyFC/CUmfwdK7HospXXwEIFd46eNACs+uKniC4AU1/na16G2FM7niZAgMBAAGj
+ gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
+ BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBT9ZRmmdvy0VoQO3bl0XF7vUhyZ
+ NTAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzAcBgNVHREEFTATggtw
+ b2QxNS1ub2RlMocECgqYFjANBgkqhkiG9w0BAQsFAAOCAQEANh17Sj5q22ZIRFki
+ cw+mORCXyVdpmkECktF7gHnpBTNEFkDtrx1nqV9AalNofrW3Z26wVllBMKZt/SLW
+ teaZA2WLixCi4/z03bunrebkuejXqYBiTlap7uMoh9zrBsr0YhQGk+ybY++uCVNq
+ HbIZaCntL6gbsfD+wbVWAAACvVck32X6ld2CX2OWgHr0TgSME2m2OvhTyvh9J34+
+ o0ohebjuO1y8Ss/fdGMn4INNKCWx5XURE7e55da+PNzciFr7AjYrX+2bCt0/AmRL
+ l8Ofplddz0ZXMeye5hytBqKjWvpBVk75Srzcn5mwgbyct6nEWVMzeyJwlTaiSj8M
+ PkxNQA==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-node
+ name: kubelet-pod15-node2
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDmzCCAoOgAwIBAgIUG9jvbCvvsge+8e/APRQxIucg+RIwDQYJKoZIhvcNAQEL
- BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
- cGVlcjAeFw0xOTEyMTUwMzQ2MDBaFw0yMDEyMTQwMzQ2MDBaMCcxJTAjBgNVBAMT
- HGNhbGljby1ldGNkLXBvZDE1LW5vZGUxLXBlZXIwggEiMA0GCSqGSIb3DQEBAQUA
- A4IBDwAwggEKAoIBAQDQV3ByAkViREt1058UC/ao7YHv7ozK8Divo+SCk/NypO6e
- 7usteab6JaSsaS1NldHkZU7w6ACqQx1jJLKV/Ch9TSMRzyvn7W+DupI01/SW3nZy
- 3BtT5Jkhl6DUUvoBIAlilKk/wAKot/CcK5jiDJ1uPwfsFELBydWyVyrBzZ8/MCAY
- hfsnGXkP4THeA3+IwV1m9g+lCAvTqJp/zxz3uUCuQkMmO2QNMccTk/+YyBDMqmT3
- gVAqX8pkOS/NCzrC9Bni82bw5qSWg9oPu86iEYOwOH+y4bHro6sgYlz5RaoQYg3X
- kAczztUUrq03N3rn3Yv01/RlgRLj+Nodzt8JEgnHAgMBAAGjgbUwgbIwDgYDVR0P
- AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
- Af8EAjAAMB0GA1UdDgQWBBTDYcLwNIFmkKUiGVHNgKBXWZFECzAfBgNVHSMEGDAW
- gBS0IBvCEFyceh5MvvW1+n98/fwOrDAzBgNVHREELDAqggtwb2QxNS1ub2RlMYIJ
- bG9jYWxob3N0hwQKCpgVhwR/AAABhwQKYOiIMA0GCSqGSIb3DQEBCwUAA4IBAQBW
- k0ft/7ms8XH8X3j4OcQzoCFR//GJO5g4xFS8rNOXHBfMON4dfUWspnke77XAs8MA
- q54KXkFH1mdrzZXvdSiEFAk40aKiVJkSs70s4MMrWdRNpRTVvjLJLqsl4J+5fIhq
- eod+VsFvWhlC60F2CjJo40qQld13XdcXXDNld4vKGN5RLRwsGtsMdlQFrcFaIRAG
- s9fEfkuO/F1srbAlCMXDj/YpGE1vc8r6fsHTRqIzfipvc3xM/0kFjBMSa2crscgE
- X4dSZd2+fiwoF1t9s3qZJ0+T/sV3va3ulWAhxxnvAHhMKhAXNAJuVlWcqVfgE1lZ
- 4IjTQSXYnY2hBSWTKBzf
+ MIIDkDCCAnigAwIBAgIURWq7DFrOECai3LoguCNLLgwScyYwDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMDkxFTATBgNVBAoTDHN5c3Rl
+ bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTMwggEiMA0G
+ CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNTAusqdFfhtAeagllYa5l/a4TWzg0
+ puM2OCdAAPN4NREbw9SrC8IihPSsJmvfYDw/dfNugu9Lz/OwXAhgr8fxU+G4VkVv
+ uflyISfF7Z/M3yfWFLd/NnSYE47naB9/lmh9losJijsPl3m+xHnEQHnQxRWLgFNC
+ w2BBr/dsdCl7w4A4KJ91c+qb9lIOiandqk12+2ih3b7Bb4EKrBpvy5s1HjRfHScR
+ 2YPXUIXcG0W09ZIlZHJtG9RTk+nEvdE2zwI8iiolxRUM2Bd/RSrlH+obfEPllOhv
+ WVIPVsmVc48Y9rr6kKPbwqW/TkUWy2sBNIGwwujy+M8ocd7CcTVwud3TAgMBAAGj
+ gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
+ BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBS39rYFBE+mm+cOn68qT4QQ2W3N
+ nTAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzAcBgNVHREEFTATggtw
+ b2QxNS1ub2RlM4cECgqYFzANBgkqhkiG9w0BAQsFAAOCAQEAOfuSilghShLBc3Ug
+ WN287VVOmyOGGgRGqf1BYZCIY9UHLd1XH6S/ZnIB12dAGv33b/CK9H9tOqig/7Ok
+ 1y0RPNIe0eUIsMXaAftqibiLJLW47yrPzyydb3zUzj3AZo3gjctRU8QPHYLoo3g0
+ ZJWflNxpjz264srKBcXZSBzPTF/f4AnHM4PMH8mWg+wVNodhWkPl8IWobbQqSCSO
+ ZQE8D50o7B5BUAD/oXZxY9D3olz3ow3/Cx5rqX98/xFyqua4M7S+tvY0JU4lMnN7
+ ZdIcjU/G6noBYdA5ECST3gmxq6AlX1eoMDdq3nD9aBXtmduA7yTfKZwrqNIOiH92
+ 6xgS8w==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node1-peer
+ name: kubelet-pod15-node3
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDmzCCAoOgAwIBAgIUUvmYVREsxZHDafAANHTSWzEdSMUwDQYJKoZIhvcNAQEL
- BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
- cGVlcjAeFw0xOTEyMTUwMzQ2MDBaFw0yMDEyMTQwMzQ2MDBaMCcxJTAjBgNVBAMT
- HGNhbGljby1ldGNkLXBvZDE1LW5vZGUyLXBlZXIwggEiMA0GCSqGSIb3DQEBAQUA
- A4IBDwAwggEKAoIBAQDj6Wxk0Dif71F32qT/JjHfZCCr0d7ruvZuVjoGEZt9+jWc
- D4q1DuaFKfBhU7XWS2nfn0JSkAPAKJfj5C5LV4FRRcaO6UFvRgGMyVjkrPbltMeM
- XiGSmRJqJeS+9Gd8xkufp7NjVJ2L0SBhJhweCMqDYJkW9L06RIkLg1I0xijjc9Lq
- POMEhDl6S5x0fguYZsqDP3LdwLaXS9ePhm1a5+ZCNi51QsiInSqWJBTMc8xkUbE7
- /6eLaL9rapi5urIeaWKs+tcGGbVsqRQR0+IGOd3B2s39NJBCw9k2V4B7Mokt83CX
- cWPNn/woGYooAW8szdV50xr9PzANslT7Be57KoExAgMBAAGjgbUwgbIwDgYDVR0P
- AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
- Af8EAjAAMB0GA1UdDgQWBBQJuhpjAzLe2vdm8CWmy82GudoJIjAfBgNVHSMEGDAW
- gBS0IBvCEFyceh5MvvW1+n98/fwOrDAzBgNVHREELDAqggtwb2QxNS1ub2RlMoIJ
- bG9jYWxob3N0hwQKCpgWhwR/AAABhwQKYOiIMA0GCSqGSIb3DQEBCwUAA4IBAQAL
- Os2o4RPiOIi1voK0wFlTpNzxJ8VxvJnXKmURIH8auRunp8m7qlyl+00qYvsApBLH
- TXHXXdg0wrV6FZI5L4rj1j3kEfCgihkcK8lekWxdtGO9NfDqjWNxGnU8VfJu6601
- or9Qfv8eWk+WvzAi3dgFoBKTcaIRwq8CThzy5FJ5kyxtS17uBX8/z1k2/VnqcR9k
- nph8zwpH8PLYuohDvUhjGgYbwG/VnV7cptorxYRaqsawPbY4xWKiiKNsY9EjVWKu
- DfntG4d4MKe69KngeFOrzQJsmlAbXCMWuFpuOGGUFzPFjrNH0WtsgB+PcqWBP0mb
- 96CRdMYZ+G3Dh49Dyz0M
+ MIIDkDCCAnigAwIBAgIUVY+WM16JpWbGnVGufrpo+mwyB4kwDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMDkxFTATBgNVBAoTDHN5c3Rl
+ bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTQwggEiMA0G
+ CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCs7n/hMc8+VICbPFahMNp4eITla0xh
+ l5r5YFdVplMWPLHPexAnE5+QRHo1xle/sHGr64glI12VF3u3HUpFtNfkLpfBos/S
+ FRfS14ygTp+VxRfDjBI5X//7oxHPpsp7pIke8Y4MlJtjSvuIva7BJDn4g0CL2ACL
+ x5fIIkRO80gxGLzs/2EAcm4ncaYa3x1NJ1oaItvzpQuVGHRPORY+ah0goQFuGxQM
+ ZdrofVFI5rV4x6I390m1SrCJQVnP8731q7c7DrS5BUEgbDidDQhwnMJlNe5Cw/a0
+ 6UQ9ZCitDe52QnDs3/Rvm2FBfyhKHGhbLkre8QxTjzkOGLWDWD0DDqkpAgMBAAGj
+ gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
+ BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSx9sOmPboUWxydhT6OsxnYemBn
+ 5DAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzAcBgNVHREEFTATggtw
+ b2QxNS1ub2RlNIcECgqYGDANBgkqhkiG9w0BAQsFAAOCAQEAbR6gOsTLzqo/ZnE0
+ eQOBda/54mdKSkKk0INoLOyiI+5YngYAmjp2xmHqjJ5txWNioHBdYbyFc8P2tA9P
+ zMTzYnthpFSOfz+c/21oHs7cuo1DyNcEr3s/9D40o2iTU8j4f0olFVkfepw7WPT6
+ WUiKdOLGpycrAmrL3e2z5C1nG6enHHMuTuD9gsVBu0aYKO4aW0gqTfUVzCyUwQ4y
+ dtNaAj/NfQRR+/3ZwG64d0llO9qxqNHuqR4ISM7MnrkJqDVB+isxnUi8B2VwZR83
+ 117NAr0UfiUdUrECknj0Qqgleiw5pWZnvnz/DGFwsBWKv91okSd7tLLnAQ9JWVan
+ KE3Q4w==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node2-peer
+ name: kubelet-pod15-node4
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
-----BEGIN CERTIFICATE-----
- MIIDmzCCAoOgAwIBAgIUTTCCf5v++d+aOhIaLHgtb4aTcmEwDQYJKoZIhvcNAQEL
- BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
- cGVlcjAeFw0xOTEyMTUwMzQ2MDBaFw0yMDEyMTQwMzQ2MDBaMCcxJTAjBgNVBAMT
- HGNhbGljby1ldGNkLXBvZDE1LW5vZGUzLXBlZXIwggEiMA0GCSqGSIb3DQEBAQUA
- A4IBDwAwggEKAoIBAQDmM7Z0DT/3y2AOvC2CLLWALbjALSzfE/92aJZjq3SZrlOz
- 1HqVZEqOfdtV0jVBCv3cXVGCELO1zv3pY0ZYmcNjv2ZX5v73WaPruaqVgvLr+mKK
- rlkottOqmH4u4Ra/uaq5XmwffnxLSqMPGXGY2+1a8X+FJfktULpGiPreQByyWjFa
- UpMN68l7IRKsdFpHIk7e4dlYPtO7WmqJdD2mmsOHKULdAxd1SPYGP2Q/L/bOGiUJ
- d8ZEuNs+GQE/ymkZnI4iP4EAWjWI3mZTUFzo379wNR7t07NmdOQmCqKIJIoGLhxP
- vHdYW+9w1vURi/4iJY2xIMUL2C9Y6HId0v21rS/3AgMBAAGjgbUwgbIwDgYDVR0P
- AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB
- Af8EAjAAMB0GA1UdDgQWBBRpEPZFqz8zNV3TbL6HcemlogcFBzAfBgNVHSMEGDAW
- gBS0IBvCEFyceh5MvvW1+n98/fwOrDAzBgNVHREELDAqggtwb2QxNS1ub2RlM4IJ
- bG9jYWxob3N0hwQKCpgXhwR/AAABhwQKYOiIMA0GCSqGSIb3DQEBCwUAA4IBAQA1
- 8yxX6tUPWzkuEo0YFRnUHuOiurbwSx/JnxKfA289qhFbD/j3BuOak5a1OBPK1KRh
- gtDE9MXvnncGtdXPeL9uKRltUQvAA0XdYNxx3oZ17zbcbietlXAjk99pnMNhhvrt
- /s56LJc7HUvguQ/ld9E/Df2rxntQUJbAaU6tnpjoG4dU1AIqnFZOg0T0aQyNGBuf
- HwCzcfUxNovXaT2zm90SjlmCn4QJy9hYIGu1JQGePFxVobm0xbNxKDGc7Jo11aGe
- eICmo+kfCMWFv4y/fZ1yeAxu1Zj4CYGZZqt3PugH4m01o5NEXjbQrPf+bJsz3mP2
- OLvSK4XeGUPYP+nUkCUw
+ MIIDkDCCAnigAwIBAgIUWUKCcBPYu2LsdvreaYMHS9zsw8owDQYJKoZIhvcNAQEL
+ BQAwKjETMBEGA1UEChMKS3ViZXJuZXRlczETMBEGA1UEAxMKa3ViZXJuZXRlczAe
+ Fw0yMDA5MTUwMDE3MDBaFw0yMTA5MTUwMDE3MDBaMDkxFTATBgNVBAoTDHN5c3Rl
+ bTpub2RlczEgMB4GA1UEAxMXc3lzdGVtOm5vZGU6cG9kMTUtbm9kZTUwggEiMA0G
+ CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1dRzjfahiRwEBJdRwcybMfSQJwRdP
+ hx36r7YIQZ3M/HbJ6kJvZBfs5WPL9AkZqSOGGp5IkWriP8GIjPDLnphMuiEao9VD
+ R5/m+V9aSPjyg+IhyHg1sV0DfAL+a2sMNvrl40h/AwFAXxBcLZ9b/YiJkLkSmzlg
+ Gvt8Lwf3X34Luf5WUHIqCK0/otK79huNvPIyuTjpAt09SVVEndeVE9ToOmPYoeEN
+ mwi5EzF9IfZ+npkqafP/QSYeKtnMej/obTenekAavi9RMlyIwtsWuRANk8v1rMld
+ zXr4CZrrhu6rCEOYmPPaRFBUP27Wmrxlk22w/ktPrdnWP1jC8SzVeGhBAgMBAAGj
+ gZ4wgZswDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEF
+ BQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQzp/rcwruvZrrluKgXGttSrMBz
+ XjAfBgNVHSMEGDAWgBSFLj/5uiFO8GNv0zRPZT05buvXfzAcBgNVHREEFTATggtw
+ b2QxNS1ub2RlNYcECgqYGTANBgkqhkiG9w0BAQsFAAOCAQEAJV0aGjFRiR3wsy6n
+ 9X+3Kl67UiCedyzc2AFXZLTKRG26AT2ktvxhk4zuYZIA8ZcdyL6SVyIbb4sHER92
+ Zdec8ox+FaEGKA/MI1JcWu93OqAbRi4LyZlMNZBVrS5VvhHvbAjU898zFMH75kAH
+ I1lIvbiC0Y74hjwkjtixdovqXFYdCZeD9MzmWTj7dzd1ZLREmJ4l9eCpp1SkiuSB
+ zioEO7dQ349b1d6qDnB6pxrws/EQhgzSEMmxuoCifZO+oQm0LdgVn8kUOw7Y2ww+
+ 2aJdO2WQ9nqqwnRXy3PWyU0+JaUcWSz7nEqMkmUY51r8hhppfKw9rrZtfoJRuGqL
+ Z3jA4A==
-----END CERTIFICATE-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node3-peer
+ name: kubelet-pod15-node5
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/Certificate/v1
---
data: |
- -----BEGIN CERTIFICATE-----
- MIIDWTCCAkGgAwIBAgIUfplXHaHBvz9QeeSG/58btMVizQQwDQYJKoZIhvcNAQEL
- BQAwMDETMBEGA1UEChMKS3ViZXJuZXRlczEZMBcGA1UEAxMQY2FsaWNvLWV0Y2Qt
- cGVlcjAeFw0xOTEyMTUwMzQ2MDBaFw0yMDEyMTQwMzQ2MDBaMBwxGjAYBgNVBAMT
- EWNhbGNpY28tbm9kZS1wZWVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
- AQEAsHi7aYU3sxlIsVQDmhvZXt2gmTuKs07xIqY+iSoFaameLZj1vz4yHXphsahv
- ly6Fh/HUeWA8P8idCjcMKWETam5NtES1vrolZnxqE50w2fVzbFMXxWr3nQeFWZNY
- qYJUSciVEzni9XmNm2BU8Lb+Lj0caITkZwb8x2hXVtlpic9fQPQgjElYB30fe4mv
- vDe3dd9jxa6amfLPAdnY2Q9leIoPx2QiFmx5zhx1yImnq+gDVZi6Fl1pncl80SNt
- 6K+/Ls4/S9KxDmh3bkVFqcv0/xp3ivAhdKsT+XfXh17gsv2rJTT1a7wM9smPZih/
- Fwbpj52Ivy2oSBDqCJ8C6BHq/wIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYD
- VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O
- BBYEFF1CJ9BWDtBg3NOVSu4+HPcqAmsmMB8GA1UdIwQYMBaAFLQgG8IQXJx6Hky+
- 9bX6f3z9/A6sMA0GCSqGSIb3DQEBCwUAA4IBAQBA5evcYNDXJX/VMsmiZhfG+JM3
- TuICXnrB4u5CsODY+mocGv3xDPxNbVp8ZQrEUFO9Ip0qpTnDt/Nx3julIt6k9hDb
- MmnEHfVCMbqUp4Pytjg+B7ourQUl2bwPd62uW3SzEsxeA/BGGCRigCuwrMdTEW2f
- TsH58LYDFJNIgeZHWuBuGXX910ik5tZV9Wwe14JwJ7qfoCisNsKR9nqGvgJPjV+S
- qShGGsUsA7SeC2HtsOFthpx2XmLQARXqBaffyIk29ZLrd5GnH6Qv5pwFHGdTDMkR
- jybfPuQUFK9r2r4KSXUjmouOJkLgGRn431Jg8seAnivID4BabwuR7wNJdzoh
- -----END CERTIFICATE-----
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEowIBAAKCAQEAlZiHnNO7Qj0NtdwTdy+4cgk7IF7fSmb82sK0TvPSN1muK1kO
+ Kd10k61348f+rx8BT2QmNpRNSVTV6sm12OJV/hUjEp2OIn+frZOmNooltPN54mAN
+ cIEB86JR6BvQVuoqApxxI+rvRBcU8BnvMi4TSZXlDiscf2M9PPR7lA1o6iN3fsPC
+ sAGQPNR6Ynur98ziMvH2iSDIAdx5Yo4CdZBYCh39Esw1zoakikORsmh9FoGxi8g2
+ B0qGmnLvbxRee2/6rESanv9FcgJFnHkoaSapy4iCXADKNi2c6a2bl0f1e+uC7K3X
+ jfu2auIY+ESh9q+wai2a8IQuf+61RjeOtTF8YQIDAQABAoIBACsAkKMlPiQZVtKb
+ M8FEJ3ooayWv//HsTu03oQs9DYW5stZlICwqq7Mz303MFMsUV5URzeZMlTbqOx/l
+ 4e85iMykGNPmFJCYLTeBRPtSlOpCPxwyzkoz23LEi1T0gdwqLe9YNzHC/AqPtAYc
+ /mRnWEYD37dF70gzJ8xY3xk9DZaYMN/BEQe+T8hp45/seGRe9rv3toYeQs09GtP7
+ HguT/hDUV/YANEJYmRApdJeUdWIsOM85P6Azn4Y7qua8w11MXOxv9psZRlOa7eRF
+ qCS6w/1ixpML5300VikgYdwvizAb5hY9vLhl8ymfkFN4OujdlYmdEUk2vT9cegIg
+ Yf9br50CgYEAwFHtkjyR/uKhIwJDmFbmBSIVX+2jFiFRPtPLLZYF7ZjIjLyECvPS
+ dYF0snjjKVgfF00CO2YZGTa5RBBqYAoJpiKbQNzsU64YL0mhksaBnPEpxEgrnFls
+ ikjxIdQrL+5SdrKcA8kgwHjNz58AhCBBXkZ0FZWFHKqn7aHuilXDsx8CgYEAxyER
+ zm/wV4yXp07S9TgILpKWkmygRBKURyq8AnRMD71bkfpyQxbdESRp3plgMHjbQgwx
+ 51BWDYyqcrZibwoIfw9WHlHYcE5eFpsx+MYxwLZ1PwK+vJkSEiHkBPHhMXQCRupD
+ yzu8IjXSwwlGUBMA1IWOWb688KzMkgoId+wQYH8CgYEAtGxoD5hJczDT8Q8PsRxd
+ IRWvrdY3+Ov615FEfJjRKOz7wKSez9OcbuarP0AQBNqKGIcDgAwxoajoOAWadk0U
+ bkrrEffwsjSStdJDBXq7YCwTffQjDcQLAtSZe54bghT4QikgGqEW29q5Yn2Ns2a7
+ TKGWCCXEwncLofEX46nANgsCgYA8xkkK+nseHVjDxXj5QqqsnCy8b87SN+Ftfwt2
+ rEvymdZyzT9GXpoF+1kciS8kXB5/H/2zHX/GDuKOtD+CqEtDjEi6ZDxsul5ZA/DS
+ fpr8uDM8kffo08cCJbnUEIascz2mqyUZyBd5UXgL8q61Dbe5JTH3DhHYWsTs5YcE
+ ItY0vQKBgF1/eDFPi/n7/9LTzg5KvgGWeQ/x3yquN7gcHkGu/lmmT17sf3xMVSLn
+ VxRUXlJA7GpQ9s6v+U6WPGeUQfIOADzYxTLXUkaF2CDrT8BcRSxAZefzv4uv0UvJ
+ bzc/7cTAMjT92+iJGrw5x4kqJ3Biyh0JWKyyxiReR+GXcpZBtBf5
+ -----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-node-peer
+ name: kubernetes-etcd-genesis
schema: metadata/Document/v1
storagePolicy: cleartext
-schema: deckhand/Certificate/v1
+schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEogIBAAKCAQEAw+99pbXC4JFmMPuuGHH0WLoUDyOApphhzuv2ItJGthvrWwHQ
- uZiKUH6wr9l8EVPlY55zCU4EJx3argH99Cz7XCJuoNwxVbPLKV6Zxdk+ZeneZkvQ
- jo1dLakohLYM7EO8W99DqarzesLcQRkxrIc0cLJyGnEUhE5Yr05h+bmMqRhd9RmR
- Tufnm8xGQxC8pZE9t9Znsx8i7RRhn3urqt2pnJF4J3O4P/rLix/dlUOgfSxnCLih
- ozEMbt1G1AAhBroAlZNxYIhbrZpzGrPII14NEdzms68M1umo3T6tQe1eWmJSCR31
- e6wW0ue3Xr9TYdgaRIagiRQsj5W32AQ77y656wIDAQABAoIBABh0qAYq7awB+fNb
- NpuufYUllKNfFwu0MWEWap5mCJVqXrH5RAgmVf0+EuegCbBP/G22tT0QE8yeGVFm
- xj/X7XfOhGhnk3DTBCShvifHudYWnr+97sYcNukgGAKYhnxm5/e/oj5nLATClaM6
- dczHA3CdlUhfnOP2s3MOIYR9+GSSghelH6W+Q0C12+HQIU8bGGkNiApOOf2rnbKe
- L6EsM3JmHMI8EPFGlCmZC4OjAqYqZrpGgG2Bqc9rKeMq1s2BRbYaPjaGzr1ysF71
- dO6JfU7StkH6CisW4J/JDJp13iA+q4PYAOZanyUPr9HgPodAQpDzh+Ldw5pS6X/t
- amexb4ECgYEA50yplROvmbFpbjuSjAhzc1Rx/LRryxeNBxMTctUmNnknX5rcLf4D
- vuToQrHqoAC8e0n12N3+MybPA0+nQk1RneTqAdLrb1oPKRvmSiwSD7yMdUoI2WWs
- FILGN54m1yiCb7rz0PT9bDUU9j8f6RldC1FLFtQrRuBAUeyi90gPn3ECgYEA2NwJ
- m4AC0eQXlxHB8Qtj6I2ErllDK2Wwjw451XWUwSvgy80JG22rRLnVTSC700IRoT1o
- cURRylnNIKSfKVKhPkgCjnMKy2UmdaH8EE45N4ijh+yU681XwHW1SVcWAE5kNdli
- M5l5irRkkMD7aYw+KZOG30HQiMvL88ndYIi0+RsCgYAfeze5qqxD5vnKnyEbHitY
- jy3Uj1n8koAHbnk/L/O7hlHtmU5OlDw+Rzm1mjGtBWyh+zcTBWQL4kRa1wSU6aEq
- NHYFOYgB5+gYWEvH3Ke4rJkRfbomnMgHIqWH/Gac8k6OlouI7U9w4uive3gEagdX
- +wCVYtthEjSu8d5cedpmgQKBgBq9Xw3mhfJ9jo8ZKHHhdqtJL/ATn52tR00McwMo
- IXSERY67tIDGUBUEWRHOlHpjLitUmBlHVFKAKjP5OIru3mUAmhgYhV85FLnyhFM6
- YgG//nIXMPG2eziHCxiE/XiCMgcVy+8S4JLC1ZenxBhqq4uS3lGPGviTMI3Z+Usa
- 8D27AoGAHO3PqaR4VV2Zghmdwu1ekv78VBgJIq9DJgk19BS3oeTA8NJ098Q0KQg/
- vbEDhg2yvo9I8O5owXhJCdWc9Dmw57vlIRX05RIGruIxn44+3oTeC1pdrynx1NH4
- 9RiPdNHc4Cgzj05pkgEmWC+/nrboz73D9bW02frZ6Ijc3WcMfig=
+ MIIEpQIBAAKCAQEArRQ7FMe/7r0+tuCsJlEksxBnEJ7zYWsmiJRcy7dIO1yx5kdZ
+ qVmyCLXpiQruaDHdbZdZAZ6Sw26IkJ7tozpK3jWjfMSCXRWI/EJ8Tl+8mEJmKfk1
+ q15itACVTUvqeZ8EqpDX+cNogMkwYPElw1p06J5XgspxZ4DCv4kkO2jCZuHfMoIX
+ kiYaVoFMRymiE9J1SHS77MHCQe/19FMSHUPiESNS94kaUWCrjlYQ0T6J8ANWwZFM
+ LJBYReEUDUmY0XBDy85FrEpbu4h8z7klLDJPvSNeE4Sv7Umnf2RY/UD+sR4rNGVd
+ Jtgo96ulCrWEQHn3A7JLiE/epM1lZodzT77kkQIDAQABAoIBAQCsGLqqbfgFnjzW
+ wM3MB9ETD9M7bqGYE2AsXEFs+qCjDgeCbx3TS3HAQYmmD62BA1wmVWBWQOOz2ZuH
+ GdA3BoZdLz6RmB/8CKa+FineEEnJp/RH9hmMfXxteUr7oenS5vBP3VgzbD7kF6i4
+ K/AdsDsg9hkT3tImVZzPsMDLJd5vRrNd3sOe29IXy3R3IPggkPNzy0LBzw/cP1qQ
+ 25bqgNjpuvZlDQc74CS6QJi5hKrpJElYxAWnelruOqZ6jRhndnUUDuzbGptFEasE
+ 950q2RTEmw6UzFvb37eQqr21ynB2moiMt1bqcJE+XKjcSTX3LjZpkJYqIVF1n7cH
+ 6kFiGMExAoGBAN4qQ1PpYg603MANyF4S9/GdrZ8mmo6Vta/cyBcqIjiklBt7SwYE
+ mmtIIhKnPNEKQEWYXs74o0eIG40nTkz7V7sGStRWM8ymmq6CC559znrNnbq3jVxW
+ WFiDOm0GlbUZG5mIeHIZ192oB+TuNCd2+RCb5cYFXq7q05MmJrnDXtDtAoGBAMdw
+ NUxzYj3w7+ov+DF5dzrDYQ1QriOOkBGdR6OVbRlVKW7aeDZDFtZ1dSadg7nfXZmf
+ 6SmEJU/Yo+Jvb+zm9RvkNOugSJ9CszNIYjhpf77FtzoJedcTQuXJUvAHBtgGYYYg
+ 8p6ui+z8AqZrU4UZiLQfJjzM2dBDsDjvj1DFLUG1AoGAI0WofNkP5W/XoHJPvofa
+ b7TuDNePMFYai3pNFkhtOHsAvMA9cA4pCiFgr393y2SKQcJoQwn8um2kmiuEZfp9
+ ukbMeJvbC4HkCxLAj4A/2QVuJmff/KoEysDC9O5XtHHxDNY68TqjKCD2Z+VdyGo+
+ LuHhgCf4GWNVBgbHnTSkiB0CgYEArywcdGDoSlWEtKKbkgEJO2D+rq5NtcdzPTVz
+ BfiqUdTeRpK3gZmdxpJ2aotxduH9GYE+T4vVJfO3xpxwp5kYcv4XiVpITzJLqeCK
+ /NeVL6AD1oMaNFGjsacKJO9XEIlSQXhRAhV3q5iST0/3lPGfg+3ULRUUv3ukne20
+ aJI3tP0CgYEAwJOP/8tIEVOeC1lx7HDDkZPq6hZ2QNesNdFVgMLKJw6L8oPckShS
+ REbdwxCpk3YHESdl+X9jsuK8GzBCH6ssaBcOvTO6xdugYEPjzlYKceM/ux87eDDm
+ 4A9dSlPW4xXm1nxE8jVPOU06EOx+ir6tU3HfFvffhqh+yJWlkj/x/7w=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: apiserver
+ name: kubernetes-etcd-master-0
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAtLIWsIZJaV7nzSMIMq2GkKVBsLhS4jLlir3dnNlMHD2J5BWV
- Z3NXAiPljSir8cpvSvaJVUTiGxSQAsJwst7NjvL2RKMKuBepidqHAMxqMR6fbdwn
- uJO0d7eDInoKYO7CKMxt4l0cOlUWfWqv4SAp8I3/eQ16k4Da398mQLPQeWPJ+tqK
- /xv7qOe5CN29hWrHQuh6se/Rk0cGcPjD6yGBzqqlTHwkgPy7nEKOvyhhfZdc61tT
- 5Y+aUvVfl1hpuZ3g1kOJ/3qqUAhNy5rvS8ns4vjYsU0fGRt8xyu6l6Mwn35W+bU+
- PJKODCGE+LF2HMDyIfREXqsWyRqSKRd4e/joXwIDAQABAoIBAQCYpl5+sGNyTgfb
- h/3T+j5VEhbluUHj8AV06SM/717Z+K717bny1ECsATFayAJCWLceiBnK3E97eyqR
- +juFEK5tVhnwMCDNFshWOjOU3BvV9T3QbI1t4/IwtOpmhN0huHJ0TweBlRFUwi8m
- sqt0r1xe6UbquBVWaSP+vqCtRnsXIGfH4KTA0+ylvmE0U+BRlhngZgKwRMAxCVtz
- E/wPuEqI4sPfKBYiVsagmrrW9liLs51m641L5d9cEJlku5FVv+zu6ISq8lCbVSwl
- vIjhdvZSTFqe84CrsKeu09lOk+HYt4FYMzRGYsiyEjfxvqqzCHwey+6TOovN9Wys
- ntSUMW1hAoGBANUu5ALeCaPMVaZUJH1CX9PdltMF3/TaHHnQdhgKgKsVI3+elXgb
- e7e+mjBbiYrgM6ECm0P9QW000eTCMz3ua/BA012E/7q3PymwlHR3rbHnk8SkMbBm
- PVSjPHAQFgvrdy9lbgaDqDBACLksLxW3lt6dbCEYq7hTDLKUV2A4bwyRAoGBANj8
- zrjW4PG+xQrIMcAdNVqikACweveX8iP/DEDyi0pX8KHmT/ZFGuD6IThxStf0m9SI
- i+KwSok8C8CvB+k1bCRLCvWcDK1r+Oc9+7CBx09AdoK5+8Pt7nV0JaFO4WSL9ehG
- eq3U23Hf7dJltEVDhTKsBiCDIjbYoRNdC12cw93vAoGAL4mTQqhskeAAwWRF9sCU
- SdRBy7Clrh3s96TqkJXW909xaQXd4riOL/0KuPnQg+1W1fKU2OZibo22uEIt1wOR
- gjOSbmo39FTketFraUU+sEspglHy2pkR2AvGcF7F68aH/0Oo8z7shEXjLBeUME2O
- EPodoIu1zxaF4FR/3272JGECgYBwC3LvbT2wdvKmU6Ok8TAowgKb6IVGrnZBciSw
- sM2OMQS3hQbLQvnTLDXVQGMGSm/g+jVJdAC5BoGHGJp8KLLTttBM7Sx6rGNVfOMn
- TIxPdxj6/fBsRsM4cSYxOlsWoVL0gtg8RMqf7aKPXycMEQaJmNx9E1mqeogKSKRi
- zV0yjwKBgC/nxzTLAZ5gM2rk09mOMDdODIcEo2scYM8x2QLKmTXu2GGvoLWjYCeW
- XAh4Rqz+aPLiFx5lxpF3aLgiRpfjGzJQOC50X/Jvis1vqcjLPi0jeUWYN3tggSHm
- ym6CsjKp0rnOO/WXbAtL5MP0+SP7e5YjL5nVgWvWoLq8FqzBH2xy
+ MIIEpAIBAAKCAQEAqfV8ltpEPF3lIM9wHn/3k00dgtQ9dC2smg4Oei2GLIe/DQqQ
+ HNOAbEvmP/O51Rhxj69OsZhj4ufK4v/vCvGjdR40x0qYKT4xmmGK6yZ6RFhzSb1d
+ qqzKpLKlimG9TXRSSji8mrZ/LIgK9mSYB9+rt2pgXBS5GKyKxCyWFGHNE4FR+Q+Y
+ 4vgIChowjb5kg3wgiWq35NQ38bN7TzdR+JCIdMnc6BiGzBNHYVapB3bgUtUYoFEj
+ NWXJD6Mqqp0vgQvv3B4P34vvGTO75Vh17o/axezTHlDI03pJmYwNF57xrXPGGjc5
+ XMKZMj8GEhBo73wCixxKB46xLRJA7o7aqQZZswIDAQABAoIBAA1sTgK8CleaMtZ8
+ i6ZdBPilRodmq9PZJ6CjK5GKtuYdcoFdLDSan7Ht7KlwXmTuIUnv1o9AMeNh2yxC
+ emaq3vYJBLIYuhvHxbMjsQ0RZOaw9aoFQriQHREU6u4a+hB792PVR1AQycqClBsR
+ ptA4Yh+CT0n2eQfx2KPVwaSqdL/tfcwtASDbZq0qSXw5m14ji//87WPesLAhpDN1
+ Qf+YrwmsVSoIqx7tOVTITYibFhAiPJ2y4/RSexbLSc84OF1Shk4VKs89H8Utd2T+
+ s6sc7Jxb58c7TAtzGhuBUarp8XA7n5eaXnXT+nslnS5IbEsW7ZPmXnYnuFeIEP9s
+ C0PILgECgYEAyZqoBe/a0nEJjTDv7cneCwXtLhvHS+NAHXgqezLRJhs2UhI1ncRD
+ OD14Hq4lJSUKpFeQCUgAE/wbtlM5uM7z2FBU31wfSkwQC7akCX/Puz9TcncCJRj8
+ cO67tTpAfwn3lfIM4JMyDAspJthqP1GLhBFPW1iAIONIQCi8p1dhvFMCgYEA19EC
+ z5firEWHzWCcO8hPopgE/OL2ifztBPUMka91ELmO2gz99Ouz9CKZ+XzmLJPcBkpc
+ hMw8+3FiOz2RxyOCWTKWf9NafeleatFrlki8k2TxAx6l682GrAZwuvgYmB6vPQ30
+ PEoJnKCNWUuSpa8wj1mOTKFMXONKLLe5I+V0QSECgYEAgQfcDFi0S8YPH++3UBDI
+ bXOwlrcuuhJLYdEcF1ex5tq5zJNc/4myoBcvfytkGL75ba+hP192tVPBBNOFeRPz
+ m3nmqEJUwH+oMWcG3BGSibyBExy6IbY5M6qINvh+eRCPBsgxl7Z97JlkEDmo3re5
+ PKC7krI051ewUWgBPnU914MCgYEAnR/c7grkywusPYiS9qt13yjSqNMNL5Vncu5+
+ Ais+DbkrGfHPi1t3nsz6UTvv0JCt5h6JkV2pIF+CZyMCWXuu0QYVsGbOQVGAnkBu
+ FfJK6Pzaw6yynCT8YY4m0NkD/uyIJOld4e79ZH03q8VrtRkBP7yx73SXxiDsxfXU
+ 4x+RLkECgYBcstHHaGn7UIrQVgPpm2P/n6RtgJx7Sa3d8b7btVtx2U1fHd5uIrMv
+ Td+oTfp2rpaPnIQY2eL5awUIukDjBN4VYaCzJ4kEwr0OSLJdjaVXbAgGER45+mj2
+ N4r7SpFxkBVsBeuaNj705yWuZakyNUf4+I7XwmpIFWAKGuTx0cc+cQ==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-genesis
+ name: kubernetes-etcd-master-1
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAsorbZCDlgVUeJs3ioz016HI1ks7HkC5l4uJiJn+lJFBAxm29
- ycRmVuzkO0dTO0Jr6QOx3rJptssC4oJxskQtffTdwRVkDt1/8jZVS8DGxYRbbJdY
- WiNARRg5cIIzq+1HC9g3wJLrp48PbEkxfGTkzJE5m8Zze2xE4Xr9D1hCCxCY3S0J
- v/AWC+Ll6B62zWF9gvLWgp9kfRNHlFY2SDTAx7720IUXpAd8rPpzuOGN5D5GY5uD
- Dc+vw3Q7KzqqgyMHLWFZ+t5B9KrFh6J0ZKV56RJhXlebBBhrjHuOt17yyB0BtIPy
- nlDr1WjSvWKez1NZCw2uvO614vODmG3Cw1R2IwIDAQABAoIBAByPD4bVqEBm0Bre
- 5fi8isnystUX1F4gvdVr5s1Hr6++Uo4q8ae7ja8r11oQD6Uz+7TbDXGU0koV8REw
- UmV0eF5kc7A17rpd/eBNhplGbcUcZc9Z6h0I9HfY5x8zBHbkzm97l3drSNyVip8E
- mjDOprZ+KFvdg41jhSUYGjCBKpdAPMQL3v54MYB4pYjxAuZdZpIpU7RFZajGhxa0
- /vrQ/1vOTZRt8fKiuHpbnP0rw9dnkTVnBUt1O74ScMdhJbfG8yvwLveGP2UhAuDI
- RLmoK/XoySA4EHoncUIbcDduSwZYLrbmQVbFIVi7cEBNahV3S7trajC49Wp3ZUWC
- XAdEUXkCgYEAxQ88+CIule2HBU842MswGcZZkQJS5DQdhjSUYkK4E711mmJ3U0pi
- 3pP4xY/mbwcEKV8IqcQffO5aRGBW4vC3B8SmovY+33nvOcQS0wAuYtIeGjTc7mzs
- f49rKrfNFQRDQqohuTse8dsFXLazBUvEKpB8PEw38+brzgBnGU4sKs0CgYEA5/HF
- gL7dj3A8t3VzUIgPCBKotWGZjKl3FvAORaFQkXlodp19bsQ/H4x9JE/KhgMeHMx/
- oyLMRvjMucUnGr//pS2ZQttfA6U9HvOE8kAhSTLS/fMEUMOea2B2fBrDA3qoRNaj
- LUY4l3Hb2r4XjFqrjacChf9scVyw5qHs4pxYBK8CgYEAtL6QTouTrSKrWFxcqMRd
- fxamKlI2U2fVuLXbb/EAQ+LfzlYIWpX872hLonGliyqlT4kCOixQMVex5ctzhj4B
- sxdVPF2eN33wxUwpc+1TnoJY5/KavfmcRjf2tLzXVzKMusWvnuUyMeWRGoPc2buv
- 1taljOzf2U9x84X9CoHgEvUCgYAsP/TVDhTI47nBqleYmox7lsu25urbag09RAkF
- AbSUPFxQnNUsR6ZfR3cscUiK7pdVGTKUlfPw6lBsdI90TALiqWNe3OkwkdqqR/0q
- FlADXf3g0vcUzW0wwRN5s8VWqZTmpSg2X/o18lPmVHO7pCSsfps9ozA2JF/fcC74
- QKmOIwKBgQDALkdij+ZKeU1IBoQasSAQ0B9elpjgqccxfsGYS4UVyBmM58zfiCI+
- IeGFusEFpvo+00vNDT316xsjlNXx6F5ng5+0LSF08IOHzDbyO/s6FSfgHlM01NJM
- STd7+Q0kA5yx6s0e4b5QomVhOgn6iNODauMNi+cDYuWrkIl07wAVyg==
+ MIIEowIBAAKCAQEA0brYiHSbyWWA6+bgWzbXwR3PJDdQ7KCYxwHwxDaxBlerYi3B
+ jp4JQXi/5jk0kAFZxexm2OngP820wXpsQgW97VhBYpliWIM7c2zECCktAfLoXyu1
+ 21pyXNTNc8RunAm+VzgQHEf6dwt4W4KlTPxRhc2Rl1V26Kj9LaCfJQsTILnlbZCK
+ UmVWaw0oeXgwq/D5OIXXFgsLJi1GvR9cXSYyzBYTc9OqgMswwaXi/fqUG4u170R3
+ oej+jZM9gBuGHs69+8HWZfAA7jWXnUpbZumGUAA6KJcl7STb98sH7bTsf23l9S9A
+ iocVrUtMCMBr39npV5coI6oMWpAOVUOe/qRNBQIDAQABAoIBAEyCgSOmhn5+DP4C
+ B66+3w6QNVTc6SSpoZJX3uF1ojbSHK+ASbAhbvb3eeoezFIMbBeMGijfiPM9s8cx
+ RfT/6z1+iLvTgNERbsq4zvq7KrQfTS4K4BjZcgbzis/ExSUfWNSwmw/2IiTzhkC7
+ 9FmVYpgRWh9/ChXuMA5JHkWBOMUi4iDxsny+ZYJPM5xFsSKExXsPgKoioX0cTLZt
+ FvUF8Z7hIHUdFIANDCEFSjojvp5TxjxsT6aXyfv9hR+WkqzzKZqWQ5Pq2PYFAWYx
+ Sq6Ks20pLaQc+U+l4pC9+md237s2tLg7FTm3Dw7IRnTZKrnlwkRCsxyPm4N8iFRi
+ RS7XsrECgYEA1HUgb5E1wvh/ZWTdSq/VHqnDvXQAO08MQ9PArKxYhIONu/xhYmeF
+ yXMhHSbDl6fqYnLSzBWDVlNVFPYcpx7dK33KlzbRdBJqb9Cp3eu/x8xkeU5XOgCE
+ TsGuvZZjOtGNwBpu8gs5Nq44ZX+GkQgOrBL+rIjD3zwJnrWztA4vvp8CgYEA/Lab
+ 10UYbFXZd2dtDeahUI72OmyC3utpYEDwjakKmc0mevMKL3V4J/sGr9Tsc8yQcdnf
+ qLDEOLLGLV33/nFXDdOAHGzFETJVa3AVXb7HNlA/bD9uVcCw+ZaPTOU/MyJvX/zC
+ 0Wwy1idMlJatzXJoeDlzAzco5+oOjfAObFy45dsCgYA7Jljfdugm3hRp4EkT8Bw/
+ qzgJ2O/vkzRw9dVgvaLvUcj2G2/pe7TtvxXrDc3KvT8uJZW2qA6mzBCWA2c6yAb/
+ gsgSjXqG/FGRy+BfHrGIKMmYVE1IorgzTQ0fT21VBN6YK0PUM3e8V4jwCS8n1bxv
+ /+HTm0gdMJPlEeV0LbbxNQKBgQC1bzV73HOodAppm6vEKyzt9XX6hCWBfmptXLJY
+ QmEGAy/5XbyWTjQyIBuw6aHJkbiyxMW7Cw4V1uRJdgmyeBUULCDyR3VE32pMdHAi
+ mfHUoNCoGvJQRsPIrbu8bWpuf+6Ob54/VPs6nYRxuayWr+kpR7W3PUb1GinQ5eS1
+ D+z/uQKBgCNscJyQfhsvyEV1I+j/bjdKRSyJVbFstvZitRtOWqlbxPXSszvcbMhr
+ gDeRoIZ/rU/5IIp0NOXy7wTewP32RMY1E9U4i+Qj9ut9D1L5KLtRQukfxsjEspAO
+ ExAjs3jEw+NB2qSFhwAtUuK4jYMZnecqg2eVP9lyy/fnNKvi3mZs
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node1
+ name: kubernetes-etcd-master-2
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEA7OCxLlm8jzlm4QizZlf/05yT6WIq6cM6ivRQavke/j8rPCqu
- 6es7VWPXUPOliy83FOI4vpuuSnI8YFFWYfjUGJr1VmwB4VeQDENUd0ny2CUliiYk
- olbZJbyWu0Hmd6tAorA+LBW+k8LIjE1TmSyLRgKzmbsBmDzZs4+c/9eg/hRiwKIE
- Zg+M3H66GeLFWnnR2GcouaOArnfBx4mx6X1GYXOTwej9ljW+h6FkIldUhMnI2aof
- 7VRQ0xAgYYL0pp+e9Llu76SFEQ/+b6B9MoIHhEGwIGcGxgbXO4XI5G5mhpQJchpR
- /159o39LgpxiqB80M2N1l4fYtiZ5Mgpntm2X0wIDAQABAoIBAGdGS1l2/FPBZg5E
- udqsETiUcpR1HVqPqI1+mTUaah3VMqdnwJzx1wuSnQSJRaqaKjyrqKvJukJw7cvc
- innqf6Y+oSpNqsAxafc+v6vGjN8ZyvUhTiWNEd13DIyV3cJc4rBLgL+9tzo62S76
- Y7FLj2k1slIbC0XxecTkn0GYJHPBXtMncTgceefAtSbEemqnC7wUYiwggOiza1U0
- aB7GNPG1Mr8DWV5+dBKvu/kLpAUZugUsUuWrzqLBl2qNjAJsO2dKOaWzd7VHDJIP
- rdQ/0YCxK+PdPCCVgQQAJ9AsqNeS9G2Xs7HYvh7qbKBJYi3hRN1VC4Nj+rvcWdur
- RJCaOukCgYEA85OVfxZSXv+qj81QovRTGkOTPrZZWJ4WkkpBSIg5SRTjfCqXqj8x
- qk5cha2g3vo7WrPxTeFp2a8fi9ZKqe+9rXTBITXu9NiTgsd9c6EdBCpdCfZLdQHY
- 59/h2/lFX0/jP5YUWPtbioSmj4+qNqn0EH2NUvs1DxzluvszAnJS150CgYEA+PWk
- E5DJqNtPIqS3wPH+/LiDL8s7ogBEepv4tHfLun9suZO7p09P9gCFbymyv9OrEFME
- pOiZo5DHH4EmVPt03OgAibgM+kSFY+CUW7NM7qHXRro8+HPus87+EZiKWKBn1xZ3
- DE89lwdeKcuPVdlr60TbnqtFu30la0agfVdlai8CgYEApjUe3gmtS4XKLTY8v/VY
- f6N85l4nuYCmhkyFH6lU7bmDQUcPFuzoRv4RxGYmUAEQX2RKVIpsYE5PiGxBppQh
- KitxXegflpPylFrsD+rwkdcWhaW696y7Bf6PcDs4S0GIH+uZFt7uKCc8QNoXnBV8
- pYQG24jvO9DMMjsXI6Q/Q0ECgYEAnHuBow6pwmn+pq7UFQHGnUC4rIzYsa3rXQm2
- XHDD7Dh1tXuHQtWWU/Dl7gZOpUY9Sqhzzdep4mZ40nOSDW50ePmWhPnbpl71XN7n
- QXBE1eWB86HR+vSbwAdGKPcxVh2Ux1wGfgU8mDZ4WFrrgDGGJL4GMQhEb2Fs6K3e
- 6InLY98CgYANO5sW1WkdeKcBNT34+L6Pcxim2MRP7lmJJDcZ+guWltXS62VTNIvH
- m7bTOcU6PCTxOVQabZiRXEQ/8Tez3h7RZDWFClmDnRNTC/d+QXZRCXvoqzgmNLH1
- AWOlso8sgjJcTVN9XEckb2FB0uKl9GLhkd0XqL1Kc2JgrDGUJC313g==
+ MIIEogIBAAKCAQEAzAKkOG/cPnrfWGQD5AtQp1Mt1vL8s1+kkXTI3bVhRbxIJdaO
+ GrFs2HlUc3NSv5n//B3naiTNr/5vogffqyCOcmg9JZFYeeeMaZMx3/UZXOcm6qzN
+ qCL/VCCaHLYOvFS7XbnUedTCvHQ2u5hkvThPWeIFfv56JNfzZxe3YiCQ/nzZbn+L
+ ShwfJ7E/+ZvQAxH7+Bvg4GOxW0ABEktdtJNMvkOjArsiSXMbZtg2VolCpGSU7eER
+ EkWczZQEPR0p1j1UKzZqIoPnrmErlWvtxT5z0NfDOk6q15MuysBYVN6tXScWvKUX
+ zCnJsKdO4hMw/gt2hLVBriNyjbkxHJ7SOGrvBwIDAQABAoIBAE9EV3p2PCUqqM03
+ Tyu0Gcppz03Na9JmPxMlRUafywPFfGL3Uo+ckKYrvlx9WpGHzKaxF9FuK11OhyF1
+ 3booFDDvv5JxPudeyHfc8WwLV6d5SO215tKFhp+xay/srR0P7x0jryMHQALpRLrv
+ I3VCA9LwtyH4zoyyO6i61k4SSUQXnOtx1eGc/GuxOHQiAyy/abrWM11S4DLgMBoO
+ RNltzvb9i9ou8r68R7rLDTkHRS+e3P45HynbE3tm++8ZLvTVcSqwTDJ5QEecwGHh
+ TUAjLAEkmeNTLbY9Qo2p3V4ehSXWRrgGzAwc693Lz4OABNTl2fZqSBDo98Gl5uI6
+ ncOjFIECgYEA4vBKEl0DmcARIUKWImHmz7cuuZInMs7Oi99m2xnaQtIPbapJg+ve
+ AaAJ55yasqiStcT6AwAqrJxbbbKUCb5khtI3/AzbBBkycVZmi2MgpWB5OZ0dFAVB
+ +zUoN1z8Ri2RmS3GLyovDcbLZgIhjiPhHNe/G2nWCaQlkTZDz3arlwkCgYEA5iKx
+ 9eAeQE+Z90BylW70vSkzdw3U7c1YF+FvqQ05eiahFA0iwBZ+mLM77gL+vwt2YSjX
+ UUcqKm/ZXmwVKzZI24BjdTb7dcp0ide8SN+UJ1kepdhBvp5pZvKvQuilARRyDoFN
+ slCoYHC9IhDEl/Hx5tzvFk9kFWcRFfc665yASY8CgYB/wiUBJ4oiYYWDQvhAjPsi
+ zw6n/AbDTLfs+KzwBiLg4V88LtTKRtwp8A4DbR+OGubVG/pf/BUKLdAu9ozu21e+
+ qtRHunkGWqUSN0DtkbXMRH6al7/KCJe3s5pbaKbBX2ALa0CaRtZMnDDf0a1QVxSh
+ Zzg4V6HetaFMmc8dGcLJ+QKBgGIwh3F6sC2MSQrfaoQrlSxoOdcgBat4o4981iFw
+ zQc7GBrwB9WhQ15virBggsSMZXPK8yNwk6MLmdjZkKahQLC2tLi8PsnhGZv+eg01
+ p4aqVZM5E8P63snX3cNUc6JkUM2ziaz9EPok3+167gZOaoGv3irMsM0Y7odKts70
+ NSAtAoGAH1pzlzg/fgmZwCrEkU43ScExNfv8dPgvBTFu9bBAr0xfDA1kiubEXg9c
+ MVr76hNhBgl5vlmOBFT1tG2AH2u0+oGVckf50fvIpZvMvWZGVcRS8jRz2gxA2ji0
+ J0eYxJonIV31yDDtOWY+alKOu9etmUAOTG8HW8UfxiL+dzJitAE=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node2
+ name: apiserver-etcd
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEApAF4GLU+JSbN+8E+5BA3n0xzYrTzyGlJ/YrdotX46VLJQ7Hv
- sWU2b+4F5vVNOWWGgajCboc6XWNF7kZOuqaSIfjzmsk9+r+knZcrbXhO0IkSPkqe
- z+p+82G0Vf+BSCRh9zZVGlibvlABFbLmd2HyZY5oP7pLK7JYIQ01vesWrM4cpxON
- K9G9+1/IkzF65bYrXznseubduwWjhDUN0WgbmhQFyXrpOqGFPrTwchbBbMTTRak5
- oYcH3fwGiijUYhHOTBAXflWK0knt/1IShnASO6NFN7Pk+djXuny9OQ51GDE/0kp7
- xqliStggj7Jj7BfjpU0mdAPQ9gnojMm9XzL/EwIDAQABAoIBAA/IgGlIT/G9WUdo
- IohKM0AmWFhgd7GKyG8ZBRldpDW4HNxh7GJTDjkZXAINC2CBr78coZGHfAtuuVUj
- +QGndBrG3ZLA2TEfblUoLiq70EHrXxEVl1EFDTCY74TzMNrjfXYQCYKekmZvRpty
- +xD0ISK64Ld5UzCiWi7cGZbsX+NDTyk3PhMiAuHUj0dNB1/Tci1oxJZf1kHwemJi
- 2PFEMSiGygigGAE/bQDuFB3oQE2W9qO3UdyyzkAb6HetcczAATfqhsuZxjl8rpBO
- WRf5BRG89qU4mJ5+StIepWPmnpuQO8proDjJTZQGmeGcCeNhm9jFDBoLIeX08Qud
- EtVG9UECgYEAwgGtmecTu8HhXf96S5YVgA+UZTzvOCA4wi+opiaHKZAhjengfJfY
- aPZQQ4o/DZ1fJaAXk/QzSvDWG5oYH5wkwr7+crzyLuIc+PyNtDhN/XYD80P3vMFY
- CfS+vbkWS3gYlc8cHxtcZ6C85hroq+q1+rVz+rOkpsG6gaHY2clVmXMCgYEA2Gmi
- NuA9A31CyRNmDxav+K5irU89zRErxBxxpJaUDRVGGeQk5Ci26oFWYsoI44J3+Zpy
- 8BPUc0zFc/H5/z9g7irPsmNwrgAMztD3iTIUubK/KuWuXPF5fCEsDpO8eZR0GT4Z
- wcL73auFDL5XCEZn06cI1B1Ft6f/Zj7qnrsYG+ECgYB9AkHPeoNPp5VFUVqHG/VM
- qD1RopruSmzoS3dbYFYVpQbJ/9qjzeAneher/Ye1iSMHBopKzr7CWj9MV9WVgLJ7
- PkCMxE01goNyuKHCb8lpOcM/3Brk6JyHBcpmS74e8Qq+dU7EiIfZSkyN5Obp5/pM
- yuEpuNmujgRUhWpKox3iGwKBgEgipcxu4EeKeDl3+tvqrwtQbVnhgPMa1yDObl7z
- RjQ6NByrPFTE8XunUvko6N+U/JK5lbhKk9U+8M4eCTu4j4GzyXlnxgZpw9soMmqL
- w/bGCwysdHtMjjb/A6V0Py2zeyNy3LkGWlfgNUAzLeV3OmKFWd8CRtvZ5rrZG/F+
- 4aFhAoGBAIn6awJ8O3l/6djm1gVgcr8TuWaj9FIQ19phdbHov6rcIYezOKKU+E9k
- RNy2qtcnJz7Upz9HvtBJ+8c16WmyknCPLFZQhNbqdICBHf+3AZ8S6o7o5kZT5R8o
- aHFNlWg1NeoP9VxCdJshsQvbDTVI3O/1rYu+ZPvvjJNSt8RF/k4w
+ MIIEowIBAAKCAQEAshTgCyUlpo1zj9ZT9GRXMBRYRVXHquKHMcevA7ePZPXHTsGO
+ HAcWuEjWdIH4ZxGkxAsQRcnCgPZvOdoo093L4j7Zl0Jpud0kiQ3pvCKXGi7biP+h
+ qiYjJ+YlhoTD6IJrpBv6dC9hX2EFqzTZbqmd7wEH9/DrBNwwFY/l03qJxebVys+H
+ hLSpvZKb3xdBa4abz1Yczs5Jf1C2hCD3+zJ1+epaTy0pIzI/9Cgn/p6iRPZQ5r2C
+ xvFWNsVInPiXu57ALTbcIYkkP3J0dlog9cp7psuGSaUNdbZGvIFSeHjmMLBgmDfc
+ TfbQMHg7x+AtTmfcLA1HgM9EO1CbCk7tSu5BVQIDAQABAoIBAFHvCtn14GnOARJ3
+ 0S7Lj9XeNnLIMdKs4PkFX7+9D+uqrWXN5h19IXXuhUUbm3eIhZ9xW65QUv5U4/3h
+ IxG/pZPVyPUwKEbMuYeZcCYQYCc60eUpgG8xltE/sZo/sYdjojTiboxQVGO21w3b
+ hgLFZZXWip0IKomU6Uaya1KuuX7kneZEpEVK72vUYLHpjJpdHYuTowX1l+p8xmpW
+ j+wVWfOl9SBjmz7jKYUubrRVX2vIYKlY6DmMiZuDwzSYejopcv7BnYHyoQZbXxxT
+ gCHoewYVUHti/l7dERodkh2oncGlmLOyS0fXsvmMuOpHsjAaT1ItUfX7buQ9wMiR
+ Ziiy9A0CgYEA6BIvvdXIP6XDCFr03rUsioAmtmiLv6JZ8gqWbQquQLzdrorzjIQI
+ nNbDBaqGO7F+L/lwp1yHMy6wpYc8yrtt72pvJBcWMpijQS+jDvZyVzgbBxSWGd0C
+ FXUfVVEtBHJk1Do3WvSrSJtTyNAWkt2F0rUE9zp1ZNuoljNaiguApr8CgYEAxHGR
+ BOKGMDfr/xUZff3U8dS01TB4Zn4zZ3T9n3ivjsqWbqKkB2wTHBHFyR4BMOaWoSmr
+ A+RtSQp/RAkyTmIo8aHtUav0KZneAMEtvXeZtiAElf0SMmGq8nfQDT17r4fyiSwm
+ Bd5cCSnzJL2gJqWnHM9DkqW3XapqAeqXLYwm0OsCgYEAvbdgYAiMk7unHQV+eTIT
+ H4Z0H1qIJDlM3pnZL3szyKidcTsWryChCdZnyBIHenU3e3Cnr6nsvOLGdguAnxtq
+ W/betNpKw0IU9A1Fd83w22x6a+dgbfRG59O/sbeS3bfGxdhxuGGcRNb2P4wdaCLA
+ a+igDpwzrCgGQgPpWEDfA3ECgYAL4cKfxQPQztEbcK9GC6BhsDfv3SqrKF77lvvw
+ NWCJBn/q2TOKr2LIg9quu33e81ORE/AgICTsEhJ4jwXX7+ACHYU5N2lhSsk+ynB1
+ 0VIezfj5CYGcQoQQfma7Jkjg6RwmZ+E04ao3c64dPsr9C2/8Mh0oNZXNuI0I6KOU
+ QbHnWQKBgDCKd7CyEFeFXd3+GhHGKwDgVZpmT/j4rfNJjq8jUH65YvhIPOZqQ/A/
+ 3lTesoZ/r4zAKebnlSAFjnJebINqLEeS3bUsjHcdz7rajYPCKId/5cggKasgJ6UH
+ 2TwycoxN5WiY9tsQs1wGHS/1Exp7VgfcDOjv22bedEZPN2r9ZivH
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node3
+ name: kubernetes-etcd-anchor
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAzItd4+E2HwseOv4ugJW5lXKGaB5YvyRIdiO1iJATYehi9374
- i2Gr6xQTXhitg4z693W8mNo01g28Bl7Qe9wJNmL7+jNh/5NqXmKr8WdGUmMPPEtM
- VGs83ypeGf5xGQDDNiQ4pg3nEOMC/ccGyWSk6+Yuy80Vl3KiRnijrAQn+J7YtLQo
- Karmkusa14Qyh5LFTa5H5J4klnncxh4/XCR0RTFVz+Yayr/iGZaHlQoyx8u2CUNm
- u2kUpn9EEIK5TJsFGO2wOBQn7AHtYNfNt8bamU6XddIvIbveWiWVxkDowJFvFGWk
- tRCSI5t7f0H+xKpDouci3BZSwWwnwQYABkgxwQIDAQABAoIBAFkIxRq/Wl6S6VrG
- b5l7EugxjL3fj8PL2FrMWmWSSU2R6RpQQ4HwRvQxreiEl2quwENdFXX3bY5LNjAT
- r25qrfvlhEc5fIvSMDfbfXq7+Ik+I1CceiI496swdvubnMFEarSzeZEWdiEMn621
- p4ecbolcjbwaji55MJe6RYxH1tpKCuYSTZeNdfhtqHcuLCAa8gdlHUuylB46tPK9
- gcfNIzD4+K61NlyyAFpG6l87UHhpU/H3WW3JUBUYyp1gCYkHdTg9Wk1n3P0e2Rj0
- NCrLbptaZVinD7+mwW+3UpGEM4loFeY0t3cYXIEjuadAFhGF9s935tnXJDjLpXN/
- 7WDc1e0CgYEA9Ha7BmrtbejDbYzTxGPr2c6FDoUjL2at90NTiO8sBbK/4Gr/xvTJ
- Md852sz+mwYB0HZrTL/jtio2s3CA6svMP1dQ6A634Kc1bDLthRBMm1AjEC+FvUi7
- zv7F8zkxDvyehZ6TLTXsQHaDIQCfkXqD9auFupsnAnrixe2Vx4nLvUsCgYEA1jJi
- z+dmkBi+jpWWzEFvmm6TbLbzWFLeRgorOQnvQrcglFSKiEMw+5a4NBSWQtIq/ePw
- ath4lRacFEMxTDEXlb1IJxKAl6qjAdBVAoy4hdmWfd6VPOLN4sUkjELbvQjKnbxD
- HF4qBWbqr9ieYHXciSCy/JGJ+Fu3Y66mlgF4IaMCgYEAn2AAkjCH1g3XysXzEagr
- DPaM3GiEBdUlOXyVK0LyKkzctwxK8ISJ3o+vgiv/GUYTTLrHPWQkqpBe1SFVir2O
- zQS55HAkBLw+IeoZ25RCvUbDdTvmLv8KIesLVoRErYaYOnilbuYmvegFmTB01z1O
- Zo2KQ5v/FKjUy0EXUt1NDH0CgYBBZ+lcauCap7Oofm0pueGGWrWRwNvV4JgW8wv3
- wtzYlmrQYHBc44eVi5R78r1fciXGmU/UkH1hqSHH3iyzg1ocU0wxAilaJrTX3PHY
- cXf3B1Y44TrY+Li9wk1Ctze6JXEZcV9czjQuqhqHz7Gs6tCI3v9IuHhU6ky5l58u
- twwj2QKBgAEde/Wr0xNkuPKP3C6y62Gom9KwYtKkCws4xRrMymxzcumv9CJeHNF7
- aTwu07X8KD6LSpm205c9sTKfCBhdZOKZVXKXfErbDFbOoMCV+WG2GKmgHgjMMKbt
- VNp722ccuQ9ZSmk40QpzdviaG5Kua2tCVqd9aw2tl2sdHhV4Fxeu
+ MIIEowIBAAKCAQEA5T49VrxBjczUIPVmyZZf80vI/Y6EW/8k2p8r+3Cj8U8YzoQw
+ 4QIuNmUy9Yt3Hp8yEP0VE4dnKv7452JGLFBtQOW+6jkfIW6j9d4beeehlOqgvPTM
+ Tl5RyEPwzvN8ZHi68hOTGvE02cuRwjLgXncXzmimPrSq2QyNYkJ6mv7ol1+8YTxJ
+ OVk5tmf0YE/w39uIeAZ5N1QqH2FiKb3AbxSedWAABVqvEyesLijOTJugXN7ziSQl
+ qh80iW61pya/FZAYo/3efJRpxqOUOX44YWGrRxXIfC4S/sSWZHtI2U+LE6vAe+2y
+ IcgxHxamUtLrkqEvNBjB1HsZCADIGkF7tS2tGwIDAQABAoIBAQCWlPijxctlwrtA
+ 3xHirxVd8lUXQQtuhr2FofK5GneGJgfMeAbHdrA2aOk9Y5wekEHJ6QR0LIg3NP74
+ tpQTvczWSVPL9TOeuVeYRIpV3DJGaIynMkIV5FziKMbAmi4GrUtXgkYp93FY8yBO
+ qS66vo3ztsgk/nYPVvB0L+jrcTAFZc5MuJ4JoJPt+j8YXEyaD4yCflmeB2iMUNWu
+ gKbEW12SZ2ZRGVZQ1NhW8oOMdfCQO7e/UPr8CGCuRUYLv4TeIGNqucTiTSZ1ZZUf
+ mB2RFjMSahDc2B6Ky+x9v3WZcKkClhBSCigYoliw3I2VBXTgSq+PYM0G+9ldRssQ
+ M04UIxSpAoGBAPICTLVJ43s8PR33/YgqkG7810X0VRlQsDt1LmQiTfvsLgEeKnsu
+ B5wL3NT0ErqU8CAF9e2Jqq0eLC0RIcSMaG1VfKtxeUr761WTaz/5dLZ4lwSJAeGl
+ Z3BhWhWobI6s9J1GPBowXI98W+CgQbAvp0rT3Wpy29pn39grAqLzt6IdAoGBAPJ/
+ Acg9wCz809Mmqvk/L1AnrnWPMQCxhWa4O6u98m7QEwbi9M94zhATY6UZUwIiRhCJ
+ kaV/peNtuNv9D4rUMesGZlKUEIA5ugshnZlgVUK6iwsyrwGY9InFMGRJoR+ZLcHU
+ 64gSkJUTMT1xa70S8qlp89j5LkFJ9DQ9D92zY+aXAoGAO/dD6JvhaRTZFAbx5H6f
+ gVDXSrcrKvWqZWE42IkDh8vS7mX6IsGaExmBY6cCyQbEpTq04GH/T5wtWBFpq5ka
+ +xR2qsiYRHM9sduwdI6sU9Z3nSERvUbN5bPJrZopJAVJK3tOwzJ+jPNElNlAzZZR
+ PqJWt9y0C183wQmPQq9fLiUCgYAa+Vm/Zm8MEguV/0UheI/QwLk9RnJS+2w1YuTw
+ U661+NtE9tX4hh2V2DJLWSfMovdcO5FB8ZMIW1omzl1+OeBbnlifcuzq9oDlYBXh
+ y79wLsPsuPSSnusEsDST00Ti+O0IFKEmf7opevsNNKKhY4wuoCSJzB4DETDi5q/v
+ H1dLfQKBgHRl2G+/RfCOP8a61HmGZ//S3BkFsbr86p8+1Ulr4JZxmFyOHd9bJ5Z3
+ ctqTeXq+hZ+sQqQH7RyXrTuGd/kZGNdRiD+uPzQeJiZ+uJyF/tJJRc+JSpWKTonM
+ sXJ61LZmE680noAVQJzuTE9kgnWCo+6xOHderQCR0APw1/yZbJWW
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node4
+ name: apiserver-webhook-etcd
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEA0fTrh9OvBpS2fI/Oi4HN/FechPjaXSWRGyTetyKc5bAtxwE+
- /mb+YUfpEeR/iJI7DHuC4UQ1AB8z2Ab+KmQRaHMOy9/hdOs9tFuD19wwPFWFJlOB
- 5E/wi+z7ur1jSbH3/BMlV5LT1HZD9QrT7PAngRwD3IYGAf3WpkoPhX1V7Qqa0E99
- +Owv0xtb4xL1zkO5BER1XZD3OI9n489LVLDMGfG3x5sVuGX7chUsbEFGTBH2uTh3
- 9yUHv+hb3yNkgn5l39y9VVC+mobH5nAJ52R3doIJy/pZ/YZyHAp9OggUkSWR0KbA
- KUdDIgJOF9JTvRI3IUx1ZlLPCRDNF8uFAQxOlwIDAQABAoIBAHsSJj4oR6CD67R4
- V4pPPH9+m7EWbmnLa5ONuT+Aepfo/ex5PoPBu7sqe+SRHHDhxts6Sy3g3XCE2c73
- ymTu44VmbHX1diMjAbiHLHGMEHpNZw9gQ/OhKE/dSnHcMicwuzx3vJvo5WLVMGCj
- SDbLT1zPHzRVG5BvSzOOliqZnZSkYu3sH/tWZOZMIGiYBt6LXGVw7CP+ybxRKN66
- Szafg1QUfzYlUAA2SIa49R5BNPAYkoa3pFgOctslJ/YIbrfhOAXznx3j3pXTXT4k
- BbdIXywkPGinI1VQ1Yts4spZAwfECmS0LNQjYi6VN3BFpLr/aM6iYTXvSladQ+cq
- 9bJBNIECgYEA5piLvDKUDdQRqjkmD1bc9d/B7UoB62Bd91CAS+8f89NEwQfkcGXV
- RkbsHIH+54AjVxLttPULn9sJkyF4tokduikN2M/Drppz21bl0e25gn2fjmxtX2mx
- Ns8InmfsgQJD77biLtLrISKA7+lewEdgfd5gK2urZIL1XPQ4QYV7JZsCgYEA6RZK
- peWKxts0uYW5Z8Fh5DCuxOzINf4vRdIWhzo0qCpeXICQHTxYkO/eWQKG6DlX16GI
- bBzzDkR0/oKztff98HAKP1qP9vxvju+0alUOSSx3lucLPw12DV8d7IbcQqBtS0B7
- M4+dV++Rv2JlXKbRyqdkqqFNGvG+tpYzpPQ3qLUCgYEAmkrZvMwu6m3KgBaLE9pw
- MIhOjwJk9GRfm1qe7bALti7Xoz0vqdFJeiN8WrrUn3vKqbl9mgYYiBacenj7908Z
- t/U+UaL68PphqRKk5ellph1+RGLib+Qdcmnm/27T/aJRaLT69I+mSl523ZBOGOPp
- eW7w9DyvyqohmNfESHsS4h8CgYB/nByyRsF7rXdoOrYO/+jALYcBeUEDjm4DI8oB
- rvQ1PTz8F8bOusMiVrC8uo1xhjN5co5l4lOPdBs5XAVXkrYMdMqndMVsyzeoYcO8
- k2SG2zl9/HBDzPLczz5qyEq+j2ZG1L6es/nIsvhwd0ZXO12QPaT3Zef44HExNXqA
- zNPMIQKBgQCsuDhf/RZvd9msACdAWY5EkXxinKgsSrCKwdhHSQYtDHOK6+BFCw1Z
- 3tDbu8tGkrn3q7yXW40+000+qjKVzc8OknWRycgpZajPaTfrMAsvDtdaNjAb0iYC
- sBBBQz3FVaC4xt3R6hzch1oOvueryqD1b+tQN0Mmw/3QI29Y3gdYsg==
+ MIIEowIBAAKCAQEAxVyyJXMZ87FsDk58jfDjlENltvM73jtmoNLFYuvUOnAxEFSB
+ ZfEH4SQh3aL0yQy1HwsWeuRS279Zmx4PYvlBZid+SPteWdioNQyt/wnZ5nFHTkIU
+ +nSHMGtxFO5bjGTiGQZG5PLzaDklbZCCN5tRhkYltM3T3uAffW/80Do1XNDZqVzL
+ L0BWHTZ5ABgdW7Z8TESt2XkHYAj70ekYxkTw8EcOYjlSfIGxxiXFFElkMDy0wXvC
+ KWahjAz0LJ+GaW0Z4MeNrMdpCwP/yWtq42J6xHSkzeHiFUgajIosgXIUBJnxZbMC
+ 9AuyBZfC/qLwr8cqfsDHxPEmK9bP23AaZx2tpQIDAQABAoIBAQC7QjZtPgazp/Xk
+ pSec7aCg/km2CpcVRrsbgKB0OVpGkEidO/ECrm1Rexz+1Cz5zarUZ4rO03Ciu63j
+ deQXfnRE3tf9mzNsgBspKny07b3n3jdP03dgI8xZbrf+qiIG1XmJUOFXPgUhMIeI
+ q4JCDIaPpmMEZ/7NC04VkHoJgBE9m+kvSVH1MTsIEQzdoXlVik6TW+AVMf/7OewA
+ sL8N4Do9fFiWteVkEs5N4xjNdT3Gytanw2cMnwWb6o+hCpjaBq5+rbfPWcQp+Bi8
+ xMijtwYBfBpsV8Q96zE2jDHf3iGk3INuTk4G1kSssiNXBjQ0wkUEcagbCUBZ20gh
+ OcrpSULBAoGBAN0k0Sh5FD2X4DrImV1VvgxhduK3fsRxR1BXemJNfh6JiVJc+vle
+ NMafAMHjkK1r0IPtyWwpEV+i7MBpG+iHGMnlxBI+jaNGAReZ0LTMuYRZlA3/CS0Q
+ DvY7zzL9UkE8l6bNd4jKETsPZ6rW7tvVqAsS+jS2hR5Z6+UFT/e62GmtAoGBAOR4
+ SHmOdqk3zEfBzoICexNenrbhlHgeWUzX9Uv9Dp73IvQSjkYsG57lXdC0vl2T3WSA
+ GQBC/HIbpfSYTT2T8dECHlsGmpayjuFZJ5AN2eO3Wm9EWgScSvSRbS/1Vx/MCvw0
+ YYhrniX1/KYaRp1wrSZs06wb9g7OVmDAftMc08LZAoGAFwejhIx/cB6l6llDp3Wr
+ cgygXeHwILMPUy2ZAC3DyZhXJa2rMVb/NgQPByIUygqlT2fvBwWL2qLT9wG7N08C
+ ZNw5vBCpnWxH5tZM5tc/JqpRgdeic//tHvWBkXTSIRsXS/av0R4CB12GVUNG4rvw
+ YR7b0auEV3HT4CjaeBkMOo0CgYA8l535Bwx3YoH+Aetn1YqYn36OWBNNLBdY5ul6
+ ZrnK9RZDDuzGtYn5wTD5WgYmwUF1FvgKdrmG9cg0r3PEwgje+qXcVEsJbn+wSjnQ
+ 3auM1iLY4ZLSKDVE2ZDQqEub9jxvmODJEmmV/cAsuUlDFhAF4dTdj2jZkmWcMVEx
+ YjLTOQKBgHCoFomtwCA2MRhTFWF7QWOahAHnK/XCMtU9gEyIn49vjPTtqbl+jkXu
+ 8Y6MGAaFJHgs014Noy8uyt6MXUsLR5fqXwNIiRxU4Hu/XLRFYq8+qqHQdaSmVRrC
+ D7plS0tjrfeEbirI0a4cufXMbUACZVBfjKBehUCRa0lfEF4YrlL0
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubelet-pod15-node5
+ name: kubernetes-etcd-genesis-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEogIBAAKCAQEA0Xqu+h36EDglOvI8BcS1Sa8Xpdwjh0oFr3RbQmGmeeSi7VkF
- IiZZfYhjFRb/ATWArUn8nvelwgIzTCSO7mh9TdcR70tFELtlEudTAqohlQOwIyXg
- noJoWO+bvC3GnF9cST7myM0y2ZNSaiHJFBmQ+yR8GnAMUyk+EAF+6cc/Fx/s6pxH
- FnLa1xG5nEvFBXgreikqIpkmHVMUZWVRjFcPDZ0bmY0/W99FmnGwKNmYwqVToX5X
- 1n6ji0ZQif5T+V2lOLgFCBOB3u+POEkxvSWyAtVZ2mwtbQbjo5S8BqUdBmxIXVyC
- PqJd402aTq6RmrZKicA/WALqlVUnDVnQhcnXiwIDAQABAoIBADNS5LYhTBhXOT/1
- A6HCLUytWpTnl8jY6QWw838TH8+zpfuTGP/h94EbPnN3W+k2650JiJyGPpWHJnxc
- ZKyi6zh8HkfL4FMWJtB33s3DU1EIQ0qJSDxt5RUNN9HmQUgk0R6dC7xdEj1erA2W
- 04ZaMTxnFwT/OPXTIAKZ6zdp+to2JTSou1z0PM+kdLQB4MUTVu65sjU8N2o4ZnOt
- vBaKT7n4emVGK0hv1PbDRL0FV1ubRdLb4YOoXh+kbEXQcqhFoXFOh6byIoRxizCm
- +AdJDFSAHS6JWps/vaXp3i+SAGVpP2WSUAxCIV2sX+lWuf3MTd2VNB3a7KG7mwJ8
- 8pfWKxkCgYEA0cJTAjhl5TbmIn1bmxaq0gHzsAsIuyJ35ICVqZOZqT8mmZmtvmWG
- 5/012uYBLI79plzmmH6v8z6fDEDbSgB/FcM8nI5iSZVQMzws2UaA9FPKE0UxxB4C
- FWDSUWkhBM65d14xZGqAf3N8edd3Atzq+yfYFrwKsFoxO75vjiW7mt8CgYEA/6iQ
- 8wUeKnqzEfSyATsGXLyknjhup+A//Dh6ZUbfAG9j7ZqoF52q0UnhAziDT9LepGKu
- qvWA46sThb6kib7U3xihGTbQXZHL4OqF2MlGomVtXQVEuW35lVVG93dsuO8132Fi
- GEFfTdXHHwDkcL5tXLZ38HC/OQZZPMK2E20JhNUCgYA/BS0/W4ZxqV7XOeaN3++O
- jPuUBpym7KIsyt0sR6ZBDTIhr+Rdcc9oX9EQZU4w/v0CQKMfaeCfKk9KtSmtQBzu
- guvw9W5eQTgJTKkE1oPj5FCwHXfoPkPN/Hrz7qv2780VKf2Y986HfEEHsk6VU55d
- uwjXO8PSXCaylnKZuIh27QKBgBaaLoZts2cKBf7WZU5ai4tzWhJq5s2Ms9t2msuN
- YnXFY05EWAwOcmWiZHRGcMWD3Q8nck3G+qgmHcm7Owy6hFNc+BEkmXNMSnwN/9tU
- oBwHX43Tw2mpYWFkcqu6MTCAZYDkOSnvzZ8yATKqf4fALib+MshdD2rZNtZ6WGKL
- R0YpAoGAJgeBTTEJLFGiRnoVN4Rrkf0RRVNSfbBYek6IKrp432DzZ9zJvicvxaXW
- exmXsCCmqFxwVHD9/hayVNbZI0uPxgEtZQCp0eUtfaH+D3Gg7PfG3t0/d/O/A7iV
- +bwUTN+AtXQMzrxVwo5jffu1XoYcpHZseCKf+uKmFaM9YCg4UHg=
+ MIIEpAIBAAKCAQEAxZT9bEi416gQkp1MtzGXdQuF1afcKvHjKSga5lTcS26QzYLP
+ oJYnlIeNcIZaa0GmgcE1xwMgzut/sSTWZ6FuFzUcR2ypm32BQlz3/sZh+27wjhBk
+ 8Hjx5e6juVFpjKO13UEQU2D60BTiPs8F4AQ7er4zU0pBbnUQpO+zDt0Z8lX0mh1L
+ k0fteVOuxHYRqBHTBIep0vQmIroRW1s62qYCuokLd0qudITvkrBG7mEONrKUa/Vc
+ Fm4qYXxlpj4IpFRBtPcrEV/GufV6qaFp7YXv9p4DxepeRJCgq7nH01Bpb8HqYspi
+ 5v2HK61FDHA7a1tycz5F40aJ/Zm45/bSNkcm4wIDAQABAoIBAQCLkWEqmnwnqkp6
+ pq7IQTmxrkAN2pNFqrRCIFhQF+W9Sw7yfNLZpveyjcY1lFJOrYNG6Qpp2CXWxLfg
+ lBr3/SpdLmEZewKcGZ2zGST9TXltOMKoN6B11ZlaSKZSg9XBSOtwrUMxArJpRjdD
+ Es4dnh+95pku3qc1tW/aco/Tkg+ABEWhdgxxEE4Y3WCyP8h3nYiSMntYRRv1l87u
+ eTeszcvOtwXhvKDWqjxZeP6ZyLe8tOeMEQev7QOMi0pOIghNboUtnFHs5fRbVBhZ
+ fd9rTJXefFaNqoriUFPcfeZ86nm/re5bmtdTZNlTLvF11YJ9wwRUJWjGfAYSelus
+ RRXO0MQxAoGBANUxQfGYDBR1Xpg+xxAk0+CLnXQ9vkTl/a0yfQHaGi8tGYRJJJPb
+ 3zrzoz79PqyOWOjhGuvvAfjhqOtDj1t5OhunkUWrB5HaS0F9TK/t9hU+E/3d+n+7
+ 0abO3I6mpeKPo0sWTaFRYrlEvBtsYt3CqjNC2tuXnwq4YoX31xSVgoM/AoGBAO1B
+ Txegt3eYP9fe7A1AGSZ84SdmbNtIgTf8RjpLxwxGbW84fKSrit52QU9fXt6w9ldR
+ KZVBEPm3ZYzvlOeiFuTJvL1j0tdVlNuQ1GUvhy1UzRsTB+B/gSECfaDmO3jlJHvV
+ Ld93bshT7F7DU9NiCMuY3wk2sQ+NlpamMkmZyUddAoGBAMgtWB3hBnavPgL17zPZ
+ YJiWf2GGGAHZcjgOEBKNF8j0L+FmTFIJQbG40q9yWkbr4c/Ijd66rL9kI5fD9/eL
+ /GO7E0y3KoRo1ADKBheq+EU55Muagnstf82ArtfC4j+5XzpB1uKB6JDNWVLmkm5n
+ OiinvZgy5cLLHrdr3ygUuldBAoGAMY53r87BI7jodPW6RpZB6pkhCnLJgBAn9YK7
+ RIf5fqXjS9z3pAm0yvzWbXbVQRyjh9+LGQLrQc29529PogZoU8eTpdeI/bOBkU8y
+ HiSMTrqs0N/rwEfBuBxmE0qj13+9XCROHaQ7vppRAAY6pyeOAMDgrXMADuibMMJs
+ NJVrxn0CgYBg9YdMBulDZfPIHYpRRW7Tq0OWPwKi6gbx0nUwzSU/cd4C1Wn4RLps
+ HlTcVlI2bOpwYUVhFkVlTtWDMtZt8ompzBBNjPzB4uSgta7rTs6fpPv+RxDodKCb
+ T+mEDo2zPWpRwduXv0ilUbVQlykqU83a0hCnZFkwEWfPKLHzL5ynkA==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: scheduler
+ name: kubernetes-etcd-master-0-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpQIBAAKCAQEApNRfOh3USdgskFav/nrkQR2zqobvLFvRu+oku9mCan8Zkx6x
- 9Fx0EVDj1v5tGgBIYshFkMkG5gWBpUwC6bq+fDKIlDrOgf+/YphsuwFfBt+eVa+b
- Gv9ur6NfLgju3QO86ET2tH3TRd5wnwg64xaHfiXTgZfuTybn/SW+RmRa6uEON60t
- wZL/p/u5AEwmpiD3qw4dE/hecG2UllYsMU4OSAIQPFUej/JbJLbDCE9FpGFWlWnK
- uqe4VXtI/HRIymYWPItF93vZygTDy/03SJWNZB6VsmV0JbrfJ8hb7LFbZVzFu4fp
- IyAMCE9KvdZ4w82k0cB6J5p9iPUznbQNyMgnZQIDAQABAoIBACFXmF/AMvYxFWqp
- Lnay00Ncx8BCBVWayUVS6tVY/WmfhkPdXLAKl6v9Cemuk9FDp2DcFD5ie9PB32TZ
- iGlRTkD/U+NwNd/UJRnDrZLyhw9z4qqAmEaQzwoWaSV9xxvMKsVtVd5S6Y7jnTJ+
- TrMrFoNtEWjQm/NE8n6hyOiiWkXSp3oQooIqM08bp1vYqBM/q9/smuFCrM4mSMl9
- a+N6tjoLYECr+dZwiNVAIihA/9v1jAyrmET4s17DDUOrT/oULWfewBtcNfTnFtcz
- hL4bLmt+adANcQpQFy5Vv0EfLusH6jgRCtlDbnTfBz1nxrZicwgglrFhhkdeBnoN
- AWti+QECgYEA2UAas44dmqv7A8feiC/9RI+B6Ne69CLdMbkjz00fiZrryS/zxHva
- HZeJv6gRT82eF9O//sRuIntmWi38TtXxx3TZ1Q3QQ248SBVzeV/vKRvbfEiWOoYS
- HEGGolDtwWOvF8xSEusaKG07xmsBANnZLlbhxL8xTWAfPd/QOHzsXCUCgYEAwjqs
- l+x/dyZQGpdW2nYRLa3zdhswVzpAcRS617BmBcCoAi+eHMJsVScyjCUmEisVgge/
- hbL3hHGzOI8UjZ16A6k8xGPhcDfOg1q6j1u5F+9DUzhZqSCmtHJqA8hm0EjNa9DA
- pIbhw7LqWDqtEYa3AjMyTrcFG6xQwj0x9GD1GkECgYEAuULoQjwr1K1aJlQ32W0L
- Dn9OahAltnFQrUlTV0FOZpr8/RjuSJzRWLDUX+LjuGkAqxMAxDIgNTmEA9z5LwVU
- 5CEqbXwVIJuNvm7EhTmhCi5eUjLYIVoZcY0TUbGvvl3Sf3nWd5mTOexEsCSpu18K
- zHB8oLnmQjR5D9ufhbxKFx0CgYEAotB+h6f3PdD/Cxtb8itQwSL1WEb4YdZx2JkQ
- +udizmWuMI7sEp2kJEmEZNhrLoWxNNv73z6joAGTw9Ck4QVmF5WRW+uCOgh987xl
- cPDpmre1jxhIiK7XL6JNXjhqfyTYFg3avtBWhi7/pNAi7fMojA6QmE1xWb47wGd9
- 7aYtMEECgYEAt238yyJe9dBrPW5KxDOh8A9A+6hqAmwpCnnZr8c4W14NaFwt/UJH
- UDvauYTtTNv1x22s1+eueLyWHpnJztoWJkGspy47sTik0eYGSkQXjQ7eaLZvSwgS
- G4e3fGBO0PkWCfVXDw8tLV+yZEIo4/EmkETw9gACGBxoRRzvRDmWFuo=
+ MIIEpAIBAAKCAQEA1iUo2vQPo+swISzPHejXVOAdpP3clCb4RanguK0kr8CDfLtz
+ /yxwn4528ljNLKzxxM3swtbCGY3H+79i7kPE6KejPlI4u50yUC9dLdrFFYsweiPo
+ FH7TeQV9VxBkAeBpJI6yGaiiDOREEcNgZv55uIiLlUGPrgCDftSrd1jkJLJ3LcG5
+ qpQmKDnfz9g23vUrEw1fonopNQbzp1FomsOo+4JJY9U4LYK6gQmrc1GXtXkOuPPS
+ q4F3cEWDfBe3/1XTHYlOrmYcHZzOkFyM1Km/8egtshYsSmp8ZQ9XFKMMke+QfFw3
+ B+lWnM0rpHCcf3GsM/seJ0TkyAgnp8PlR8LMdQIDAQABAoIBABjHHe4PtUuTJ/N+
+ usxMJ7YzZFq14PLne2ycFltn9Um8rbod+nL5EmLz2gF6kurra+IIra9xp+3LAOu5
+ HlpRTxRYaUQJwXS74Jl0kYR/vrQacdaAFxdgAVoMb49GXzv0WlYXiLX9VBrHwrSH
+ db0VDsJyUixH9Lb+ajifpONfTq6MHZKfuCSc9IRerQHT54riWadV4uy8/UyQun9v
+ PGeQMu8BKZH+uvv891eDbQeNXSqEgfTRY1Tfw1+jCHwLBTH0pSO5PiJys7Z21TQM
+ Bh44xnMwPkSxPieLQpM1kQB1rclKMO50OYLRYWh5Jk8nywYDaHYUr+kb+kqM/0cJ
+ vpgRhbUCgYEA4S9G1axmHqXDzy3PyMMqLEtScjrn1YpwEE79N+gqLzl5cOSmoz56
+ QXvXyUnhNm/H1Hc8IO7tfcbLBCogqewqOHg+GCDsFY1OjVSYNH8PduNDNPOL9Ndk
+ EDYRRDUpAJxx+Q2KUj5PLyyKx2pTOSLXFiUYj8Gp1JejPkirifigfiMCgYEA83Mk
+ z6iHLzM4eXlBEQGh/iY9Oyp4KWoKNYth75T4y9rPmoI1zprWh+0H3jZ0+xXmSCec
+ EuNmBRfTSAToh77pVJ2Va/iRamtap+aeBa6qGJRX4f4O9wr/VDtpSZi6JevWCNgC
+ iurtOqcZnfrHMYn2XOLswIDR4CGQXb1z7OvPGIcCgYEA2Pj/rKS3pPId8MN4gT4j
+ pZhR8YT2mxgQEHa7oCHQe75KWE/IjGSH0g7tBaNtIFGmXv8gba8qIFXqibG51WCb
+ 8dtSIVefgsisFpubKIIBOZGS0TOV+C2N2dzu2CTMxCz52HqGe+ZTz+WANtMpK1V5
+ n3nQ57s304LkpP/KYV+x7LcCgYBrEY30AkOKH7XLvuc96oDrPLgbSF9Wn3tj9ywY
+ aWVOiqpZYsD1X6XQXA/kzACA2S3ROBJtQDODM+pJN1dpNC58d13bAZQ6wII7a7K9
+ /wZyDvPjwY+lWOHYktSIeLINsX4Nn6rmm9G/xPQAReXLRMjkKy1CsKUdNMXAZG0S
+ mtcXCwKBgQDJ+zKgiU6+vVsai3ELSIfKBCzfa4Lh8zIBkRu/w4Pmr8r4UrcA6vfm
+ CL/u2TqpzxYXZpFousfaJRVtXkM5N9ptzouM49Qd2VrX6UCZQnBEhvOJ16ExRdiz
+ 6To1zAkyAZPVH4Hxwu6MUeYMk8P1JxiJFzVEA3DAJAOeVqOO/Lu2iA==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: controller-manager
+ name: kubernetes-etcd-master-1-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEogIBAAKCAQEAniC294LZUqBY+kO0sxrvCLiExp88N4SjIfr/SRgYlcDMzidM
- 3Lhi65634B4YLqvOmwIOYWo+RUNDdV3Qr7A1Qi9/yNhTIuZ5Y8Wrn6NadGHNGYSs
- 54A5P4guQkTULA6E6UpzY+03w5LsSZO7qV123z2z2BL2Kx+ecgF/pscy2CNhuR0D
- eUOgQr+jpT8q8mu7e/8wcTLNQvSfTE/Mb685PiIRVBanvfPjCHeNLEcKgFvEQ5o0
- 18mEHcTUVojoty7xPBW+/Bj4ay/DkNadHJTDf8MNDMzRw98bpgJ/KFwEQggHJ0ql
- Dtf8yAnHV64F0a5BrGxnjGgopl6f8CEGZ8IwRwIDAQABAoIBABypY2Czt/6RD++0
- 7AD25dLX10FFRZ3ujb8wBqvSEUq7mqPXXcg4J737k+qsqcdz3swb8E1Z+5WEXqrc
- aWIe91ha0beu9krCKcia4MPb0R59R7bTZJ/Fjxrj7TaX0Tl3HEJI+2dmbRAnBmtD
- uuU1CsHmJj4JGdOxNIAHo4KwYpfocO0OZpXUdYNBKpIHlxXNZ2xFBbW8zkQQzFz0
- eZd7c6MRiZdTOwJj5ixsAVK+AMuFFARjcfsQAfKeKbvaGCLPoBaRjNTKFz0EaZiY
- SS3cX04BNy45cOUiG+tlJX1xHFON0z+m2P+ed5t+GHpwQH8jMYC8dfRBQWRxcBN7
- zgw5jyECgYEAxC8DEOZoP5xNpVpmpz9P/ccbTOWzGTNVig1argR0/tEdQ+IJBZCv
- j39VVOEx5+JRGVhfHoMs9WeVnJbRe1r7T+YMV9QB9V/l5avBhsEasSii8lTJsOwW
- bQL4207uAXFzah0xOKnwOh07ztM0E1t0XUkGPEK16nWOlW8+r28A/JcCgYEAzldH
- JZ9E51OGfeOzcePueteOObsoYU8xxNiH42+JYZJ4Uj5V6Dl88wDi/u5SU9PmQc5t
- 38ZgqwQF4EZISnM+lIJfynRhfYOXepxlBgTPUogTxf5nncf3NXfkURqQebeDjLGc
- PkmMKlOd+mcFv1tb8yxsmQ0n8EUjeVGKOrJV79ECgYBu4/PjtZjve7YX5QVpO8xH
- MigoSx30/KM5KVs8SaCn+COGn1liH+pcPilJlRDUdYRJwz3gzVy4ShizLjyycTbk
- brBDZL7Gp7IXJAJ73OLtiH6yY2Kt8oSqkaeArxixECOgs2eDE+uJrcSEn7Ury+H2
- aLRxk3OoV1KE/SB9oUz5eQKBgEgX8oHQnhB8/Harwhy+2KoO+mBtZfRp6Sevx/rN
- E6EFvghuQzG6NE/rNWSA/D7RwJepenY/J7NY2ny70bJBhdH5o2JnO1DRU3HBhwKN
- V6qsZMw+0REtts/1rc4wi94bIllcDQ0uQUzgnkfJCxcK4puaH+9xy0yFu5k9xiAw
- AxqhAoGARW7Bz5R9R9fJUJwdHo0jQVhk/ysIifAdqCwznZNqS8qOJ1zlHLaZJ31w
- mWc707QCzCpN2MXWig376URiuqmpBSemxo1QzwaAba+F/wR5W9grwsNfvD4zNEGn
- vtYeI/miyI9QZk/OVG+nTK/VHdLakqNTSJAIzY+mgf8IjaQ5+Uo=
+ MIIEowIBAAKCAQEAypMDUk+qgMUFnEQhmhBUnB1J7XC1czPeXP5V3U2b6XvXkkdq
+ ILq4cZCvPP3Bm8et+yYtaYVyXExQmBFQNB9rYsksazODPUSaYSTYvU9iDUQ5kWTT
+ 9ZsQG94TYaOiA3dOdr0COBBXLaP2Mwm8uluzbdScPqC7wvRsKv2h1DYkre6m3TWw
+ YmBJBGRokMhuPbLgXuCkyBQK5EelNmN+Nf++YHq0i70F4PIPISC2wCVt0C70tYVQ
+ 1r57S2KWppC6TcvIItJhUPPYVwVgOapC6+bREG4s91rgG7iOPnKclBI3wptZ1oeT
+ 9g4ZiBxmMiO/EJiOY7Jz0CiyuI+mNRYpkJGaowIDAQABAoIBAENTKtZvXbZgRKYT
+ yqseZFBiN5CvVc7M3UlAyh67zWaC3zlhfLcV93je4i6+E1uHuJ3wqUUZsdFVF7AC
+ iQpZquHxBE84lpSFOV2x1krMmETaeNuGjB9jgq4QV5aqwIywWSaDWLpzS9YCWS/L
+ O6sgEPkeoTL7TovTmiOLmf4iZHxdbWTsFZG3OJmKi75POGbRXyNEooqGJLQCC7KB
+ DZBAQy5Kw0qBTOGa+yb7KhRiG6sXQGG6AzhpveMY0Gajr9J8P7fA9xWwpss46o/H
+ UVqpZN3pfbrLBlNi62vODlkeTmmQDmWM3XhN9xrTJEiirUkmBdWx+augtZfaWEoT
+ wrE+aTECgYEAzNChRUW2T3uxGyEUqTUc1K1rgPOSIa+k7tmb8Pp9nc2vrtntBFtI
+ 0i+15yBp3Uki770pxqIrzQfKYdUAMQiN0Vd2S/Ldf3x6bnRJOXDiYYSYu7O3yjoP
+ AE4a7Xk8geyYiValo/cZ/+6PiwttddnHg/Np+mkuXPd0D0AChmHqPxkCgYEA/TMH
+ +MEMiOR+EXLpTEFqkgzUtXPQ9h7rF9CZnmaKF0gf5e8QaOrk+LQVnzeYfe5uM5KO
+ m92cO5CbKY22HjgEyBMhJGp3eJ/flTqGt31D4svNmGxOe745GbyQN0P2wSfwLJF5
+ aiKGnNQdRLL0IhPVvgiG0k8yREI7H02aOleZ6xsCgYAkv75f/o0in8/8TSg24BfH
+ NUKXxZxPvQM79AGd8GP/n3tJRULYyEQ9ql/aE5/LG6dQGsHXKRvw0tgGS8CYC6/e
+ gvHv2KjTihMxpF3LF60W0ELTUwDEITy10k3UlC8+JKSN5+UakWix2i0ZRriiL6wz
+ ycYXLy4pciD554NMd18faQKBgHNR/8p7WpMqxoR5+uoBTWGRuHugcUb31Al3t8/e
+ UfzCm8yk8qtmeL0RgFuQ/cI1izmwAYXaDGNQvGrToWPoDb12gPzOBPYKktGr41nF
+ EttECbLneWOAww8GxAR3zvYwk4IpC8ycRwU80svMWcb/k7VGuukkqvdN1xGtzZXO
+ +kqLAoGBAL2JH0PAAWbJr/I7541knkQS2UJwBDpor4E+a52BGaDuJwCC+O+iDs6V
+ ammOIWJXSXJu7xDBUjp2Y08JnleOaut1e0mZ2eDf7q5eJORfqSdtnkZYA13MRhE0
+ Ro/t+jE973oaH/ljMbZaYrBvL5SR93hayWJqimkZCfyuCm0bE/Jp
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: admin
+ name: kubernetes-etcd-master-2-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAuIno+Sbx7cZhHOl6K4sGb5JqUJWkUNsXZjSeqdqTO93PNCKp
- UxntfWvoytdMc36GFvEM9VQSM3gT6jH4RKk1p0oFcB2dUOtMku2LtMxA2dj2nnCw
- gFpzn9QUGKrldOG/JXH11Rj8ilmbaJrSmJu+zx6RDA866jF41EOMRQiSqkph8WSU
- 6M4ZN/fumI+gTX80zww0SCq5rdt5P+KKKPzVmEK3//XiJdtb2LeH1d5KIRTgcxzM
- 39wwZkbxW8Gg6tGR8wUsaNOmmudWVVCg30031prg+Gyp1fm5gG5qFCQjnjDs2LkF
- QTEouulprDCC3gHlpWkgqS/tFeBhFJNNj1yXSQIDAQABAoIBAAQQLUwHGn6UxqCf
- V2xMBFlCjQq3MMYC/PHoKLIuuN0xlhVcygOlZ4BCdv64XNuSJpustQ9VyYzOkQmw
- DfpdC2xiidodHNCiTa5Sgqf5c1gYmd2FN62r0C3tun+Mi77WFaJabwJBKZZWQMC9
- 3/MyQrJGxwTP9QkhC7sIvbbraGdNcGBe9Egts6mLo74lSvqkZZoj87gsoVaFQjux
- +eMRTYmSj8DHgDnMBXJDTTYsDH9it54ZWIkJMA/d2d4JNqIZUhTHEOBoYs3r03kU
- PmAT3cZpKNA0T47l2VLkULbRYBf2heFyZA8Qz+BR72VnAzsDq8tw10wqc6DoHQag
- 1fPejDECgYEA6Q2CIRa/X8ph4GKLkRMShjXXGSPdyfRXXg8CUVeYD1tngNa8w0Fn
- T7rRvQVN93JJgmTrpipliP4UHrDm9WniXRD214s/GCp0NL5aM6GBqiofPQNzOcFv
- n7PLi+Fd7zAdY7HtGYKppGIxzh85RGYP7jcFxxNlfnOw+E8q7FwIf+0CgYEAyrWF
- usKgOi6658BjTjg6nA19KJo3BjqQNrKGLDbWYrvc7opl055VUAOCLpyJdnEyFg9w
- umwQzeUb/AYHFKa7BEF5uYyith/LaRoeFeZKP74O2Xg8AgzWs6iCS3VJUz0t/0+N
- YiwDW7JXgLO+5LH5oQN5v/LMELiVm7uswZXg8U0CgYBzklNZ/WHiKwbms3fq9b5V
- +BU3TmYKZLV+24qWtA2gb/+gEN2DJsgI7ehdCGhlsbNqiomh2ZyIlxd7MNcYFO5A
- oM0IjvE3FraSAWPR/uHCdSkQpMlbduXYGN1z/MsMdpvceLvPztA5yMhSI4HOvZ5g
- z8B5vNC0KMM2IGx00h8U8QKBgCjI8Qksk5RhRpXObayVP6WaSS5cKOoF6nI25SwM
- NIJVDhSon+g+GSgqLI04TagZClzJ6oJ3r8HdcQ36IH6VNVeb3OPqWeqO5xxUdu0t
- Eo9UrCQxPtGix6gKJX0NMh2fV5vg4692744JifWJNMVK0dEFo/9s2IYcvW1CC3Y/
- s6yZAoGBAIKALyw69yO4W4t2su4UcCdOT4QTM8z0JBMhMZO/7NBv8BHcO719dpYT
- O7mZeF+OoBIx4KDf8TJsxZCl+fxgWdYyE1UUfCwe7+eI3Uys3fse2NhXeneZ9YKL
- +3MNGxvIeEZQEc0BoXSaTQzlpQ3rscOZsI8orK2gy7gh27Y/1i2b
+ MIIEpAIBAAKCAQEA28rBTtxxjxwVQZmA0yN/pvXMzCaxl6sr90/lWboZY4sib6Iz
+ cmgf8fgN304RxaYrL2y2zC24o5DSGngddC1Pbdugt6Hw+B7/M4d29KW3rO2Igc6X
+ V9VaFOYjc5JuK0HxmbtztiQ7gpQaRr3qj97PrlU2D87hr60NCbhtytBMMr4KDVdd
+ ZsLA6MeVLZATh7VARNxyZTCyFhAsXyWX+oehzJOhlkHC5c/6KHRTL4fUsa68TMIX
+ Xgj9M4qucRrVgdTQDgtHKAqNkYsiYZpKuaKu233vMLb7WsQuIGI9mgpXws4sLQv2
+ mxhe+K7C68s/iw9ygq0dMpr7IuxyqXhY0wnMcwIDAQABAoIBAFYFyxbEbKWoRiGA
+ pMz+Tc3Y0ijs1AEae4C2AnvVvG4bXIT4pM4YNriLb1KAya/j028iS4EqO+O4oKK/
+ dDeuLDJBDWwRs7BI4XUXhdVGrta9uPmlE9LKrBEV6bYoD3pauuaCWU1mbOw0bvxV
+ BGL+v6Xpr9kMDYSmZD3zsvT4BXqt8KwgM9p5EpdxYTzYeiYoGthFUg6AW1hIPLm3
+ EU9JaUoCdVPh4Ty8zIO5U47lT3OTjZW//p10PEEQ0fBrpTZEdo4KWWj1veleA6rN
+ Ror3w8fJuKrKK4sVJIj4v+Af8Z7Ux6kdFj1qiabuiNXcBRNMiO2ucRRSVntVHJdQ
+ jb7ZmJECgYEA6nXs3gfDs2D2v1Tvc+RcEYJZWstJ7/OSFp9+K7OXdKFgPkNlv+6t
+ YgJPnHgns1a9sd8hfUZH3YLHCatmUVIdjn5cYhViXAjBS92mgDU4Am6wdlOWaZxC
+ f0yUU+WaUbGNYDz58ahuwvCLGV1MBPtD9Lyrj1ECZ9rQ8V8a3hu8cE8CgYEA7/vZ
+ 4VU+/1AqLI354RqXylULUqXLRgfeYwSpSgAhGFruFwd+mlLV7nmkVOe2YNzCCnmg
+ zEKkYgII5fj4G6bEPhVA1dRd/V15SPGb1FXspvXMzxH+3y4ufT45QTmjpTqRg5mh
+ uaFGEr7H3SwANR6ABDVvStMXFIhTefsCOhuxVJ0CgYEAulfFTWYQZSXgloqz0YEi
+ p4vY5q+BcSM97ZsPlT4kVr7XlkTMvrG8vZOmoG5i50c+dvsnS8Cq52PEO2wtYt6H
+ vTOyywXB6fHPZzOf3G/vtwcwWqrudbuKolBD5zYp41nhSibMZAOBHJA/jYY4IBFv
+ njjBhaNV7SLdQ6lZ2kNjDkMCgYBb5Y1hhEtDaWc8+IEfehd2G2rikypr/sdiE37g
+ H3yM3wUdPHl2jxHs6BfNi42DOgX0DO9OSJa6ER1nMxePPyUWwPy65T+4rfqrvBl4
+ Dg85QBbVlIaM4BpdS16RY4kO1Ia0ZjhP5Tn4I6ZVQ2ww6yUKd4vOk1bbPfj5VO1d
+ Yw1c4QKBgQC9efS5cM4l+PfFSOtxjjZv9tx8RMnRIe3ATe3zMo/m+CrIAzxWTV3x
+ mEgAYQnnkkajEch8SeyeAUVJpMThxgb9yaMhzF4pi3M8NnoqYfxF8BH3CoW5BKFc
+ xMoIY9LFavWKhkoRX9WePfC/fxRRxafpvuFytvGyVge2foWKGXEClQ==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: armada
+ name: apiserver
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEA1OxkNW5YUNIyEmTSYt98xvhDrJz9SkoLn+fQeKJwvw2a0/sd
- ClyQQ/zkNiSH9QVD+jzFXSkcYz/jbsA3jUxR8cypqjn+eSlItBQwwR8O440i7YoH
- fMMld8lcOp458/K/zgWAh9U1GEsgACtCo2VGZfrhTAtbux1T1eCTTaSWM7J50uls
- AyCBTUwZwO5f8zG/C4iKWhu85gxgExiucQ+ul71lzgumxwAojK2JBuH88IQt2aTr
- Kw+sn16z2G8Z8E4FoxMCNxYDkV604V5c9dBSZKlwea+fk/pMzwvxIA6tLHT0AbW8
- 4CdAoT2hDZbxI4pnrfIhwgqcvjxKc/gEEESWGwIDAQABAoIBAQC3XJO3h706bKl+
- OaEMUJXt6yKsZc2iyj1UiZd4K7uYbCjnYJtTrv717bTCA5epo800lF0KqzqtJfnA
- CHxOjGkNKEj8NVE2Gh1oJvMNfKefwo1Prsxf3tZHX/qy6EvUDzqqOwbC8xL0Rs3a
- F2cduzty2yhmCmoGq2zlBK8V8CUBgp+4H56fuJ5H0OrOuRYsNQi8oqxfdr3ZRzbg
- la+FLwIDpn/DNDaMd78vn0SApGK12LLKhT8ASMYpUtKMelmlo+9t2p1Ct52DPlns
- 5YB2EfBnLSdcKf4v3qVLEV69ja5fkCjguOyWLR4YDdJdQsn5eEqWSsYJfXjO7ohj
- AIqbVmwxAoGBANV8CLGUkZTnXCDtU35xzbtpqpYN+w6eKh0oDe+ehT8vcLSRKF+4
- sXMVOmhyo5kA3gSY8OOlmviujsGJZkfuWFs1j5IKwZvNRAHnj9aVtdYwA9p/CdzS
- CU0EJRrC6j7U5q3v9dX2CSdizvnS0WLDoH02mjN1obOK0Fa0GhFqwVPNAoGBAP9T
- wEP9+rvhM3IqNwW7lNpf8bVUJGTxhgkmMC9GFlGH2W1q6zLN55lkVUoJv37cSIJO
- WzVkFybDZyhVx6WxA1Bog73XOzYs1Ljk47hDhB3DGIiS7Bydioktw6hK40JBiSxd
- WL+g0WT62NHfJjrUkW/3NK0LB+UI99pgopCgC/mHAoGAIQ6HuherQ0df+KlHGHk+
- xhpik8GucmEDXGhrYANH1rTd2tfvTIMo1w0ecjXuJy7/Me8MvfNSv9cnu8gu0kyR
- 2e29QXvw5tMuCK12lF+yPGxK7HZnbI4JaqeNp0svQnNtFNnnUy451KN0MTL3wTdR
- jpH55qX8V/TStdpFfxTswrECgYB4ZU6ZAQ8VPsjagYt2eZBkNK+uGGIc80KH1+kK
- sZrekRd2n98OEsetrgEFq3kP4eGTCE277Fl6XtOq0mAVAlYUuWO9xdrW3ebk1JGI
- ltWajx9nbxhFGgh0TQ8gsUdeO7bqI44wti1m114cAIRvY0K9MC03l6b+We89myms
- 1rsuywKBgDxtfi8NxWnrTk29AVwn5t0DrcZD4XUkPohGkIdXNCJgSWGxeIWFiwSD
- hbLUPtzxT07SJzG+77MxhYNv3+oQA3Id/p89u5OOEf1YCiwJ8jAeMIUWBnKdpVc6
- RJtuKTznGl2j5hYCh98cbnUT914xc4zNX1WzRrsyON2wvPEMTJzD
+ MIIEowIBAAKCAQEAlPlln9A/GhXuYq1GUMZGWOpSZVNHQ75y+IBEKTvkwRSFDFID
+ zoMyF8OYxneIWFclsuojbR5IpPVmL+yEFQjPeuEG0LeelzqdcZtxSeLLzA+dgZuA
+ huAVgFKNWvmJUby1XFHWr8rK+1ee1MKECKto8KJBwszJG5dBRkkWTxkv1HMOfwf5
+ VAr3G4KmDt5sRjuBiYZ6dwQOUlMkexmlTJVoWTzzbdHTQtzPiB0h5OVU4nHW3Tme
+ RsHwJPzubXAFxzEcLC9gjRH7e/96B3ECQQBJRQ5rBe8IMwhYrR46SVY5iHJu/BqC
+ CUfRqs+GhOnbZ+JVStt/ZJZ2BcejQohtBk5ndwIDAQABAoIBAAJ1o6Hh1Ejf99GV
+ PsXyoBKzu6yElXae3FMR+w4bOQmfBxtO91UfgWI3DnyoWI3s0miDyRXyHAztKES+
+ SOf3/0TuFii3/1xL0XGguVwY7HhwAY+0O4j+hhxaQI8x83xv+yaNC1hXpsZDihHF
+ LFzgR5lBdIh8zQ0xkBhS+JVRuyJsxWt9XSTMPMwbUWjTfvaK/q0rbrj9i973gVAb
+ kAdVtigOHViQ7o3HaNDXTS+raS/NRkaFzx2vlxLBnUPVj3S9EAaFuV5ZWMEa3wED
+ jIIdRH9rD0t3ABS0RJzuKRC1A2JyRl0Mi1HJR/LQptSHOXdrwUPgPQRH2YjKMREA
+ ajPYUwECgYEAwCowCqzBNjzbiWE2XEnl5LS2yDs+JBiFCZGjMhgFOzPXn91RzMom
+ qFuUDykkfQvcSI2aJ8lOOzb2c63iEhnZzjCdZrnOgpUWgdnrqS+4r5lqWLBOTLl7
+ gFN3dAxhVJsvcfg7sK3TJCzeHUDbxaz3qhN4o5oGmCHcvq7oINh+4LcCgYEAxnZB
+ TjOARFZYM9S3ulPiz2yumQ3PLNNEz8Pfd7mX3i1gQ1CNe6gKPdQFC2fbI7xy/oHD
+ CcYoSee2B+RExi3tmcrj3WqEgzSaZJE8HYY2a5uoKWWlkmBjXYIp2eg8U09LUHU5
+ HIR7XX+xnQnWuNSnT/n86OsB84GOp0B3UVKYb0ECgYAlkFmhzJFcU9sqaLliowNw
+ iK7uRz5nee+Ppkt7gFyNbR3qXy4dVSrnYDd6GzXJx+bAvAV1X5GOW7kjdcsqdKkx
+ +CjcqtemiRREP+AkS3LTyK6UNaqort1ogWhpY/4mtss4gSjR6bjLaoXkvAf6BUzI
+ j1PWz0YYuQ3YrIIt4YQz0wKBgHqtWLr9TNlxQj5vzE5qUjaD6P2FMr5zrgJ8AqPg
+ XochJ3MU1RBOFF6Zs7CUNzrE35SBI83j5r2gdL42FWkntMqvRuF0WYs9Nf7aY/2g
+ G/2yj2VfhtSPrnx73GDtlHSu/FA01ePR5Owr5d+72DYShYYDcpmLw34BZOvwBpGH
+ a+DBAoGBAJt2n1MdMhM8N1HzAfR8x8GTdc+shnGGQnBL7xV86lqdE/GPw3qzGWwI
+ 403sk2WS0Hssa+IoH+7wvJsMR7daVsQGwkPY7UJLN/P9pT1JiJd1Ka+xUlFTzCcX
+ XIPI4Io2q2QytFe4SBkYTeUF2/kxiQiw8jgL7GrFvzTjUhOChamz
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: apiserver-etcd
+ name: kubelet-genesis
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEA37TdSlQy15A0EY2FLM1sHW0U79AxBlbd3UG7eErF65fgxAPo
- ZGLsO4bkwH6N9bv/pbKLzq5NIrK27NzCNk5KK34A1ILBtKIoWwWQBGcI2kEAHLez
- Uj9plygr99rJb/9eOC4dym8jmvV7y6TGWDzR/f4ShEuA/Q6iNsBXjCBoNP0LC+z0
- jcREx3QTVWMBKumlduwV0gJJnESm68NZBKD5iCj5r5YJTUWmm4tXLBgB8KWk4hUX
- v9khNLGPQ4SJf+wATkfNycujTO5AQp1GIJniSpwcKh/nJbbeiOJWyUFiW+ObnxAU
- IFxkaoymuck5xa4XsZrdYxUnJ6jv5CyxawaXAQIDAQABAoIBAQDHF5pSSnktK+OL
- M54wb2onDiux+mGHOMwf3B5SQom+0N5y1N+AaCHCIJ15S6hf6L7u4uZWPP3dQZxX
- VWlrF2YfKvbmKrDmZ+LujxbLND/Grk7BQCRRsKnyowfugEMCcA2UhkZxIVRY1t0k
- MjNr2EUzfWlRYDkd/mYTwD6qMTVM4bTyf6im7nIRYgC7rGkBrQw7/3p2/njK1ime
- uTUGN/vDzjNjxHtVqGJQavZKOgt79qC2vNtZFKndRoy2OVPuQGpEeTHkRL+x/mDv
- xutU0e7cAlDGscHgGf30Ku67F+uSkOsRn0uY3blPurDG7Tl0dTg00t0c24on+brn
- CoStswABAoGBAPuSEl8AyqFd0HNVR3/n+2FaPlZdhzs2Ad6EKv3TklwydCob13eh
- pazFrk3uwPCft4+4V66d1h3f0H8bqLa+bhE4TJ9qpWwBLMj7a+m6FRFsQWci+bzG
- BLdHawizUTduU47ZkgtYLGP4si5yRJb78VT0xn5rXqhw4DycUxbtRNkBAoGBAOOl
- Mrrzw3sfCpNlcoDN+lhnGhiCG/QjUpKpDQdsYEUYxtGNaDZrgETeSzDyek4GxVk/
- +iEiSulW5XYIWndiiT8u92em71okbcmgSusXjY05QbZHXk8GC1TQanefznKQq0yW
- QUZTV98rNv/F9cAt0u5/OlkfXsCAFBWDvxyps74BAoGBANcYnxKR168/SnLCcL7h
- N+OWSISJtY2f8Ns0AJpEovinvwEeCw3jrYdbAlzqDhfvSADfakEH/UJP0rJLkOan
- Te71RzZq9gOxwXwa1Lrj+w2JlSY9FnEckn2u18p5n7CYaWNTjfabLmFQC/GAjDrY
- MhEktO70mNvGn0PTmYuZ1WsBAoGATaTd3bgg15Cp2cZDPL2Egrx/wRY3lJirpEw2
- nm6Pk2G1BmpVviICePrc6I/7uTtD+oIAvWZl6Jpz30NQH+Ii78MELX1ZrAQ60gdz
- JiY9aIq76AEFoKxuFvqTJcQC9T50vsWM9ACfOwYRV0Hc5TR7+k64xwcVGVFWCFSM
- TalwHgECgYAx+O3EkmbG67IKRvz0x34jFIUv9eTbg3W6BsaqYgsYIQm5uY7tWUNo
- 9DkKnc7WgzJK/Qe+yyMTa9rJfCzqP6j2gAp7aD0HTFg6VoF00gxP8wy+5sVAcXdS
- l+C8WBjp0LcZPtDOQKbdrhEES71Q+KUrnYb9J8o8lH6SbdR73JPICg==
+ MIIEpAIBAAKCAQEAyXQgbV93XmF1C3yJ7mOIEADhNCr6JG6JxnVYA0UVw8mzUrh8
+ Z5tN59bzQAvq3E0ONH+KhZ5Npb7VY1DDvDdFReQBnXpHOAzyPJGkDJYKIgCaoUGR
+ LI8gqcPyUUNtE4WoGB0v4zBlHXwu3mWHI6xkG1gA4Nr9gMqKfvVWTdPSaIQ0sbqq
+ hz/EF9S5F9AnBIKMr21HLsGWWd/Y7It+q//Zgz29ysWx5CZEaftjd3Xwh8QtGV3B
+ 5ZVSWM3eI0mgY+c2q5Fhy9KiEbIi3NI4JAhmu32H6pRlKrPHbzOy70TJVScgU0Bz
+ FcT6F40WzmgcBpoJx7aLKjthxW0rHJP9bfWBHwIDAQABAoIBADU1hPMeigrVtvKH
+ vG7Iv0Fq2hDLYTKKN73BdLO4ZZ1HAyRQMhuze4pGzg0WmLwDZkMbhNzyCRREKVyI
+ Eor+Fj/1jy+nAnSdhsXUuf3RC3AbtLvu84dPbpMofDJWmtLTNKjZ3LInMC3vhPmc
+ 22rit7Y5MlIxxU9lL9uEtXzs++A6wy2TKgRf86NXB+tC21hj96sYSwhJyVB0BXH9
+ tlDz5AHIVaLaBBF09PPrfLzMrjjGl0/rp5ln5s05ZI/xisLOkvrO3I8TrPnnJEQh
+ 5uVH1R+VZrA2uz0xTeBz+RB+XHjLDvD9JeS9UBY8UWDZ0D3El4wS3iILFUgzHDsw
+ QYMHyYECgYEA3556wv5aGSQPlRLDSr20zwaTc0MH2DI20usRR/bslfKXmUlyp8Xk
+ sT4Bo3xUsaHxu1Js/l49ocqFgFjXx+2+RjZo/tkfMcaV4nCqfA6y1T3EAxKXoFYr
+ nTVrx39f0Jcpii6ySkDU2BxTxSrXWrFdOyRafrgXAIN33vne+JqPqGECgYEA5p/6
+ XzcdGOe4ybaCKLA7F0Qbm6eBhTaT2M9azAnIzRvecEv4ZehKS19RJN5FI3yZn46F
+ OWl50edH5XJUWHif75RV6raYKqwgGCXJN4aMk/RqIHXxp9CmK8wEpqkjCswizMXu
+ 3g8/oH6LpBX8dpC1Bf+yYnIu63U9um213cNvmX8CgYEAukUp30m+RVjrffLOKHET
+ rqu8oXOBkk5pqpHSqE6ATntwWmh7EFPgpt+Ov97uMbVDRhVn4w8faajoQbw/qjNY
+ nuXt2fOEb5MLAT92U7ZuswArSZ/wG8gLtn1sVRa9+mQgXxF8xCty4L3f7co87zf1
+ ADHNC+dOicf5Twx29kDRT6ECgYAgfpX2aHuPEMc2lKKOPRZ2VsBVFCrprCD0wXKX
+ oSFL1QtoYyvin/In4Iw8V50CPQIgOyKGTlg9vQqiR5Oey5AtX4cjhQq3qHz1Kg3J
+ 5wlTp3J0lGmyLXHcZeiZ2ub3FIAqvhDD9P4QDQR74CUsR4NaDwcBW/lEb8Z8yAyB
+ 7JGC3QKBgQDOdu3KbnMyz4ihzjIagbJisSD8pGRqohKQU1gA2k1z23DP3J3PKjmg
+ r1GxwjX/w3sxKBqg7zs8fWA9QKAcxrR5JpHTfTx7MVrpcHQrYq7wwI0VDsroBKE4
+ vNm6/UGLE9F04JAmL76QkUX8MKQug7lW5eW6wbDLMgIgAmnUaxyqrw==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-anchor
+ name: scheduler
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpQIBAAKCAQEA0tmp0tn7Y/YDsQ+d8H3g4mUbs4XiCoj5yIfrP6lYYGop7ao1
- YDQiPKtaYbqUrstBvuh8ZFOQu6lmSDwDSYWh++0kU5370Yi1x7MEuKn5NrRAO5Kz
- T0f+gdgCD3tiBEG/uOAiDq7ob9Ed2l6A2QpU2hs/Jg2tGoPEid1yxmNyMHckBKvd
- 26HPZXgezNc/7LIMmre0T9WWXb3oRVm5Syti1iSoUMSeG6xYfUuBm9FX42uGz+NW
- cRE+5ywjfSxLfYdPjyorHCZFq9SH/o88Ed+h/nyBds5PE4Xsjz0FB8Wkq485K8BJ
- p793dP7O8VgWVi7EOV4812kUujgom8aYEEWnqQIDAQABAoIBAQDOIw7snUAxEiu5
- x1LZ87cQn1jdwl6jfhb1/iv4KU/FswUa3fUhANcYCU5rjUYfPYghZJl4XFp7nbnp
- lQKBtqwO6GFDfoja6ZUOj+5lu4dx+/dwRpQXRoOD3fLlv/Krxrvxuu6Q/F8yMnfF
- Le86QeeC9HBge65o5boYLvAvFLpmtc1h2cQ93kF3c78DOUsAB3vEPtc5RZhssGCd
- 3fECDevxJtVJn3SuVF/oWmBK6s2qHuU4zU00INv/1Bj1HLxQNhJkvND0xU9PdIIO
- cnuN1XMuAHYKBcOJNE1t1uc0A+NFvD2ifoMD56izJN+bWtNohu19+zEBLCPJpQUy
- 2E8TDcCBAoGBAN/uBK5902KRjX85bvKTV07JyX9CZ1ES/UL/OPvBYgfy4sAJ+6YK
- oi5QElYaUWjQSX9Qo0iV7jpbZ3Bh/eGyRFZNhtDVR8C21SafIce+Ncf8xJnIRdKb
- BBu+lqJO918WR+9bT7slMkGRmEOfsvLjYfBYvgZM0+8Fy9Q84KULuL1dAoGBAPEM
- G7vJMg9HONBC21kK55+w7JAudlnNxRlwMsXI86bGKLnUt+gwdMWZUQtkj1aWKtJw
- HwLi+cicU0m/dCcxcO1zUDkwDccisN7iPP0p4emXZDT+LB6xPnDh5KnUicaVYFWt
- jOMDY1G3v1RO0pB24dX/2hqeiiHABduD4/3ncaK9AoGAFkVf5dLR0T3UqtCVfj61
- MjrTdXqvN9sBoUYs7qz/CPdZIexcQNlR4/VGvZWEfz4n8Sed9bwjo14v3XeBfo7y
- SPsQ63gq2LnWXS76dxkt1CQJkZnfh+Cu+etso9vismxO3zlfpqc+ZlMKp78cVxfS
- R8srqwi9E0qqSQN8/C08RGkCgYEA5BFIzEx5COuiXapkT8N5lCaaLXFImX+P1ZnK
- 8EhKAKnNLsaNmyr90VhWzii/VnWO3r0nGlwXajA+vbBf/hVRe9l3NiS5ZIj2QGxe
- uEpAbfvH3DwBEqkxIy0YZXerRDFhjK9AdipmdpMcfHB32ighVZFWk4kduQEuiZwo
- w7uQUSECgYEAjvONrkEtfwRwyjtGGJ7tzRqdlTheR/bo1mfiAjfcvMz90iI+YSNZ
- n7e6HlJC/guDpWHoBH7wCStryf6UQA2oDPwRv1bpjsjLRRP3GOWI94nncZk3ARQq
- eDb6ZJXfMSrIHX7/lFM/izokHrOFfe1gvjhTAXOjImoY+HGDrGXNO5Q=
+ MIIEogIBAAKCAQEArqBDVw+M4ltvUDAM7BqHInivVKbx6SL7IqLfYf3LY5bvQGU3
+ vJhy/DE2Es86Dp054JgjQ7tAD5nJtdT4LHVHXyHjrAxtdbq5/UmkA/5/07o/CQpF
+ 2U8Z8EHqUvi5ZfvF3ummkfa3JsutlIogG844He+wyswhQ3WJGkSYmEpNkLUG01wp
+ kWVCl6jQvNTkj28rJOZ20Bjmzg68iEARUT6L/YObTfy9stQc55S/EiZHQkBj3F7y
+ L+5CsbKDO9Zy5nU2u8X92vqFqm5RQXwkq8/pNGY1Wa95+E7oG1NgdWXkLGQnnCNg
+ MZ1S6ttcsi9P2zne1l71oNmpJCMgnwawyAckiQIDAQABAoIBACzYHzL2XVmr3XQc
+ QtVHIrjpgS0eCjWytAd7CB6kDF0w35QL6jpWdADrqlU+PkyOd9SDfVrhdVwMRE6b
+ uHfCTmfRziPatSlsoGK5TJNyAeWfiJyLtNBPjfuzEbfpA8N62p+aJRqK3xHpcFQa
+ /I/nb2XQrfgGX+xw/JpwTzecrTqhtb15u0B8ysPRQwtSjf7BjBbVqkW4WNE1T05M
+ wqiCEkbIu8jdYodksvZ1TAi8zoFIqLlZb8dOzCISRJN4xWDMOj0p+PBb1Pjk42mS
+ PMgpImisJiF4R1/rlqQxnRkQr9fKiL8HC4C1yUx0oaYcCZs1qPLP2/+R5HPXhtrl
+ ln0LxnkCgYEAyaK7MpjsF6L3fpwBw5IXME7RES9/u7aIA+w0VSf9DIqSVwS1+DK4
+ 5lbGTaTLZayGeT4m/Eu4TmGwWlrkwXAIURqzFMOtkELrNla/zdNvbARHmu6PQdp4
+ cLQT1n6GbkujMGGTlOqfGlJQawCuF+HFHRUdzFUYscVqR26hBJQw2WsCgYEA3bVG
+ sSYqka5jJ2gzVUuYfeNKWDh8Op0jHLQT/sQH/RQKka+BrWzFDZHeAvcAS+CjOL3D
+ fQtipw7mSI1DdEpw/PjWdfBwrx5pFvxLYKKP2OHlfTgh8L5rjjFObQ2huH6bar9L
+ pBkBiXQZMfaojvZF39W/ID0nJyqzc//eF32i8tsCgYBILClZSQdoxnpUJT80Y3xN
+ XEjVH+1WoVU6IjfxKykWbhtHbnY76tvoBrNgY1YyhHh1uVt2/xtvYuQe014CJzmy
+ 3h2vlwLvGiTbBF4PLFk7jqSavj0k0zA9FxfqtMsle4lj7elHalucrk3+nvWxsqw9
+ ZquN0f/O0dziyKR14R1DFQKBgBoLmLFo7WlN1kIj4JvtlI19bRduE1IDccOGeC7e
+ sp2NhCxXNOG9vGx6rV0lzTgcvLAGwvdmpgFAI9d0GO+JazqctP0H8QTxiqDzpJtG
+ naV57C7IsFwK0rHSowb2qf/1h6aDsIwnj+Go7OjMtEKPNeg0wQ41gOr9/jTrYxjZ
+ XpIvAoGAcVuO+kf2EQIldiveL5/2K7wKoLouMSp2nmNy4fAiEWuR1a0j45hMCjYA
+ 1LvH/Uav/YpvQpYR26xH4S/JuyLWgWomtZWu+5ysCWhR646L3L2FF+wI77SY36LT
+ o3ANz/mueGKvPEE+qsWJ0W3Kd/C6o66OC3m8Uy3qt284iKZJpnk=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-genesis
+ name: controller-manager
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAujJSrpil7jhn6cg2BX85ij5bGnKZijN0RKzOOQ9+eza/8gpn
- N77LXOrd06D2r8HOovoG9T+j6syLycrTYM/MauwGkpqOxCZnLLhpbaD2I0UKm5cz
- Kx2y+NOBXZpRf13GNua+fc5hN9gtQNwFYZFeNl5rVzx1HiQO+CsY8ihXAVFF3ouY
- 98FKF2YJSC9l4jRCKuY+AkLAILci44S8GKEzQvIb3zLoI+B9mhBtu7C2CBANSCHB
- 7rN54zOPJu0+1iD3TXP/8c9USCm4CLfHJUhE0EuFvBpICWIBaN+DwW3GdofWrxIy
- OHzHkK9fAAPlA/V4o3qy86nWRn0SeLqzAoBbFwIDAQABAoIBAGjeFOFPCg1saWIr
- J/namN66lfcEWmOS7UYMia1rg5ID2QGKSG4GIGV5xmv9+VIt9qKl7StNp5WDlKuX
- d4vMHVaPDnidYhEpi+yNBJwBDv/4T6wn8WK0PGuWPAMq+gGhIBUlyl3y0aBxObOQ
- 99rm08gNT6l3XIMYTfIJ2+fvPml3lS7ihzoPKA1ZJzIeos5vdUl3vVPOSYevedgs
- ydAoCbZR3BuQWHpRwGzrzmBtvZaVkvcqaqVhkRtFPiAWR60349iBsfb1H2ZkPWi4
- r7yekpOVCbmHL+3CMXUAyxJKyeGtySi3mVLtM+ZxS1DOCtyrFSbf1NuGRB84caXn
- TLZ12rECgYEAyxtRHrdl5EZ7lUpEVV10XBl7v2wPXlL7LwbcslmJC8zWUsOGNHJY
- 5Ac/dSKFYLkRp42hdFisWQFSNPsJnkj2Grems9DYcJWU+SKjNyAMBljTKHLQOU5s
- bPHV7L5Jjt51LAxUwt45ZsqYCbQUqH01jzDpkC1LwVhKAG8jZycTKK8CgYEA6q+k
- 8DG01N9Tm17NhPW6jaO+PkhxAKZhrNR2CE+pO+Xp1RjJSINUfkNsQA3fs0wvBqg3
- Xp1GKan4UDIdUbJ2kfurFnTgrd3nPv4eUyF0QvItcaNrBPAHmN4j8A7Qp+Rd6XnH
- rbbAsthhBMmXXVrFebqpol3eMRQlrcDQ64JpPhkCgYEAq72VgluhlLzkkwARd/1l
- /tqtgNdmx2NzcfhjdYuwDoJOV/1s5bwq3eYjCnD+RyM2gm+ILlEsqrYrRRFguK8J
- Kt5P34yg99ID/gYD7QD0KgnBw1oSJ+LgW97B/UWJ/Xytp2ll4sD12K1Gki3rqez1
- 9PZvCLLEc+Cr8mIHlZm84ZECgYA6eFhXn4q2Ho3t/8ikf7Ri5ZDYY6QDzXA4Zxah
- K3e2fKmtdedwMYgzjQjDTLGXMjvlJLPm1rhMWRSMpm+3kwcHh/QwPB5eMxMSFq3n
- eEZHB59a2KQpLsQ1yeKaRJanvbXIHZcqKIYKCO7jCnazw5G/qknpMgnRoHtits9W
- Xb9qwQKBgFN8A/e2J9uR3YQ7CKWSkmIXJyvCZzoNeypH4Me8BQHqxlZcfgJWhmI2
- jUGlTgHkdG48h+MzAwxvsPmm2afcWklQuIp21hSBvrKbYIm50aMf4G2otJOMmT3w
- eiHBMtWqNk6ugk5BasU6/wgx76sZhz4Yal056NYalK4/ewueXg51
+ MIIEowIBAAKCAQEAv0HetyZsqmVlZ1GQeki8azRhLYtskCX+lljgEvabvIHrvDeZ
+ CXFNBKbaWiMovLjdxQGrhBhcW2KnUJ0FvvtrCrOiLD/HoFjiKkIoeu84kcVYqBr1
+ gD3eWEay0OMXSTjHNq1+kBjhAJHzMGNQFyWs5u4iyj5OGyAB0FgaZCwEDkAjP0z6
+ 7+AH6dhDSq4yox3elUvOgkSEr8m+BBsqc47RtrzRb4UZHyls7m116Pylx1jIdpYn
+ /hkrLzWp217qkD8eFwSVOuI1LE/RJdyfniZh5dDDe6zG/ikVJBJyvnVlHC6XmCQ/
+ 54IoXsiRQ7UvFuCZhwRjOQJNbXLgTI9XvEPyPwIDAQABAoIBAGkG7hvbgO7tsYrU
+ MqfES5v/bqIJH3vlMXI0qhAf1pPlMKPyUBrsWiQE0IGRLyy7xCUMbriifA0/Fqxh
+ HierfzOoQ5VTDPfT95bHL92agpEiMzZVX52l2/TUFhw5qK7v/A3dplPRJbYfb9GR
+ qAieCt3hxb8UCeZBZF2aFBwQQ8Xio7y34ICMSoXhZrMSiKERs84updqxYe97gYFQ
+ dmQQXAOMid2vorMJU+SYa8mtEUh8jBqB/MBKR6nFwt9LG5sYzLO4F/ZXm3NocTzX
+ TxpFVUY7AqbvcYgbfqub6cf0DSu59KA/nOc/HtQl4PQNg28ZUaCZ2IYAVdv5Nm1J
+ Qgo1bskCgYEAwuaQhfrv0BLFAKCzQg9nlncFNc2ioE6gNrpUlJ16ykfIodkJ6Txq
+ zd0wlqIJyMJxTLTYEPfkg0zfopFHI1adpjllAygTujLIZ6zml2B5xepgM1N7FthH
+ vqUZcqwx4sdt+bH9TzmyqkyWJtyjz3gl0wkIE5TS2/wZclO07nW8ikMCgYEA+zbq
+ TOft++qmyvyZcKlgclROF/lb+J4nzqDrudGQJe+ShH2J2ERA2hRmpVFBwdBjV8Uy
+ 7lAczFUMiVr+gzarMYpDojevVTBYPT12L3643mUZMQRoDwc1Ikp1TywJTNrfW5+D
+ 93OoxGfDxIy8i0xhf5vbpzMp0Ujz1bVr5ZzGLlUCgYBijt+ksQnWabdvotQjYtDa
+ WOOsmolTkY8ZPc6JvL0cT4KYvb1yUZgc9G6ereBOwm0zAfyFUCYhc51fgyG7MBDW
+ vw1itECNlyKasueEw0exGt189wk2uzZEpQ6iW4t6h6kIbMaQ6rd7wPDpRAgeYT6X
+ YmjQJiEfF3PyyXukXqtyKwKBgGYjf8PhELu6PjKN3X0XAKW7bT0GH8TH2PuEJhOZ
+ BvjFnVbNC/yoU43XeZyBmzDIH3wSK5EFdZAGjGBUZOLImXY89x6/cUQ7scTEdob9
+ CQEzLbjmR8DEd3AHwgZ8qxNacjH4e1li5x1j6w7BAe/JEGMn5XjnrnrvJGShrMrg
+ oRs5AoGBAIi56f3KznZ5K4HVvXMNtRsez+c7RWmnqf2fcFWGWDE/Azvy2vEFv+jU
+ Fwmd26/u3qYdCuaO4R1keUcYF2pLwmD5KUBiIf1MYaytbnkIQNuzlNsR9C82D4Gt
+ rgtS/WzJh/0BzvUzfUEXQOuVx764jBJ962exzVmV6esFw+n2WqbL
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node1
+ name: admin
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAr2fk25eCVhfxE5WiNlce2ydF9v/a7rAZNFhzM3aRunB0pI5u
- gyjZJsB1nd8wx1Tcp7lMyXKF5n6aFF4PP58oCknizzHvoTgmKl1Z37oWDm8g3DWW
- LWVN0Hcp4NvTLLN4ukkSb0swa/zNM3PtaJH9nq2NIvJGST9G5CKVx7dE04GR6h52
- UCvZu1EGiY09OUSCRTSi6sti41HpCZe6LX4PELFMeoQ3fBa/UVWHV8rVE/0ZvMNj
- 8TzgstmDk11n+CW2mJOMwpJaNVR9yn9kf8Qg61OnaJOqyLPsgp3VCZwiGch4WrPd
- FxE8OpXt10B6Fdm72F6yEG8yLKlL89/6qGsoLQIDAQABAoIBAQCI4DT5mshNcI9i
- LgEQEHn2oDX7ofpxCiAQ9finrx3W9AxBoRfh581UbRkbIeCJm9I4W+Psyx5sGF0a
- CbAygHsZVEDWWGxbTVqS8pfAexDdIKDu1i4jrIrFY0fdvQyUNFTAYWcuS+k0S2jB
- fvRDBrF30oxxOcfZPrSOL+Lbn0rpFEZm93RIeNqKbAmipnpDWXLZ7knPQ/DEWxRh
- k228Dh1wng1F9SKDB/4Luuv1bgMRUMnCBg8d9jiCWHN8e0b2u5NlMB3dTugsx3Wy
- ed4NHEDf/YFj1iSCmDQM7qq2vxsziW3HMs8vseYrWeCsLrZ8KKNdsJTLiQ9rPU+q
- AFGWixeNAoGBAMSVdYUEWWvjf0JEeYeeTQ6o/wpoBwBk0XE0SyFhmPmB187OCYMt
- ZzTQJ7f8UW227Ta8sh78y6dGPTnaqt3AATMw+GRpGnb3MF0yBdBvNTjMD6Gd11V7
- jGPqxkpgYIMVBlprHh6RnRY9tiC95fTkrZsjoJ6fYUZoFxELkhlAft2DAoGBAORr
- zWSwhHBrbTXkb2AeIRLU7xxet4J+mktPAWI2DY2pqbs+oXTmAe+DK+EbI+capXBN
- 1T6WYJAQ9xA8TiWiIxdNI1WTENn9F85FZC+jmeT7d7H9GJZ5CVNWCZxxyjc7E+UE
- ZBcPkUM68MVGVBgzvqYjXX9KUgopUEtrftgOTSSPAoGAVAueIc95N6Icv0UtPCkW
- wsTHvTg6fhWcYay8zjm+wDWeAWGfOYEI1dCEmql6WtDRXAySjqL/orVp6bkuQf4b
- xToTiEJTOTd3avC/AZz6AR1lNXCZJofavsEaI6ROvtwXSkLvrpwMr/yUSC1ICkpW
- WrSBsC9t1D8eVYA/5yHm22cCgYBy6Mxtz+MATvqktuNUnjOTLq2PPxLgQeJK6lbO
- 2lRdJLHvMWW10hO9Mua7GpUoKJ57bZxOHQY801wGvd+uTO+MRFD3NsGueAUmzn/E
- +29q4xpm3uUkpYUMeGbjXdcVi9HJTzku5LT19kuzYlrhxf4tw/LAG1pEJF5xYoVw
- GVmzfwKBgGQwWJkjKynqctKnuS7U3vNMhN/5erMrtCzEx0/w2pKRpGCDX4z9A70r
- 2yneajDGp48KWU3ZDD0VkvR8OCWPwZ0rL6Lm1lqeYjCdFCDmz58c7WkNhEc59gbm
- au+m0N2FkdW1r5bpwobnPvsJiDWQRzAHm2KUM4MOJ9otngKSLJE6
+ MIIEpAIBAAKCAQEAqVqP3omlUpglF6tom4ykTGxxYLnEDpQIeJRKOKzr1kUUnl9k
+ hpp9AvSvokTlqXG94s7yu1DBxeo6u4sCCfqrFMouF023A8X7g0Md8b9KXMNRNQqU
+ gfBfeo/E04cSppIwptlksblwJstpsluGSNVfqCdgaKRYqHoXXczrKIu5zUQqfdAS
+ K2eJCEn82DZiDNK1DSUNziBmqdYq+MdnyQfH5Hm+q7toZyMnGxtFP17+rvXhRbVl
+ X0n6iTMSPSgmTu7gsRDLvwmCcjeRHprY6Oa4DQ0QfVSvgB8J5aXKL+oUrR175bY+
+ 714cNjImt0iyMPcIofD0TrVhqN+goFHQDb8iyQIDAQABAoIBAQCb2Bfu7PHzGMmB
+ h55DDmCfZ2fKYAi4dad59tR6ZT69tmJr/1LNv1rtHmiFxismC+J21oRutbkrvQmB
+ TkF5F3DaN9fEYCLb2RRDzb6/mY3/4UlYqzzQengSnDy/f1w9ZuhYklNkbUZ0nNnO
+ ZQUk/x4A6wOAKETh/UCFdC6u6C36YpHlrYddbYQ3vQzd7b4AHY3m34BoaxcAAQKk
+ CmaAOembeswhFf24wu5pYOIETLhyx1VdfArsbZE9YvfFKlnBREA5oGX3alvsaijz
+ 6eJI4i+xK/+Wr3KjYZaiyhqMd2M6Rr9JFHfMT4f0dGGz4tATLMiklpObd4jfNgeF
+ KpYEF84lAoGBANak+SmGYLp+89ynTwdicyYG3Vwe+Y3kLdLmn2ImqQBvGgV1O1Ax
+ jchOkZaiSL6WWwklMnFkZGy+Sai3+Gak+Dery/dDM/0UpVwykhsR51RdNTsHoi4j
+ /KRfEcSjPhv8BbDQnHhkSemjslHFqpSS3XDCQOTU+Yh07+ghzVsPfRNfAoGBAMn7
+ sRiJ+ZXxkhxbqc8cEWuUHlgflPFJE6VPJ23/pv8pUn+SuyLqb1YLfK7Ms7d97NCp
+ QZgS4uGNI/XLJh4YcoJEGiIb+fpok9ommJ9mvMtgoubw8wZlp41EqWa9iuBBf0IP
+ khyxSyH4jBtsZpTAmjQCRxkqjghm5mRI8GOPpuLXAoGBANBwIC38+o3gnrvWFV6c
+ cimpXOkKg1kRDpbRslFELbXoLiLCtzinBoJQGf1n1rCNnhYBczy+Ou+G0kzval9z
+ MEAPquCQ+Dl6BSLFUTDMcBJy+TA7t3iLJdoRIFYOGFBgqr4LtwcKjORAPPg/tejV
+ vgiz+wS89R1YQWjw+lTFc7aNAoGAQOc6sfrsE22LmMcvmpiXVG1FDuYfEyV7RZxY
+ vDTxMX7SvqGktoSEgC6ywuyON0EkjqxEopw3AWk8C+haeEM80HUXvKwmuHtQP0I1
+ usrlkaicz/7O6NhTbcaJdLUlYghJ3y1nswaZcPIP+2Pq1pPJOTseI40UFMkT8Veq
+ vyNS6gMCgYBeV7uzZbOaAilhUz+SrSPFM+mDi98HKc2e5ichdOwgGFonQzNBN4vs
+ vqJ+Yv8vARMYwQZPK2zltLY7hidDW1M6HStbiVVByojoGDvyIblKh6D2Ba4Yfjct
+ 84HsHafbfRLCcVkAIxNfldVxtt/yIi5vbxymtRimaq53T+yaePeqzg==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node2
+ name: armada
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEogIBAAKCAQEA0ql5A5vFqwFwxADXxs8701D2bQk360Qz/ww43/rY6w984APi
- 3gEtYznondWBgTYTp1dr6vHP6PC0UEeEUHb683C+ePg1/T/v2Qc3hV5Q99A4RoI4
- QXc4R8R6GEpncsdHI7gn/7fKPKD9diuE2AfNGJb9Mv3qWMxOx1J9BxxdmyPpYWkW
- fQWLKELpC/dK1DmaalkgUeuuaOPrNQbvkqQOItZB4ToR416VyYu6/qIhUBTKavs5
- KYvjrT2WvLAkOQvXqe6rd8gMNcTlLn/u/RR+MYj3gRVfoPDYJdi5zDTeRJ5ya6vr
- 5OC9k0vY+z8YIzCqRunmD+2q+sYE3mR2gnxJ3wIDAQABAoIBAFUot0fTJ8QqT+ic
- Ip421gtltkh7qoRLzO00hqVcpWXYm/V+/K4cMbnkBfoP/ks6jhVezLxsRkz3SR0O
- 3BkfD/FrSURjqoeW2iGUvkgGyZp0LNur9ovYYwL4FRdOtKT8k/CHmHvSU0nRFsU3
- cHtYI/vlxbNgW+TLqqj+2pYOTHTTAkhVSAMWXyMaIb3iGJSs8tWWVjFtRDBjbjZp
- EsBI7yh0TIK6CoESjTwLRixG1yO3dEgnyjguUDGxcvwGq3Xy1h80e1v8YGjZk0QQ
- zr01T0UW/EmKakojXRpgk3WSjkl0FpM9JmYKv7pErgaVLNS0ZN0Vk04TY3jFUVsi
- BGaCLRkCgYEA1s5V02dAk+d2NaPiIi/A2G8uNomBchvPpUmky/QkePOgdvBHNhhS
- MTLOd8QS9nYwkxMqjGyvNX/TGrJJw/jrX28Z0h5FQCc1osLUlZB2jshlD6Ci+UXM
- V2Qk2Z6lCvsZGO25wShZZBKHykuMLDAd77hoLIfjxRaeAmKByGqK1zsCgYEA+w+x
- TjuEzUNbkZiIvgOlff9Kw6ywBmKhlnEz16y5qY9NtXXT9EwYpvenUOV/EJ7dU5dv
- Z3H1ote8+uaQPaHEkxKyCaZuLqe8jGnBX34RVb83FUIpSq+KvnxnOKQChpK2xnKw
- +YL5kVNYnMb0pRog6I6oN9RKs7XJMiCig1bzFa0CgYBijGldwsoi0Rcvhs9xZb0w
- ztlB1hYYNuAt8bp0g77T6tncl2HkVIYo4ilNUxxsDE8+upVTtW0wu0MrxU4IZcP+
- lacf+hlFVHfMA1yqfYuW+CM9ZzI98KLOGTi6yojnn8mk4TPOhWd1fPblfYGCqFSj
- rVPF0lZSDo1RhMYMH60xDwKBgCHFyqQrfYHfPcIoMrzc4LZCUVxhLoytV+9U6xRo
- N9GHZXyzjP+f/PD4/5jyRlWGCV/lTycrPU/alaFqwpyH1lmyeiCyMsAz8DkzQMAH
- xW0ze8VwUP2q/48ATSJhbbWMpumrJANsiwXxoEn2uZI8IZEnH5njBOmH2rjTiwj/
- +VNBAoGAYRppdPv7sLR0PbBdL/VJMhRFGgQ+4ovaGXWm1M9FfxkNzS/5uzC42e2A
- 4TUAE2/jcAR7LS8UojfX2/aoIJhDUsj77EcV22ghUd62n62i3eU3AWal+RPyGF45
- OiH/iGRP8hB9g7n6LH0C/bUrrA6MwXFUEndlkbFb8NR2Qdrubr8=
+ MIIEpAIBAAKCAQEAs2gfE/kmRPQPwQKEjJXBJu3xDQqccbDYwgnC7nR/Q5Wjbmay
+ KH/U2Ne2UtlKIsXJB9JFLPPfWmnRgmDNz+nOr6V7AoK3fyZ2E6PMx7cCjhdC7X/9
+ d4kHDX1rW7opym9sNCGnCwFGLrwI3pCOVHmpy8zUgwzn5Q7XCZ53nWmeMrQlzC3F
+ JNyrVIKuxRqfgJIi5A+/NYhcr2QTDcYlezX0IGDGiFLd5xuSQEwMxiLswDJJkjb2
+ Iw/R+UNq9hF0x/sPG7P72jecLfYlXozpijfXTTNiBSxgw8PhYWaz/n+xVEjOxTIk
+ 7jRVjm074Yj98UVTlM3+zamNJJmsGoQTYP09rQIDAQABAoIBABBlEnn7ycCBYTMt
+ LLnAMa+CDQY5EwTcuWI6DCNIaBzf/thm8B79V5EdXV8C1mCJHI7na0TpYF7dzrSQ
+ bh5y6l1ozO30zhoDhMTUsjEKC2S6wXX8vUgAMLHN5VKzl4AVYJj+/knmKui4bEMS
+ iL81gwvJwx3avxJSodoSLjInZbqSTrnvudD8LCiMGS7k4TLgS2LAn+oIyqcyZFRh
+ ekLUab2ItNmwtl1uDnUEzx8HU8nfHB4m8HUptlSkvxj1uf+a2gV63BRk09TLb8dM
+ 8kG1gOlx9rVWS1ByOB4TZyRsTgYBke142Yz2nmWQtadhfcgLXpq5JrRTQGq2hdwu
+ RSc9VA0CgYEA2ORmISlziQMsvyfDrmDc60O+KOdwQxgUF4LOQ0Jb4zt5CndYCbXI
+ mhhWXcz0Clr5Cne5ucKwy4n+KXTYO0B4Kskz0HBJzrbMqQIT6IrgjEeCjhVPJasC
+ lV/VeEG0jRJJI5GBRsVTI0DK/HfyMK2oAyRwTkj6004wtzvmw+OX7o8CgYEA08Fr
+ ELzgC2sZl26S6MGa4AonqyLvKeCeRNw8HrxkaERr19Vpc1580lLSU84epii+ZdG8
+ FnUNck7S4Zj0XUABWQCFUVxMFqk/bqa7iLpGd7xYd6M45B8k3mUvCed6CQQUGo0J
+ mwPl4hAef4axNhhDvFLL/wVC7xlv0GDEflEMbgMCgYA+J63w4O0gHY3MNfwI0+9b
+ aG1tUW3FfHf9iNnNQo4Mn3V/f1X2ambTahgOB3cEJK/rxQWva1C485GnlbmFuWL2
+ d/RmTleIarBZ2qOT54CUEsYiK48j707tOap2LPYt20ikbcVLX68EkkPZeBIqywkz
+ 5VRdyuI+fdDOIddu2aEnlwKBgQDPo56fuAUdTTS399YYZBfAzlRdjJDmCHpJXYea
+ P/NZBpaU+pA/b4yIFGxnfvswxU0FvGZpwvefeclxK7GaarOnmUohIJb/tZAcqWPE
+ y5tjt40sKyITFrLpXGCGnrNceeJYsqmTlnvpcxLky6ejOqHY3XtpIriiidfJhcnH
+ byP4DwKBgQDCM8kfJvV0aQ6fay18WSXN1BW3OD24yIT/jkdxl/k5SwPcBVUexB8/
+ 1wZS5yA4Vg/+EJ5F+9kJg4hXzWnuLPQb7np8MArQUU2UAhWNPVKhZ7PPMpH65LaD
+ tuOIaN6aozhdcD3jgsUuN6SDepLR27K8FZTTllfqm+TGBd/SmXV4GA==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node3
+ name: apiserver-webhook-kubelet
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEAoCCx9m9J9KAt5GuuIRwosVPCp/OlWXs1DANK3LmTF2Wo6Bbo
- MYiarxBWRDYz3YRV+3JZ3TCEtRKphYFBnsK3yRTtZROyvulJ2BNRPMN5V6cNy81p
- nk7QPYxZcc0+ed7jG0CnLMbc5qeFp94oqKoXt8MoFdMvzcRrGoQsXutxYiROTxhg
- LKIPzsxJYfdZf/kzBzcMPwtyERJ8taLNKB2jDu6ls5xTOGgcTb+Z8wBmaH9Lvgpo
- uR8Tk6caPsqK0BtaD//XHcxPHRgw9B/yLKKnEz8mD0ItwFwBccG6bXhJYtpkkVyd
- A3xcFNHoS+fWg1DPallolFLVxL/CGSu5dsZu0QIDAQABAoIBAD6SyDhu4M2RUp2y
- Xoddw6EYBDcxhOnktaQOHVEHy60W8txPJ0lEAn5quetJ6xajQh5SXz+KWDGSK2Ca
- VBRALyWK4gHforfr3glr8xD1qhNQmpmLmbxdPA7xK3rHI6ToLoNVzn4279fKmvYw
- YF8YqNAMmTt+HW4hVWE1SUmGY/Zfb14qXlQM8gkC2u6G9+AfVcxE1PtgIV4wQaDq
- zEb1Jt0T6YMMDAiZT7s1kQDdVjRuevQ2qA30SOpTEWkbKlfhwJvPGfUxqsucZ++7
- xy0nI/Ic5WAuVw+T2gdwoE8TlGq+4KpKAXbREVCH9wXPNgbRuYVheSffMez0Z6xa
- KefO0wkCgYEAxq1ESRm8nHeCqUrYvXYIUJ6G0PXnKPjEFOcyDYjZTMiurzT81vLG
- C3Rwk7PYSLG2q87QxGEx0y9nkdkIGzIgOQmYeV1/49qxuy+avxbPpm5Fyu1I4zec
- sxEAkp7LGW7hAJ8hDTU6vGlpcbGXV0XSKlfs3QXBizd67AH2DS8vPMsCgYEAzlQZ
- +ldBwO5cFCaxybrmVE7zwLEHsHON7Cm4ctWmwqZYNR7dY/R9xtUjKM8Tu7wOBhZv
- CdZ0NcomBoGpsPDteCzkQn+1HkG1X6zFvsgIDQHPMpPpgUDtHLl0DFIvrnC7hT3W
- H7OFfvJEgHYQ9qc8YyWL7XH5pwjB4ZQfW+5rC1MCgYEAvt1V7KQ8/lQRwnGVJu5t
- roWdHsIeAM58EVjKTRZbK9jfeJJ/FEDG4dpLDJqJ/cw8oXFePkrhgvDXntXRY88U
- BbeiM3YPluZSOHHTSCCx/EGT6w9qJl8WuzBqTHEgzJ4oqmA1cGrisn7SPddOfRkm
- fmdZtjwBY604+eIobyIVT2ECgYANZvcdBMf3oUQH5w+LXAGUHmDE9nraYlcorPkX
- NHuVjzqRkMSutnXpEXUsNG9CtY9vo8topy57Q/s+VvPP04aJVNkq3KLGKVx/r3hU
- 0Sd8uM5dqa/0PmRohj9cgYYpXZdAq2iaPI4CVfhPI9wsOWa5xfmV3d5qlC4L2hRD
- Y3Q+kwKBgGY9mBnMw7tSncsdCljw+wwxWXYIry7C9X2cEdXQN2T39Q4K2DztcnmH
- Jb1vKBRuF7phH3Wn9DNB4QI85DRkOeI1BqujJdgeNjnbU68T6kwNChLskAlXEsfv
- WijNjfE/AC1QWbq/krrZh9KKXJ3S/KLxgqAWipBvvaj5SF0lGlzN
+ MIIEogIBAAKCAQEAqefzJS8e23UZPA/IJ8gVQrnVY2FRAKJPnpioWiooJhsIyXPD
+ J8dpn/KR70QSpoj0g8+NWgCVuLO1u+Wp678eglqYDy5BbsAstawUk8jpIHp9QoYR
+ pL+kHmIf8A8sP+8NCvWOhi+jcWKI31tvBA/NrhSNbqGjwma0/bdIrNRGqowGQs+w
+ dekyzqtS4oswEBfHfc/qq9XNjHakIaVBld3B+h8nvUJcux/+ApPBx2h3uCtT1e/H
+ FJmPvQRr4E2TQKvtxG8upmexoceoGLEkIJY6aoo4F570tCNxGlJ6US1axOMAo58B
+ z51F044cKyaTRql6eUI5+GJ9CtyYJPqXMCXR2QIDAQABAoIBAAvTEa/nzJz3VE9C
+ xepG2XvwVPJ6plmF8kaWVzkXL/4e6YijntRY43f3OMLPGQEwDNxTiIHYApN9Jkuy
+ WxYGEgh+Z5C+5lzf0Py/whra46aX/7mufPHbSH+40oIxfCHi8CRwHIAoNpbAhcgN
+ o/dDZkwUMBef9jakUTpLFCq7B0P9J7CfsBow8Jugw13XYHf9lRBp0/rrTVEcOaQa
+ uUbNo7yI+Wc82VgeF1PjnQY3GjmlsmxyYBR3Qw/SSa4EVaD+iTRsNlixhHxcPB0T
+ Ejg8SU486fbT5/bvB1fNuimEBs3jAxEupjCjNaYI7xVpJrQqibAUkC5w8VrgBrV0
+ PkCPUoECgYEA2VNDvF5EWW3wSl25BHtbIgfyTRxLGBVt75vCxIayzaUTSwWmyKIY
+ UZyTRI3Fdve1XtvQ0wfimxf2HtcrGkOh9VShidXFTNrJsWYaJEiC9v1F7Bb5mVRA
+ gAeMYri4cnAoeni17iOhDq/2FDu03rEGUo+4L4hQFgpwCrR7LkDf0gkCgYEAyCRl
+ 6f8AWV/BbqNQGqp0oYgdBKBAjOraE6Q6wayclVqQKNCgbdIA6b9cbod6raPlXfwK
+ YYIdhzC9KvLoO0kG7amXfkKjVni1iCoFGylDnYn99QTAJEQMH8gB3tYhe7pjBed1
+ 4ZbqLqZlSNsrM8C66AD8lVq8e1SJ3+uzkcA0tVECgYAmrAhrpqKm/0c5FIBt6b2H
+ yr41NomuWXHcp2z7J7T9nxhVy0Wogh+tth0Gn+u5hc7CeH8qbkbGrnbfeg5zeAGD
+ 9HFiY6XeTTiC1tZkCnszlFIy9sunmzR3E+DJWHGJ+6dYU86b978bK/iwFQfUcM/d
+ NTHjU3Bc27KgVQlua6DocQKBgHFjNZ3pC0CXIFZXDcXdti/hllcNlyR+1Uf1bhhV
+ e2yeHzgQYiN1q3DCKlKwTI9dYE/rv9HYTnRN544SigE0cUlqIFq21CTkRCw9aiEm
+ MplpGUicBWNGbfv/axfdBqE7SmiI5l8FCe2d9ZneGU67rOhNzsuq2Ueh8G688UHs
+ u6/RAoGAfncJZHbFx+O5F0PTUuK58f0Wm0sCBnOM+4ICsjaYtG/hme/sITrX8kYI
+ +okO8jAT25cEKd9y+KSva4czWf4FTqs5ofmS9A3O+B3ANk3MLE2HCWlIovZqWd7Q
+ Yhd/YDf68dSHOLCSEeDD4PYjdysPjwBgzDAL+j64q+/3bjCNots=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-genesis-peer
+ name: calico-etcd-master-0
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAqDcuZfEnGmwxrLk8gaC+Tt+N4I3LzlLKfzFdKvClupQ2a+hs
- EPcQlBgOBKb80HJ1BT+/mAiguAydlL5EjRfw240ffYO4pkCYuvwxm+rdSMJCVrby
- dMVzH+AR32SvRRe9CuKW0ed10sCUQm+UG0N/5OLo96CVlCmHpn3fcR6yXG5lPs2Q
- nK/O6Tze0fTkQ7Vcnep7g1oL2z7rtFl5kfqiE88ujeM4eUxISeCH8vLBf8W/KAmD
- 8aYE8QPyWaX6s0Z344iLKfxBXTjbLnvQ8Jhi5JfcG0cEf3jk4L9/qriAVQf7gnk2
- LkGpF+Mx3rmKmv6od/zx3tJpz8zZHsu0lMW3WQIDAQABAoIBAH+W40WFZYCAIil9
- kuxLrS2MGUQCqVyEpX1WRvGj+ECN3L16XEV98IAzwqY6trWwqxvhH4TEvor7XqcM
- rlhKmXEeGI2OVIcdpfrmAQbfXRqr5b96Imr5vPmnbkcASoTgnY3dEkKCCndhhNLj
- aPZI+3/zsHrqvanU2kQpY0qc2vKJupi1xJrIMFq1b73BRWAzqpifTywqBfOf4XOB
- 4jTiNn+plyleTCGAORdGsEr6h3qh3eKyUjD+qZHwCYn18ODDOe+dfKN+YCU5hLiD
- CDl67SKiQy3wUtnKRoMOWNrJdzl5G9TM+rGcDS+p7fjYXfXWclXOthHVUaA65FiJ
- uvxolKUCgYEAyF5d0K7X6UObs7LU9MV74QUdhy+wyoH60MnzAvYyzpq8WSfjGjVF
- FlfYjyvvQvvRVRTMg/jMOMVVZECNh347j0oldzTxU9xuHBxVbyRIspXslwTxVZjF
- PZoUXAPd5kEMTn5PlagI9WPC2KXPiMVjp14YsS7/3Qp4TISQES8BUZ8CgYEA1ut3
- RF47dfXGRt5fw3vuvgZfNaQ3TRzwq4evEF9ZP8BzpMhspBqxTlMJg4uNkAeYuLj+
- hrGYtEGXhEwyO0uj4TmoOwEf2+2kvrh1kxNWxElLqV3RokM3GYq8hqoaFeTek7G+
- UIQ1i8xGJBITjuLNglqV2FCNFa4V9WmZ88HKBAcCgYEAs2bCyxFxopr1Mz1grVSQ
- 6VYCLUOHIJqmrwDSxAkaTqB/Gbi7/4BIvoujC/YDgU8lC+/Weidu+zm8jkm6LuHY
- hCCYURanKTYJpMO9vwiWysewETvMtZ5WpCRsLEMOEJaXZUR1D4Nnmgdbs00q98P8
- ySNYKnTxhMFWGvTqZWhX3vMCgYEAx35gAe06Yl9VwfiuiYUjce32OJOK5aBkYcQb
- oyXucTfR4HZOKfHA/UQkw58pMzVp9KV7VUnKxh9QZnRX+CRZJTngx4xep0Wqs4ID
- WRcNZjvm6Hp2mZisr5/RKWsBtarxU8UcNB7UmURvIxJIZ0xtmH8/MkBrBWHHbjqs
- tc//FccCgYBSPPXIk34uoARzoWBhmpa76lPIRcfvJihPi58dtjWoVI34ZrO8GUxD
- GAuj0jgHWunsM1HKgp6/KE1i/c1zz0lijHFmXFwrarmIJAJzoyAGtrZu0F5PdnAk
- J42lOkPRU0PTvLtl1FrwBgeL1lfyHj9ena3jHK1et8FC4OpjMBfYXQ==
+ MIIEowIBAAKCAQEAmhdhQnBYLH0noXA+bFQSSwtwi8LUZv1XLTJjk6DHRdLzOH8e
+ mjcuRXN24JYSzh9B5zlpT84vZwaD54KmKi/EntukH5kvtX7+kR501yjdjBaeAsRL
+ Q4fzy431nFW8LIj4woULFJIIughtNezsMj45QflSq3HD9EyXr8n1ai1Th6S/hwoC
+ 5HsfVcyGw7dWmrEH9dA6mvsm10aqK1j/c7xnSFNS/E59DapeQqlwcViaZMHXRWsY
+ P05Hkuu5piK/06TmFuET82vRJmM7NRmOTvfLlF/PqIyUqaIQg/X3BW88q4CW0jT4
+ TBhKzgy3oEK7Uy+YYrQapb/pAAfu6ay+yIxnkQIDAQABAoIBAHj/funy2eolZOdK
+ AlqCMdMn6np0xOESclAVT0fvaksT+NUWTOuABR+YKXL1pVKiDNgKpv15xJM79Hvo
+ hZ5+4AB2LIx7d5EnZbKCnfEOL9n/MJivlwIyUWg30vOuBxNZgy0L18WRXrTmRQuh
+ PV++qKt7okTqEptVQY9SIRn8+ah6p82uDN8kHtOXrjm6YgLCXYLTc2nmEc877lQo
+ 5+2LCZEETkBI4n9t039qhb1hKc3+JY0DCb4Ijrs5Yr5v/tEzNo00Q9T2y6zXcT30
+ y6Za1hGzwzbBvL2XytkDkyuUvCkrR5UfLpnrYpCycfJT+ovYn5u1c8rBwh4L75RK
+ f88wctkCgYEAw5+5zgK4OVBcjlGeuhT1pLr3BhTz2ehcS+MswOqfjSJxfh2VGmwl
+ z3UjJl6Ni7AzVy0LoqCI6+IlN7X/4Ge+VxESp+Msu/wWYG+IFa0bjQ1v8THUT5FQ
+ EKma12bo/8D262z9c7mWxBDTQF9V5GiR5T9dFOp71T9EdUraZE0cos8CgYEAyaYo
+ TtfTwyvHVZeNKpHeNUTkaqZbDaukHCjqpkXDNJClfnMFBjjkPlkrfPu/Ie5e/F0O
+ 97L+9adc7ZFycwKhEMbQiT97SAvzLtq/6l/dmF/oVT5LNeLcd/lnqxwSiAW2Je0l
+ wArevzMn7CG0jZzJ1i1VX5Ib2UDZDnezlJYeZ58CgYBwaOkg+ykXLhlxYm9eKEsb
+ NKBb61BQiBf5N3pxBKFYPVGQEbmrLDfx5TKkirK1cTOfRXApLCxht1qBj+CP961F
+ ZLceqAj9oJbPJWfCZO2u+Oi5ZVPFwQ+L85nZavY6eIyqrb9ab2u2EKEDnYTCsmAb
+ pnR7X153JFrXN4MVHcZ1uwKBgQCEWHZaENMeZGxGo9n115jUs2uLB7X5Ce8CwGQJ
+ Tv4oUMsda9YfWFWNCi89r2ipl25mCZmaPrORfQ/DqFNKYq5deW9CtRRvm9A2r0GI
+ TPT+Xev5jpIEQunaICnHJvyOo9kBmVzOZxP8v1FzbEe5Le9Wj5hZymZWt3X+Rdfq
+ LIC2FwKBgAd0Rdt+SokQV97TOewFBCI6IgIypnOTVZ76t7xcfwJLr9LCQRWqJ1zn
+ sHzl2C6OcKlFllRhrqeGiBTRyHYH/KoO9vcwTCN9Hbx398y1xNBCGk07vcetl+o7
+ zNWyMiiyoktejkrdVENIc8Ps2ywDDrTQs9N62Y2QvpyOgzw/MWmh
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node1-peer
+ name: calico-etcd-master-1
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEArCgVYtqeGZpMlLBJdlHCLCq3V2FV0PH2s/IEUrDtvVR22BIO
- BjUZzkWazY6w1jeJ/0jcAIgMDw++/vCaY8A7ZE+pogldQM7NZLJ3BK8vgLLtzRLb
- Kp3IpPWz01VG82lSk+vdx0R7e47weJWNXuIfa3bEdS0XA6vIpL8x1KXVCLA4YBtv
- 5yP8kZKvOjvtaCTkc9N9J7lhS9d82CczBFZMCyRjQxzg2OxWTL9QS6HeVYqu6rmM
- lHUnndtG7br6f/p80PNkN3sePLRkDo0ns6ZKCmpoAIlwRJ3ru/L4+i8qNa8bD/5d
- rqnOFphIwBEvzufSuh4MxXbEh7e0Qt9/PCmDjQIDAQABAoIBADxuUZuCvC6mkC09
- eHwVFQDl+betji8rUHs4ADZ6rulf5dvQ8qVRLH7QxhdT+FUp58H59GgnWXxL/bKG
- CNvtFawPnq8ndFmUflrTnp3BVP5rULhE3zQlcNIfAYG0lJRLK1aLXC1fp6zmrxjU
- /mwJGhhh93JeYo7CVUsnZjmMAKzsgwVLhYZgV4k/Offv1TqyxCn1w3DGlaDsPZmu
- uoe0fiG+qqrLdx86MwB7kk7EOCvmvv2k350+ht1cMNyKKch0DBrlo9bq4v6ZpwOX
- rXbd7RR4LpbjuNgO5EmajIMBnn6Y/mC1g/jFxgdKCTlhfm5uMbA0cj9NsFQ+B96X
- CPzLewECgYEAwxRFf9CbrhcORcELcnn87qObecMsDri5jrofYBxonTowVBiIovht
- jp+IQTtnwx4b6aTx2U+Wayww15e5Fdgq4nE1hi2+VUw4wPRAZU1MSsTkZfwA34DQ
- /ankEZvUZkeci2uPw2gikxUhjncnzV/d+e77gtHP/gprDYDlZQE+A0ECgYEA4es/
- 5purZOf2wtc2Ug/zsYYVs3zVRZUnoMGWIz7TrbNmS3x1IPKQRUsPQZpi9Tw604MY
- 0hTIylrz7tgBLWosvQFHXjcnZ0ZF04pOhzFVVcmZViq+XHzlTr7HKQGt0bzH9Yt7
- 9bYRMqXbc+gXBchg2wDna/yfEVZWE1lf6tlVSU0CgYBdji0+fQcMWJZJsakRv5sj
- v2bi4E0SyliDMJO3fihVrwBadGGi9s1j5vJrhlfe5WOxi59I/rg+sbTC0Eq9RSxb
- 6LsonGt5cNKPBxSTAJ0kBoUau96XUano3T85iqg0XQegfXc22YwrSakML+zwu5cz
- M/9+36yGQuzQTw60gAIDgQKBgQDb/H9UxvC2aUnXoEi8z9u0WaR4Cm6COyNDXj4c
- Q+lLkw1hI+fKFWh2kQhiETubIPMHUviwWJzMrpQpVxyOZHz77mrYS0yLO9pyipK9
- AkTeLFirlyOWW+fOLecw/vmK6hCsAQ7LzGYis25mBvGkJ+JoXxD6Dhu2fiOC49yK
- iuaJYQKBgQCJty7Mq/YFgvd3iQbcoTHHHe3E3fD1JQjUr9/GojiQzY8M4WVbI5wJ
- nK2a2j4tMogPfxFMRcAkrFaPDAp6ajFz/7lu+MM+bIojucrOIQTK8QYV94lDctJ2
- MW9wlqo4IxQuhgZXlsuZMSaeQW/aSe5BrlWTNxrZAQotnNL4//gzwQ==
+ MIIEpAIBAAKCAQEAxauBb7Yif0x5h9JRiaSUf/wtsTFrGXUaXIWJlbPrBMBgdW1T
+ Ajpmb9TqPfPbOj+VdfapRCUoPGejufOPBv7f81bLqEJT0aVTkfSVBYQpHJkQ710P
+ wc2nDgRrp0K8t3cYxvlK3c0taR3R0zft0v22v/UZIxSBtJgIfD5FZcy/2OQnGWQP
+ ofHU4AaKNgtvrociz3TAoWoTro6/saGjopwpkwyq3FnQhOyqnQyLFvWC4HlMYRQB
+ iWWT5eQzwOesIVqrbIuSrkJhV8QclrEcn9yMhtYYT3ADsR4uumin94fdZujrQAAT
+ SQbO5ek/tcjoJqSLIsRYzwNx9c6x71bNIG+q4QIDAQABAoIBAAuA7al4qg1KgBAd
+ d01RXKsOHAKh45+5pu0XgGhL7jN6lqJ+2EPa7jc35uHwHSQIq0QQNM2Yc/z/8xFR
+ UVOQ5auds4B5S7N5saFe4IVPqazWY5vqiI44z64LJ9C2G5F5xuFdhLPfyvLBH4Lx
+ UE/lIAuP0gSuntXJu0Svww4nmkqe8iu2YNl+TY6oDuUpY7t9dPC9Sag61XP2RXNG
+ g/o839ad6It37KgXgc5M8CDC5J0Smkw0AheDXg+85+nAVk+H7tQk0QHZgX5VEcOf
+ MDlOcd0demAyc5vc/c9DLDWOccz/kH+/Uf0aMWKi9uzAnfe8Yyiqu0I19nMJDwCf
+ mC6WJgECgYEAyoeVvTlNjBJYEdLPigE9rwPO+hZ49MTvpyaSMJMg7WsIIuSfEJZk
+ AcB3iqjD0juRc0PVRq10bUnCiHNjNxlTS+41Rf/i61EnIESBzCprpOAajwy5Dsl/
+ Bnh3XQ/uIwKMjzXP2vhbYw37/4G074bayouhu9WgMrTRwGTgkFqdHfECgYEA+dt3
+ 1Qj738L3y/BNsP6xMVUYqQq1IsCP1Opf6SSibbnSYXtjwJoVnvDNfSlkvnkx/foN
+ k9Onv7TEZOpuCNdIUneDuvvL1rDtywH6buYGgagegcPM2eakR8mYda3VGzfVv488
+ DQ+MyAMhGQYQTF4equgXNSRDYynucVxgb6NvK/ECgYAwPV9DNPTtmij0Bdx9KJKC
+ r0uLcfLZilby31MO0tyS8F19wirJDqk/aZKPqmcKGjoo1E1mikYjCeCWE7XcF+Ip
+ QdHanHp2RlwlaWvpL2l4WhC5ZfRmO0RQTD1SI0s7d433Rn/9zg4mZ9xQHZr1Oo++
+ ksexL876hOs5Ak4i1BJ8YQKBgQCrdTTFZ1XY1qVPOMdHt2+HB/tVPTjR8UyCcpeA
+ mRgxrfu104O/jr1ZhautwTMWFnr865RXpj4OKxE+ozUBMiK6HLO0I8hcuqtjzSa6
+ 5XT/kovkxqWTvldrv+a0kqaT9/vhaXxvBgW415Tl5ChZD5mB9KTAXfM0YHj1J8wx
+ r/jBMQKBgQC/GrsSpbATM2GwsyOnII9tED5Bj+og22zjZkMyQH6uAiz6rYc+/TIc
+ TU/5N0luDUfGqt128exzu72ovMc39TM6Q8NymVeJ6UMQntvnvQpDB3wXzV7NKdNK
+ KoCYL3chLPNPDo1d2xLkDKgYS96caVuJZFgUvd7vYj0YwFO9xo8y3A==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node2-peer
+ name: calico-etcd-master-2
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEA5sgsUw66Q0XnykvSmIef9hNoD9qRwuAp2ylk7V2QTKXFN38l
- DNlI2v3ByhqaXSi1NjHTOsUx6gpQEl1QULkW4AD4XhqB0INrHuEtQiu1MTKlNIAK
- 2FlfICuc+WRcVFtJKl0Z1Xpbjosw2BIOtsTnfA5crhx54dvE8vNaJw5/Nf+trdJv
- BMxaG3yCBqPai6Km36944TzzWqo8QUoVWK2MCnufp95ZRvWaIPXNKh7XQuiTDeY8
- ICvMlD8OFeNn1u5pWBTfPHtGJn85skv2BKNDkRlzdr52PaemFwHM61+TRg2nZLDD
- oieCRMQs2yDb3Ah20gKZ9H82wUGnzOYe6l8FQQIDAQABAoIBAQCUEVpe79QR1Ygi
- AwPbWSkIeOsLQPDEV46DTsuyf5VVmAYw1SKwW7iiyKzNPsRLgRLC8rTTwDGGN5eo
- MLaXFCnZDsZLmjYv0iGoblDbY6+dISFdzcknhi/CNDlCyWFzvh3zUEiC7z5O9n8g
- InXOTgc3UP+lth99CcQTHI96/5Ie0fQXGhc2DM7W0K+WNaiz71mAFCdQQZaiC4Za
- uQzvDFFbFi2GvUH5wFPWr2aGY+Lu5Uw0fb43DqD4HmbJgIeHPPe06I+QcBmFjGd3
- eHBzifFZ1uURGnAhlZY12uRLBZZ7IaQzQxy87qkVbVnDKEkR7rBLs0hjEYvBTpaI
- gbmB7MEBAoGBAOd75Wn5ZOPQHL7rVTJSBiEgn+TEOOiEUiiudRUB32xDMLyIUeOS
- 6dfQVzj1eeajlE6u79UmPdv8o8Np/vtgygK+aujgvA92BM52/TIyKAi5Hnc6qLCx
- TeBWW7Ov561SBg3kiQ/KuyS9Cy+WAYG6kSBLh+P/6NqWJLXA+FdGnn5nAoGBAP85
- PiywyTwFC48L4ldQdE6EVd2JFuX+RSCWu27Bal8NMFasV2oRjELCYKQ+UnjisEEY
- w9QlffbJGJIfxMIjHo/9N8SGnEeB4QMr6sWAsGMmP/XBvOyJlpuZxkfCbAE5b3IE
- yU9PwXecoIsyaCRk7P+q48tABYPMRIttlVEp8sYXAoGAZ/FmTnPCLdmhTsl1dCcI
- wY9YvOyvcRkZm1LbGBfDL2XsWHwN6VZq0pGm2NjBaCND0SEUaG3HkSSclH7gFBie
- HSVL9E4VpAumlN8xSnzjJSea2obogI7dHUMp4kG2kkkmls5sDT9HUXPhtfhxrMMN
- r6a62lJrSNvqmAKSgP4g5TkCgYBemPX9lI0R7QDKxWngWRay34P/98b/+k3e9V+F
- frURhA7toTVJQDXPrMIrPlpNKiCQEEDNShQ1O3Ya+yFvn5q9XeqksgwMyQwAo++B
- wuAd79h3G5cNyTWEeOuwP1TO4132UeXXusUHs4sh7M4C51Gctdd2x0UEA9tIHpbg
- nX65gwKBgEuw7wQ5O+LEElmr1LtjJVG13YwshOobAaA7AKxp/JOnMcnU5KTuOQpw
- bq0jkmIajBev3aKLRMI8vozJ5pUa45dzcIX7xJ9LYCojeIRa0JywTZFvtFCj3OPk
- z/kpSEEtAY/7My/MM8VfvNnqGmuGeRpMW7fjGP5kiYuUcUJ/TGQ8
+ MIIEowIBAAKCAQEAzgqU1p7qzlqPZVuoOXcu5TBgExMDtx3ZHvkzG7Ble9YqLNhD
+ xyEhrllX9AYRQPeFNNVDBCuTzq/wRAqUYVAhGa9OQTRPMQ9GndJPrRNwyY+yld2s
+ sufETUDVLcs7QUY2CKS+t9zEf3nzQtgZn94u98Q0Juw47JQA0hwVy6QF4ub8iz+8
+ uUqs4RU5/uRBWW+J9RYRCOF888oU2afjbeE6FEI2ZvCKDlPmsyQYLAzRfHjCaBUa
+ a7F/stdt/1ZfVzslFA1eQYS+EpurYsdF8flm0MJ8WBP9VEf1OPVfKNxS6zUN0zH1
+ VrZqeunoDCAPdinnFhp3dyen78HrSjpKYXZDJQIDAQABAoIBAQDNosHpcbHnQXrc
+ Lh43PDwRgbZhUxjiKWgJAa2AdQzUC2sMVstOckKrP4AIjAWsUV0g3beE8fkSz4V8
+ YxK0DMT8XXo8mXhv/k78NGpQ0pY+lKwn5pX1+Fpyv8IDclIxU2GaPtIZrrxufcfL
+ buIkLBu0LJ3gOuKVOyGWkXEvTQSS7yrYRuxfv/a3yjhglXAuovANQ2GxGs280HPM
+ eSiALqsGwxQKfCvPJfYKDPCZNkaQbCEC+BImSRYLDsXOPGWovr54rgVXN/gcAjrn
+ uNgatkrehHOpoIZ3R0Z9VVKdgJtosg7LJbvXZEHc/RnqvdzEl8v8VKIpBCdhN93Y
+ wijfAQABAoGBANg053Sw9bJxJGxZTFAIek7umvZcqV3/gRcmRPdCSQn1IzQUvabl
+ madnz5WzUHAfXWPjfVoE76+pqhhI8CGslcIe53fPUd+wXLMNLSUt0ougdWEVEQbt
+ Pl4k+lwIRrJgVQVCoes1yVTw5l4MdVi49foroTKdpZkTFKuBnEFWrEcBAoGBAPP2
+ trKW7/Fzsb3y8Mz6tv03YB45gkUvyIzeC0th3CblE+H0c81SfVupgJ3gSUgJvv7l
+ rzcDtQ1TrcUREV9WVtR2ehKC/fSZYDIIf9PKG2/l2I7OtJ8jmiGUn4Vu6ZGaGi4m
+ Jk5F33V4u+9KeFYKZfVakLISeDmMpf0WpQrqkAAlAoGABCj4byFciONubPtG4Z9Y
+ Ix6qMqVTyPA6nqRo3U0UNLHXzI+9mnF+hF8V+m5p1M51sI9XAR1pMzsTf8YfgLZe
+ Z07K61482A3/qp5NSRLZo0AiIg0St8xmz87sVkr+eT4rRJ+kl+8AAbdk51hcBaoB
+ aZ/fSScJYamhUy96PzOYuwECgYBNY0R/EDwa1n1aaNcT3q/vUQKPc+Sr98VhUgo5
+ JljEicQt1/Jn/jO/wNwIuJ3mWRkaGFflVqq3CIVFzu041dWDXfXJK35Ned224VVT
+ JHhhnYJ9gnpvRMbewht8Izu6MSz+2KEsESQaSmsrM+9KM9A17T2bDxrN/pyk1OsT
+ tGZrdQKBgHx40psqnn09KYfj0O0fxCqtGEzhl3XSn3o2iRbTE9YAUOmS+hDKC83l
+ F0Ccfl1xkQqE10l9iew6BA/6BQthNhcK4YKsDQHHVlMBv1+2BEB7GvqlH/LUjYKe
+ 0BGUs3ZWUY3W37Qig2VpnAygvy8SQFVqq8Jy+/m7SVXvGE0ztt5F
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: kubernetes-etcd-pod15-node3-peer
+ name: calico-etcd-anchor
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEApI9u4dtW/hMk2jbZeZFkzaOfF5bLgJsj1XTfiRoQHXB3KA2h
- 5J9CjGbHCX2BqpDeXI0iwV0hTr2WwkY4bXQnpMrc47W4mgUb5jYy/o1/UslMrOXy
- hbdNtoSK3gaJU+4kR/P8ekblRSFunGkAaSvOF2hWXnuZe55G1QT1pk5YIAmBajqG
- nSIch6ehWhWOHrUhN4tYg33iQyUvaGnulSeiwSleRBhXwkb/RfsAW+D9TpH5TLHJ
- pHlJIYakrXHTR1ev+lOXn2Ox8R7Xtx9q4ePeg5+8v1uGAKUymyksasJc8VEEdBq8
- wUP83FvP+WPfXqrOnZz9CifIkQ/VJFB85nySEQIDAQABAoIBAFLHUCjPFDCU4rne
- U4GCsOl8wD+2fEICSIFM3FF0Sdz1QQtl6CVAM9K6tK7CcqKhYym9WVlZhrK8TgUG
- G8Z7YqHT5k+pjuXzYfhpFTfVZ9H2LtrehSPcdHw2qkBLm3Mb3SZQxpWf6h7fVWva
- qfk9rts5ghDfLfLwSINJjmSNDml2cBBQJO3m3IVZqElKIr9hSVg6HF10YcWGjHqA
- SBTN/Ybv0yEA/VHlG3QIobwG+zHTl9wu58CRmz0yNewX4+dm+kPMjaoP5GM72T97
- G8A/tRIXA1NIcII73gJXHMqUhU4SOtBOLYzqSfRfc4ihsj7S4lQR0g3gSLAgZ6Cs
- QYPKlz0CgYEA0tGZHggbxiwIGG9rtR4nLJYumxBzC+5MbbOmKmEVVoRkwxQtq16c
- RXdGzCKjlzyLFKewmqNCRZqkTXcNsnlP+YHGX7muLqjWy9mETwcFrvXkiHubmS0h
- 85kF9lOwBjpBP6qXQV9K4QU4NABPqDVAq7Rp0msawECrYIlcozYgUAcCgYEAx9Pm
- 2CV8KlOnkSf1tP2Cns3Eyn+fyFDSX58n13P4zzNOnIA3mCdbohNRXFuGqbk7XbFC
- mW7N60zxhWADypV92XiViAvfEcZ/WO0kPjDFtvWfhHpzWkn8Tk/uBoOm5/gNqEy7
- fpbNTDacXmqdPl8qT9Vzkj6OYBkYPZZVQ90yVycCgYBW4q9aYzkfKZKEj5cyZCT9
- CUBYBCWGK0YwiDPZj3191L66b5yK3klFj+0LwNLvR7KCZsIwWUy85wkELCbnAXxm
- dofNd/dDn643AYS4FUrQWuM/JMJyFNnDTbPZW5BWYLf3h1UjSiTQLJiHRgGOb7Qh
- kA90+1NhHMYE2VfmpC4ZDQKBgQCPKRjxManLCTO7os09ZYH3E6QxD04BzSVqrDN2
- //b5OuDO7mzl7QyRCRX4/Pl1DuehMCVulxufv/gofak5se//pYw7c4XUzkjeBMc6
- Zua/NSmbV77cqLTBxjHZKOiit+vQ72hEQPXD7DwKyIbu8G730wyBcZ++6Tuco99i
- R06RcQKBgQCYhpXKERi69BQ5yHJtl6eOu8qP4oF1KTHOSdVGbUkVn/rVUhVh2z+8
- eo46X3/9OVWcSgklBHy/OfKj9PYSEs328R0QI2BiVS0fb5ijkRXITizQYmJygIFt
- F5uzGVhQup7saN+QanzArCmv8WGMFkGvPm2SgbuFyT5mYJpHcD86NA==
+ MIIEpQIBAAKCAQEA+Zb/GU4tlSJJroFsnLP2iLDxbHrTj7E8NWbwtMT5oO6zPlPi
+ gYDgoD3fj7+XJ6LkjPnnGS17D9FKCwVx7HTJCXrDBqSHRDx03kzyw22ZyhnYONkG
+ D3iXicYl4ja88igYkf6/bcaTX9lEGI4Q37mesAlWKQmpwjyuq1L4jquTTCTGJcfj
+ PsAUUCm4fhodit9AuTohMrSfel2RI78AybWp8G83vKF4bvVFyCM1R0/WV0n4kNoH
+ BlT1pdjAnPlQ0HebGrpQ5zLW4vKZ3pb4F9UFlqP6lF0elzBpo7rs1pASLcocw29a
+ seKvDbduz/MhF2G8CbUrLrOSmoa+jrmhoVVjrwIDAQABAoIBAQCYjGmuldHWbPaL
+ 6h7wSC5OrZdhrlDQaotaOGi2lA3fBwYW+j5e2N5yEl8qBPfmCfGXGMbe5KVqrYiL
+ 4/AVjeuyF45L6ROj6S+lD3Lxb3OnytQVKtBBdHtqgel1se8aMteRpBpshgpdcvXj
+ 7DD0DQeooIxA2N8hEOXRYQz6ZnPI/Rv6S8t0hEIuvU3wus8l0bRLsMRPXPIzuKEG
+ O7awzB8XNkP4AJmtlQtYynqn3XjV5Cm9ASFC3+6FKHMvMo2Rv4/IhGi6rW3G4Ydd
+ 3kqRw+UOOU+81/wPN6uQZZs8RB0V7M0gWpWlf9FJxhl892Hy+0dJdNoIShLGiMfV
+ gir4RQmBAoGBAP/eAhqVk1s7HeAYM6wmzUluY3ehLrMGS3YxSTJ2qEVBZL57P1Io
+ 5Ks/Mq0aXK88XoVd+1aiGmLJvF8qk0aFdnLd25q0iCL8FO4tUJvm2O1+GTh05x4K
+ +vu2Qb7oCotIATiDVY5NMiUwPPjhjD9gXbsxdpTzDPWC+3qQsKYrlG1nAoGBAPm4
+ J4Euas0a+v6AVCpRgU9nO8tdDq6ih0Liu8TwaFn6AxdA18kG7e7B3AHluiPc0WB6
+ bmwO8GCegfh7g4/dMvJL+ijiglwJIFp0CbgRmgmP1cbWp+XQCEPmTtJmXuqVwbbQ
+ vrNJ6h3sQiW+B2F4P2ZoF+lVwE/IK4Myrz+zaiJ5AoGBAIlQOKrRqOImCLNx6ZEy
+ xarpzgGug6RZ9Xd5ncGyQj3giVNcSzApeAabBPQ3GJSGfmdud2sX1bc8cpZT//Ox
+ vk6I18jfp8u2ovjrYr44FiTmLlzJCBtsYyNgvUnZt4bl3pnYibqznPyuNZqPWLfO
+ XJ8QPYZUJZlAcPtm2RZkfuRzAoGBAPcb+Fuo5x7X2BAIRUErLl64tT7kcyb0xgy1
+ +UFE9L403OIh1GalaMWfKGroPW5HkRl7jdF4Zv31XH/bGbE/Hq8N6BqVKpKQpWdc
+ 9FEledyEbPM6byLG3abzPISPsNVKJEsX/d3FAtthc4ONrBgTuglIcIEBzjAk0Iof
+ mbPbgudhAoGASYScJRQQNyeABZgtdAu3ecB+HszE6HCFc5qj5SKOlGDqV2IdYRnp
+ vgfiQq3/deDMeZC1c3MvhRB8TAFZ4kjWwBbtKEevg/EMi1izQsRqU2+4fV1hbEWL
+ RKprq46zJVLoSZpEL2Czekn1PHzjfhFedVYru/bSYPCIRPhgacH7bgs=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-anchor
+ name: calico-node
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAr7zaSPZqGVfC/L++GY6OJ3YRWPNLkQ3nM5GRh82Z/aPpJyqW
- TxVHQ8kvNOyGxXAS29TBNU68yT26Y9tZFqI5UviHWfL6i2++lWUXwUGLs35rQK0l
- U1/+1MbnJ5nbKQsWsYxsXGzIPVDX+CpvLVHPxAk+DWxK1Eq5nJzrOBFQKTJzrWJQ
- 5S5TVk3JKVAOalZaUawZ42y9fphlkpI/oG1wYOpHy/Vw6HIhb2bgzdfi4XMLQoVZ
- FDz3jwJ7fHvhu7xCPuy30MT5RCjG7y3NGnPRF/OJmw/kzgXtZmJs91uhKwerhJUu
- UfY3D4W0eSpGPIcDxBLDyC9IImUGQ6J05Fh0WwIDAQABAoIBAQCUMBylT9xx2FZc
- yNblOBdY4S+JoUbEX0PpcUOVj2LdxbzSQRAUSa4ZU+mRqC2RCYttgb8WU3nP/FRS
- 5eD+u/a4p0eDKufocmb0FRXt6XaC+gQ4uohyAM2i4MKE2zE6L9aICxBI85X6VlR3
- OFkdjxIyjVSc/wcucoCHtq6GTdsZkMJYeJkuKqJjGwpKD7uyNAPIe6N1Xd736eL+
- 0HKfHV+GMkGBvFvTCXICiDA7f3eyh05OL9UEnmFzrbZLUHpBy0sXatEiXE3/bidh
- aBRCmvfviMw5rynXH9abPx1OB0abGzskMy/QHbs9+KbxQqmXY4HFGZKAxTqZpQDr
- r9XaDKsJAoGBAMl49N/t2wFvvr63lQ5tnHULiZCBopLOGbvescJzxJCzqlEoDacU
- g43Dv8/Ir9etGYk6lYy/Mp+fYJxiF6BNc1qtnYQZSjDr4v82i2ZiryJMeNlBGAmQ
- SKurJIynkOjQZ36KcCpIlpzVowlzQC3Ku4HjUo1YoLIrLv7Pi929wTdFAoGBAN9M
- 2+gujvDfJ3onauESJv5BEKt2ZdBLPGbMYVZE3SumZ3l5Fr1fyF0vNQEO8QFhE0zV
- vnxCWMry6UoL4k9FaR5nESc2i03/+BwURAD8v4r/fQZTka1hDuKrbsEzKmY4Sofl
- J1iGg9qZZ+fHAPPQ4QdZKeg9RzjYirO4QUtCPmcfAoGBAJniWl9DpNinCnFPdXlM
- vYkk49DNQ2iQJVW61dlpZUUFBdzxE+R/JbA9SJ+jcLPykiOf7KRRUZBcQoWP4u3c
- 2nPzUfGZA3L0aTB37+enDo/LCy8dqgd7/hWpJcSNJIC+1Z3wjZWuVeO6xcmtDuMr
- Cyc9g0tU24DavQ2BZxpaGl9lAoGAF68IN/UQNh4FCuC5ZkvNlPQDt5vkKpaAPor4
- 2/SL3MBWgzzDm6xYDQIfxg/2oeXQ7TpSbM2Aq23eLntaMnwzLQVTfWw8lDZM83V2
- zQABtNVqRkyAy/naYVI7egRaP+NCjG1SogIKZBoXOi8SO8nwxB3B4x70uePFulAV
- pMzO35MCgYA2+BkZ++422WXjDAAsRN2XK3UQOH4iMnLcmCs1qsy7r8Iejr0Qxq7R
- a/ZAhBul9k2kCwASWCtnZeMUbCAuJQ7FOjrqUpbfU5Plzdwvv6Z/d9qamYXFRFE2
- noIvW181do+yULCy97YZnQel32fSEJXi3MSDBqFCq2gBWtkZObbiTA==
+ MIIEpAIBAAKCAQEAruVbtDHgDJFWb4UyP+hVvYuFAYxrcV/9TKOTHnMJScegkt8h
+ WjB+9IEcKMMYqrZ1CxXY/61e14/9umTmoQLbd+O+YmsWVEOvg63bQ/ec4EQwz1SG
+ mtKxUU+NroQOOmPR2v70MWL15tmAOOWgS4j4cZiiCSapeNJeT7btQ77729mRkiZ7
+ f5/yqn2WCoTBo6yf2CBCxgMBfQ7joqkx5Q2YIRyivVAMqi+sf7krPHb9P52TpySg
+ UDTorZKYDdA9YPCvK2ESC3aP1q9SgLDM3DJr4FGMehWtRQMdxU2LhiaKFCWLzykq
+ vn4oayDsLpYizg8FjK9LFnxRzLiUAGc/v3AeDQIDAQABAoIBAHwzDGhucrj6DPOt
+ Fv4jM6AjEBUFbtdYXzypfLRG5PWr+e/S3JB7l+xyM1kPEtlIMN3qaetHZu6Vpo1T
+ UiRNLyV4aZ7ihTzZxC4yrF8b3B+2zSKu19fif2FKqUahKKl2cXSfUTIxIIcLNe8x
+ wh9h6WxiA8+T0Q2n9qmNMfjGC30XW0YzTavKiN5yS+MTl/8XvIK7Ham4ycQJG1KN
+ F9FTYKorgYKrz8bkQBKL8yQP6A8J1r/kKI82HhWnt3oxFd5B1gYBf1Gc7Au0DRVW
+ 8EjgyUCMpn4Fq0zS+SR50hfzRbKpR1a/WTpu4fsTgqgUCyVfM/B61+RgqL17v+rO
+ ahuW9YECgYEA3tql44T0KbGdL8h3hzDTVanFSC2OKGawZAyCL7Ef4elkBnFQsjaG
+ S92MlmQC2O2iz9EtzbXbORHhgIWicHMmZMLAd7g5yJSCgYbu2wWpMA59zap7ZSTf
+ 1x2Z99DY2w2llUbiN1drjRfo11SYONgyRQF/a3g5Ok51koWbVUIluGUCgYEAyOip
+ 9Y+mPJzBoINm9b3mq2WbHT63aJsNBsAQpBWirAtAw6XCvqifJufEp2pm6uva6tvd
+ 6cwPumml4unNHu+j2cGhYzxPNReIlbFpujdt9fRALejF0UxDMOAkz2Q3aHPWF5R+
+ 7OyPzJP8iG7vOG+RUfBAZTjfBJTKKPAwgblfsIkCgYAt1Zx+0e6B0MT6eemThYhB
+ uxwXPz9Ysd4fha8U7gIXra/j31RwguRWICf1Gna3dRCiW2xnPbrr3vCZRWLma9h+
+ qst5FAvWZCz/ROhFZcGpX6GiNikQ4WekT7NGE882JnVi4WRPa4x0RXGfMAfq0RRt
+ uuQhD2X9xvtJem87NtKZPQKBgQCyCJMLmtcJ4TMoJSko3LY67hfta3UlyjhZ4fsd
+ HFsBsBsdBJe1UkFuPXWjkYNP698bvehBVOYfH52zndF594uv3IlCIeBiwM71L7js
+ HlBf4qi4xgv982GbPxT/fuQmuHdgf+OV2e93ry/aSsvLq/oPrSGzURk3uw4GBwpE
+ +lsUWQKBgQDBrpU8tQG+dFXuNOh0R/DBcseLDRNDhr+fHlfRGkPHMv/mzUxhy1yi
+ dflfeMRaJ65kKlQD2nd95kjHM0oDuNaIeG7Hl0ozE+sULxd37PhmTB5A83f/nad7
+ 6hSs48LMYGXSmP8V00FbqcGdVkKnQz//0h6Kq+gIe68kYgxB8rIlog==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node1
+ name: calico-etcd-master-0-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpgIBAAKCAQEA9h/fuLJEYQOd7w5qZtwvXzziwiwIPNZ1S+AR+Lg1L+0rQWe0
- rf6s2BU/yt8bXR+xMeeKJdSWac/oqpAbqvyDmLJEDOZbrUMgIg8m/ST7AnEA8JZg
- b3jTha1DWKPkxcodBhoBY/vb508t4NmuOLof4neZ48u4+6wUoN4TO6jtYNce7W5X
- OGf7+WvK8d367a5Mq/9ajecQygDs2vuijHS2HhHM58nhsfdb/JXAsRITL2R2dHA5
- cZ4rSMLfeKCUNDPEPKxv2ZWrTEXoWhjEaY+tQ8p0sWWM2wpc1hF2vpu5y5rIIHEd
- yeT9U8bIV/n3RhmOTVEaxHi23ZgWl8muuPIH3wIDAQABAoIBAQCXvrMalp5eCfLX
- rtWfMWXrnAhamvdBOx/6dd3esQPp1pnyq1PUas56My+vjrq6QY3oLM8Z3+YUuuDC
- ODM2ypUAEfiu01/2hQpMtXbeYGx55t4jdzNhxuby5g49ml60K5aVanctA91i0YiB
- tvQZeXerEv5IWhRk5oWZYRIOmGoyZ3nYP6S8kyvUzhCF9obn6IQImOBFkib1JIZa
- N5exIYutXigFRT9ag/XH8wM7+/qRpXTHsAC+6phey2vYr9TjkCnG50POMDViBfJk
- 4x3Ns7nDiOjD0yl7p8NSLgcGke20fN4aF14dw+FHfNkEeKX+DtZAMrBPV5saJqn7
- A19fRMdRAoGBAPgAKjdQxMoHhLtidhQgg7mOFZagWA+1gs92YdZjdbIIhwClXuw5
- n/lnJaUd5KRjl6iwS8uZRuPs4+eBSB6EJVkm6AlDZDL+dN8lT88cJ0sQ8b7Um+iP
- WBVLwmEGfTOovm0YfsM0jtr9rBU55Md3toGPnGhBlw0urtHOdtJn8IetAoGBAP4Q
- N4+ghrhMvpE57kNwbZgQdon3WdTsu6z0f1PaefYW0rL/D7VQ/QYIUwg064aBspV/
- e9iiOcJJsFi2Jz8qpTMFIr9T7zoFy/B94GvWhx12BqRsBoT+ABAaczdLawT2IIyb
- rE4bhsXgk45f82Oj7rl4htyXvTeUNs3XmINFQi87AoGBAIJe89Job0sVcL1hIVmr
- ThP5kXfBiwmXDdEqFnyxhGm2+eFpDeF42ZQumSeX815HzK4tH2tEhHPFUHmfCN6h
- 8VBQl6Jm/wGfqqiz4KSr1CwuGCeNdPhogpGPZfvDgYXqq1CGk/ziYEbXG+N8r7v8
- PsEVUc+sy09uvxAkTWqGoXdxAoGBAPJGRLWSPuZBSPj0ZWGqNNht2px2ZBPILLAh
- 98ne7a7e1M4crL4bHS5DgeqxjGgYBlTJ3TAYgzvjSWdPTN3PrPmaTChnwhlyragI
- YZp0WSSfCHaDDTSFg0nX70crhEKW8zMiwI07cqoAHrYGifLawSvc4744dRgrHpfs
- oGOOCC9BAoGBALJJA35JqxMNp9TdYNuwkBNsk52gQpZEG4jlLFPlAMdNgiuoryTh
- dF4JpqATbkjIblIqAOQgeXOZndcaDMY6tXCewMyHvX76aCgh55tyCqNd7k9wU2qy
- aM0ZgtlPzlkwKjHXt8bmgPK9Bd2/klaCVi5gXFEIbvQx70tzjkjpHAtx
+ MIIEpAIBAAKCAQEAou+XctIcxzycnRX//4VKz7hWzmDMWIuWYRW0fFVRp7QqYaJ9
+ IJybtKrvB7zEH9JvWc0HPdShlKphLxEuEs5FdjSndjjQMCPrihmadpArOgLZJBnE
+ VGnnwx40fVYKDyS+m0JDIZtP7WNfOYZy6QTqLrxCzaP+KODI9MSrcICpvyRMeFfd
+ YTjezoOUDmhfGZALwPSWeo2QipSm6vAW1ez1oTVw8OM0N+hUCbMEl9MAV/Z6l7Ue
+ nsBDdYW3TxItlwPmW460wNUPC3iwGsUhHVuR8uArxIlbJ2wuo90RgkVGS4aneMeA
+ e55dkIkDcHsv0cOUOxvWoeP2wHAvpmUYX8N0EQIDAQABAoIBADkzASjW6DFtbtGa
+ qo8qXPQFE7xJsRMYlccpVn4beZn1Hre90k2DjQnkxBskQnmlZ1/QIU2serj1Az8B
+ ufnyHeJ8Y5mWIkf0JDkL+fTLcdFgtJf+z7SOpUUTMnwZm1hrntpkbaq7mliM/R31
+ vBtflVKo1o7Yll4FY6bB8CmDkZO+/AwHlglj89acHSiGCpx0ZxHRkCrNrrEIPe35
+ cHOrLJUPbW5KiqCFbuccgHkR/4gG1d2a53HuBXmrSku1omSxd5nsfH7h9zXgg9BK
+ 5SD2gDXM4Lg4ulM2liBbfw4gp50iA9QfBHZg5aFHBeL/OhJaPyL0qTCFl+l9OXNR
+ 9AHFNRECgYEAzz/NZVnnqa55bK5uAH8/5EhSSC4pD0tzEFaEyx5XBu6xepKJCUP3
+ +f7sWrzb246wx144Ky5RO7nIvKgwnmb581Yb5dO62jsB00RWLqExf1CqoCYwrfWp
+ jKkCLIthSu5z/UF6/ked489YRnGTJwt1av15/Zl7770xoG7gqqrCsBUCgYEAyUNQ
+ 4rniW3lNJwApKEOOK6cMjAyolfUMTXYmQkIIVoKUfeB7vS8RPRKEFXhDZAKEUC2E
+ mDuNg4lNSUO03F9RugNYMA+rQemgKJe8V57OlZLJPXMt+dlpmfgT1oltBoa/cjZJ
+ u0IbYXZdZoFFBbJ2Vd58sWVxKGpHgZo4idbcNw0CgYEAsASjQLob7Fw32ptG5/sr
+ W4olABLcYpYVEsI4pH6PMV8Ws2CzLIBioxvkx6fxHsdQ0vLtx5bd/Vjr6Xb7W/1f
+ ulDe/tJVtzU4dqNqgs36yQPM9pmY7JZhuwprw0NZjZd6QZUUjdRrf+lBMwsRDK9J
+ uWWw7zclMNdBx92DyM+g7IUCgYEAllfOyE8LJEHMvGGGXSl5vmofGU8rcDmJYyPr
+ GHuzNsx8mDtks8HBItn+CPu5e6/Vnv8hmYaDA8tBDIWjSSt7JXTyH5TU3Xvjw+71
+ Jo7eyyTHZzvvEEC0feuvBgfKhaGKyYp8MYIEah29T6EpKkRR2XtFsk6Q5RvfJpVJ
+ vs3d2tECgYBy72os6pr2Otstse/U7bq6h85RKw6jTAsF98Ib97HNfx3mjp2LjWy7
+ LNPFcRnGKFsj0fseyty3HmDG0zEM6HVkneZgYffgQOojpYTxd4Rl/Y7xul9O+tt8
+ kPZt//5d21c21jFHRBSxw/WcS1iG6yG2rRbAzdToX7wMZD1ok0dtTw==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node2
+ name: calico-etcd-master-1-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpQIBAAKCAQEA9vueco6nzJb2Ta9b8mExi1LfpgS08+naEvuDRKnb1FBsjZFf
- 3sQsVkVIu+3LcDUnY7BCdiGglBZnDE5cRKYp0735fapww+QBAN2OtQRd1uy9oVDf
- j3H3XcJYumSU/Oc/wmVwvPLXHTkkrFBxyDJmPCXEV/yXAueMJYcD4pOqIfOKXeGT
- oN4eHtvmaLA8PcelHK6nqgE0w4msN98e4dkICerNm8G3tqZS0gWldxeCRHR+po2S
- szXPLY4F0Odtb2Sa3YbSW/TI0+wHAFs855cqpBLXTZYr88BtjU4PzrlB65kWI3Q2
- CA3myofDgST6crvrNiwYuLGDO2lUybQMjf1ZmwIDAQABAoIBAQDAGcmN1MNS8AA3
- QDPF/C7q7NSjbnnIVZWWuiXJnEwtgThNjEsDG5ZYq578/OIFLnKqqQeollMtm5cf
- DTva8VsLJHIPeignVQoqwCklRnYumwiLljmseroqJOWaZG01oDAJZZkgfckvI6kQ
- lalKS1kVY1KqFP7n9W0eKzusWao0qI9Evj3/xy+Xbbd1tw1tKt6cQXAXIKybVwVf
- 28iBKhMGmxSxsHvDs3J7meVZ8hsFFaxfl9oNtQ2nASFX71YlG0+mbLSZpEWMsplD
- A/u2CfkVnbW/O2Pmpe1mldBE8PCLrSlFWHpu3GP0CGewPEjaF7ob6lffKRWoW2j0
- uWSCajsRAoGBAPlfhqnINQUQ8PYSx1+WE4lm/QjYn9p843yzyN+q+2AX+EyipnNS
- bpeBrpoLA/dkPwgg6JV7daJpJTZBYgzv5bXSxgQ+UtWUPv8sCSJ2MQwkwTUpfGJJ
- hgZrXnfv6hp8H9eiqAb17423njqxXnni5zfiaXkp71nMMg4fTKID3PDfAoGBAP2L
- 1QI5TRreisUWaCDDvu/pKSgCuWmky+27Ly9o6fMIfHnwK9KtueKh0+vLGTZyeySs
- p9LK71DvxFKvIIqcmMuUuGm4isMKhUFVy8bYBgJgESRSKImFiXtPHolDGIfOySmE
- mHoLhnvI9DkWJWpsFxexJnR64DsBOZ6sZqqsccLFAoGBALdc20rqMLop69Q0mK8b
- TgBBXxtrFZd1L1yZYcG9Gptc5LGNA3FWkoUK0RTptp/o8UQL1plbr3Kdd8Q+LVev
- 6itY8UtbfFMZb3z3pzvUxlnUiNCLUa9/unHr7wmnum6BCHTpYD3GBsAg3NLxarOa
- +UMpUz7Ja/qOX9vsfc+/oWznAoGBAIzBt1RPuWWETGfT46Tk5rhLqcSDlql2ipwF
- AdIBHXgFqw0K71k7humxS3QowWt/rKuUimq0rJ0zLrt0a81n2E+U1bgjci2LRqUZ
- 21IdlWB2Mq4GSmjmUIe7ScmMDS8/9l9tNDT09wj7a9HRYJ4vOba2axHZMWiwamuT
- bD+uEk29AoGAbIAoQX/kPAEGCi2uhCrMMD4If7X8Tgw+wMN3gjRqtGJPpuaq25zn
- ZVBwXndiInw5UMOW4huaThSIE4T5NBJjc9i0W8Diuaod2W68/Cc6MKW0evM1wrS1
- nKJX+ljWFzmx5xKQ7Blp+me8kdcAHZ3iMQwMde53jRZC+rkICJ213cc=
+ MIIEowIBAAKCAQEAz4L3UTk5hgwiAA4OB0Ad+NDiNz3yK+28ILKaSK+s75S5tnVA
+ 1TZjy2+8w9Q5re10U+fv+f11JBlGsOhwAjS0SbqpGixDFwL7nHD2U7toTpHBr7jO
+ TzU370p8JON/YrjQ8UVtaUcBWdaBjDY9uRDt55FvEMkUc+QLfpwLCntkq6f5isfy
+ GFeGcDz7pk1g6abYiXB2Z8/fpVP5ZhVg4vlQJ4PeLPkh/ItZWbphZNrbZecPkLlt
+ 5aWGPQKmBN73Kg2rN3telTCu4Lznq4tvCE3rRY5n7j6PhFN85CJ1DfrkPAK/ID69
+ iINA4qK9YC3CpVA+wjiyV6vjiyi8yepRyFIUhwIDAQABAoIBAAMBPX2Sm4+iW1eu
+ 3GskdYql07DDF9+k+KVskKleyd1KRQosVnz/5aALhSs8xn0LRDT21dXD4s9cAlcL
+ dpvBkZ7DsjEr1OjfZS9Vv2tk+lSw7aISxgIFnkK7zGJoXO7cCEKGI9hza8SWQ5f5
+ LRmh8h/5TidrEf2/np79uXc0ZDfMFzGAWxv3EuifogAcSOEfh6BN8ChY83Ii4hh/
+ 9GeAd8rR3xeEV2yDvcbiRttuWL+z9mHlr3JgvCBdifYVgqJClRsmfDzJ+yxxH+Yh
+ vxUnY7BxCMUnH1Ofwc5iF5Vi7HkCCJbEAXkCherYBzpk27FtHQBZq+sTQ0Bzoiaa
+ cLAmunECgYEA+f5yx3KB+Ttij7P/Wqx6u3jve+N1L8b4WWCfpqcFlqGewQQeoyFK
+ QlSlE99QYbKjKgFauzcuil8JDKA5QpAmLG3L/04TqqqO4ce2cIgQTZsx23ugTHCD
+ rbkqNZChEgPebtse5hUgQeNgNUmAPnLFzKbl12dctTmWOR3Qwp3Zi2kCgYEA1H88
+ dDR8kMuAbI4l1U2EZFNAYcHUZ0e+kEWmCjqjQfFZZzz36kJB0hAg+OWFCB5v2Bwq
+ Ra6vfzZGqWkbIEviz4R3so8UZPDFiOxKR+bkGUKUVNPCjMolNNQim+Musq0UgbCY
+ 5gNwO90D7axeuUNRaVl0xbI3WqLM46RjH92/Um8CgYB5yIC1tIyok0tiYfdFfryT
+ U0im+5l82trk/3MGxlqslLM3qAAcy/zW71EzqxgHX/SoY9yFU05yzfUkl3ENghd2
+ kU5NYwWloEzWpGm1zDLU+4OAPmtKkY00Nf3f9kLg+c2EB263+xapwlB95P56bYL6
+ PVu+YXYCOrl5vZKTHD578QKBgQDJ6EfJ5qFBd4uEGiDKp0gXh58SA/lNVTc1oGgf
+ Kg47txaK6Lxrox8leNvLg1I/H6SIBGMKKOxqBGlpyQvUSSaupSCS0i6/pqMa8eG2
+ piWv9ro4S6l82wo1QyfLVTbm4Vwtyl3NmBDJYLy91V1/zP4LCsvQmQDNpwjleCoT
+ ekCzEwKBgDioKK9HnE0Z+MfvXJJZ2+sUS2ruEjUTp54DBdfIoZAqSXsmO5rMXyYF
+ oW1SyqKwfgadNPzxH4kc9W4gjmEDXo6nUKVpcWmBnvDjR0tbqBGwSroQ2mWQO5JP
+ 1T6FAfA7RIUH35r0faFuEpZqu9kUAr3mugB+wqWy5oiuqRdkEL1W
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node3
+ name: calico-etcd-master-2-peer
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpQIBAAKCAQEAmG6sxDuVQCgi0PKePzh9jvZQv8r7WL5bSRy9fOQRWzlVJpEg
- 1+N1ALjp4FugY0ySghHLgJbOjBFZC/mWZNWMucpS10DK9jdaxDMqi0MBmmFRAMOF
- mn9/2miQyuB4G76htUlGf8UA3hfWk92xzRrtGR1N+uWdBZOOhpqqiyeD+46bNLJV
- NZMJqk75/9H3WclbbZUt0M+pYN5A9AozZ1MJowloZHXc5cyw3XPuMI+WC58b2pUn
- C6wAp948q26OW7lxxwIIsIlZ104MHJx4goJd+kzivEyAMryihQiUXjOZ70oVmTdQ
- DNpCjITjANHzZWERuqSwfLZL2U0+Ee+X8x5oswIDAQABAoIBAQCXOtZ1KZf9utQv
- 8UVG+8i2GXIrljqf5Nu0QatNSQhfNRZh2QJ4rdXbDZobWUxauBFysizwOq5ZEK0D
- 0G+BQs0HVs+xdzrl5C1NEmZXG/dvLrWqyFC44135Vlywqtr+y7aroTMseEtQDN56
- fSx1jQ1GKWjATyXl7mss6C3jOSUcYOtdB8dG3eYWOLxswsOuQsgt+Vf9WmAzZgvi
- 20x1NVBCAa7HGd0bY4Dei1Te6Oq8O/aYvkslzmMTPc+EuHqphwh9mD87eofiNrE7
- m2Te31StkuzQAsK+QjD0VHV7h3PbFLLdDQIEpReoNI1agRHPwVHD+qawRoMDew9D
- adhd1FEBAoGBAMi+B9x2hIXPudd6slQ/jmzVg6dvSkNMMqEq0NJRWWkLMl8lj55/
- kXb+S6el+gXelaFXx4FaZ1mwMv0KmrqgBJiocWd/7M4ke750hN1YkZTaHGgkSR6w
- +QcbTMI+/B0LiZPD6tiQ9ZpHg+SU2X/eskovL/9R42qirLvFLD3xCc4TAoGBAMJk
- UlrUG8WfBkPm6Y2l9h1xvsGWKSKOy4jSB/Ih077FWNIO4M8861ibDs/NAahouxmy
- 9dLIDQn9omMBmuWZtqK0QZ0YonQ+zeFLYBjM6RIGOIhw/SYxMEM1bPliXebu9ozR
- sVO2IvGDVm0P7H8dNxC5qWjB8kk6SdDQi95lP87hAoGBAKDiDBLYuaU0slDL+Rgk
- R9VZ2cXbH72H2Bvq4KluoSXa32f6BnyU6NRhQej+0L7bgThpzW8SMTpkSLkcQp3H
- mWdvuFOm5vbfrn0ZjVKIpUSS+alNS3zZgPv9GSukpxHwKTbQEeu3Yd9f6YjM8vPU
- WzexUdpimszfy2hBwg9ymtUZAoGAGfZuLWVg5C8OFimUDfAZg+s6L/7PNadetcJf
- f05XSoZvC3cjPWqEgEwNWWGnFAgQ3SjSvjkrzKbMdm6zcnDqPKbYkJPGtsHgm3OG
- vSk5A8hC6q40kVJGgON0z4X8xqgp07r59RVBa4JAG8bhrkSHozs4zh4BLxiS3UnN
- NIHPWOECgYEAqSrXd1hAgXy7zWvM0odgHZgsisOBVc63RDQHx0XBJS5ptfgR0XtE
- //2NvrEUaX9K8zRecnQZo/oQ6SVTSQCSOkniMP1s7pnbUnoXedAsU7fT0rr1T46D
- QzrmI7RI8RO8FoFFVD0Z6jCO06ZXdBQVxBQV8Xn/h8EWMJp674u1vv8=
+ MIIEpQIBAAKCAQEAqZSh4sP9Mporz8OeNO2IfVvMj0b/haTJkEL5MqJV35YgHFoA
+ WB+CDgfus6UxGt0kAYm3LQxjoxC/jUIi+dLdMzZvBCSkkYpsGRnm5pVUztOXgUcy
+ nTdAsjXrf7pcKJq3dV8pS9TWacELpGwkJE/rsoNrSwCR6vqiSmLSKW8Cw10Cf7YH
+ X1n7pWZN4i/+Ro/qDxU44kSH2SEXcI3/C81La0fG6OWIXJCp9KX1wDKIJ+xYliJL
+ zgti2i6M7jxPO4cFftRtYmb6+wanN3CuAUfH9kcQi2nB73wLhoOl7IwWABLEGi7f
+ acbH1AWvxQGa7ZvYjV+uHNoSXmn4PYnA5KSuTQIDAQABAoIBAQCSTY4hEw+2AXa8
+ 57rtVOUFqhZgolM/HL1dPbq66X0GygFoFGnpnT1aF5Pj3yfvUkyHGyYyslafz4pD
+ N4TvXfHDBjpfK7HjcrXyLfucgcdKLRivyxoqswmY9pX3e3OZAGo40+HP748QbCE8
+ OKQxw9XIDEOb0KETRiqP3JQOdRzAKG10ypfa7Fov2w/G4qdobBytjGHrMDJf9cuL
+ RuscTzUKcYN4jLa+pYCCHYGG8afKprXSTsc71AcbDSFCmnqg1IrI5GMnPxy56DOA
+ 7162JwFF/9G30jWk8zl0D0KdiUpBsTnIP3xGt/NE16jkwIbIkah2fRPVrhhjUsMO
+ 9Vk681ytAoGBAMfoV7s3wzvYEWiouFbnd4nFf/BOBCjX4SoDCLARNilKCZ8LN0GG
+ br977TpaYuf87A9Go79M4GZtkG2SrAcHV682bCXau/8VimTF7K++8xFCxiqTYc2O
+ lfTLNkzG+PrGmwHo/YauRKJ4KAnwJqeW4TMzmC5gGdF5dqGDX2cYf3ozAoGBANkp
+ 22BfekrOQQ+vdP183McYOyc65/OuCysmIEV6jzsdfvKEEozRvVCDiJ4u2mcaqI5F
+ i1ZNBXcjSmrvXwPl0s1JYB/1qY/5cHHoFAVC1bN36N+Yc7BXGNCv4U0LkWn3MHfM
+ 04fRycGCvIB0GxG5QjWSCtxGeXnzSyf1HAwE+7V/AoGBAI5zvdi2gtQpQzaOTFX5
+ OZCegW3PWl10gIo8gTtd+Hdxv+tqxaRW1KJ0//Z+JE7mR50XHGactKeo2auLQjT8
+ AXrk0ColdaPvSKBI/kG6U2FwcOA0CBS/z5ISIQ6TFyc00Y6J5efMVTJlZzq1vAXe
+ mXmwAXjCmINSB7xObnR725NLAoGBALf1ORyeRJ3xsjNzUgsZJnyRDirhP3Owz00x
+ 8sxoUcSl68/MCVq4oUH+6k/1KJWGg5phVvM4M5UElBmZxEcs/DFiIsdv9r87cgFL
+ swnx380zmlUuc3HBlgfRtWzqi7fT6X7SR64aDGqcMMovkG6nHGr8165ZFLY1Xkju
+ 3V9hKUhJAoGAFlwX5cgWOVLUxZN/MsWxWFSiMM0iNJYj06pFd10ychoJy/F39jS9
+ vP3YRwn9uX9WWxEQA8EexaErBUe1Sw1bqdDEj6qzW3FZ97O/YmcpwrVeLvWfnGpR
+ MTdwbme40Aw/n6pAWBLSkCc1lIXo9JQEAYRqqBpk9nw0QogxokpWBLA=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-node
+ name: apiserver-proxy
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEowIBAAKCAQEA0FdwcgJFYkRLddOfFAv2qO2B7+6MyvA4r6PkgpPzcqTunu7r
- LXmm+iWkrGktTZXR5GVO8OgAqkMdYySylfwofU0jEc8r5+1vg7qSNNf0lt52ctwb
- U+SZIZeg1FL6ASAJYpSpP8ACqLfwnCuY4gydbj8H7BRCwcnVslcqwc2fPzAgGIX7
- Jxl5D+Ex3gN/iMFdZvYPpQgL06iaf88c97lArkJDJjtkDTHHE5P/mMgQzKpk94FQ
- Kl/KZDkvzQs6wvQZ4vNm8OakloPaD7vOohGDsDh/suGx66OrIGJc+UWqEGIN15AH
- M87VFK6tNzd6592L9Nf0ZYES4/jaHc7fCRIJxwIDAQABAoIBAQCIPSWi6ClHITHX
- UxNroIcj4Gxf4bbf3kazVJFRcj54cbI47DOOAUdXvNX6iKy/V4FxwW3ly1DkBg9p
- jc3alpJDnfWY58jmWTXbBl4lgDLJlaAPbC/SpGIevXDGZ5xkr/ZzKJOkxIL4oZAO
- D9Rhva4VMdKUZotg/gNoI+gp47SHNFraDtmcluIw0/OnnONkR7HDf0HKlZDcyZ5N
- 1apB91/ujkdwGVzFgrgYLOIeVJkjXiUBg9g7er6T/uW94A/6LrnkEONx/JhAGk2L
- 8Y8Y46b66icBlpTI1Xa1TJ4Fq3qGNBG30q7tUdRR7RFYUEgRpVFXWHtg1DVR6wLA
- 0bCG8iUBAoGBAPL1lEDrUmL1FERNCAHi30fy0PwyMdDt5m2gm0J/kFLeKUxJUdeG
- q2cGsU+EMK52flAtK2Au1GBj0Mc5gX24o2mq4EzSYAZ8VkNENIhg1biMBeMiQc5Y
- yOudCbmvAdeLq1u1YEHnGyn6HcwqsLg+NGgxiVl4MDas/z4st9H7gYexAoGBANuG
- MIv0SLHMraXc9kOUIqgw/yYG731CyWurI0U61pQ5DO8JEEaeU4sKzQazZfl9dUpE
- YYoaTV9+6ugwfJwNnswcSxCLYvRU2K8U76AIot91t5gM73cxsCv5pjnCurezB1CG
- /iyd/A6r4XpSDFNOKZNqXOCkTGETj+wPK38F/373AoGAeby/ij/fSiJPA2ItrvRE
- uMJcIOHtwChUG34sDYfpgvw6aTUbwwiBfeAGnDc6RVCuPfJEF6+fTqT1Cb4wuhP4
- HYw3U4beAqHuf0n/oI4UyKGwmXyiyIgINLa9FsMwAxbCx/L7xknMfJ4MrC5/2fGh
- RMv9bE0iq2LHihnSCW8iGiECgYAzoY4NfLkUSGWXGy84mcDE+jEoin0NYwXosumq
- wLnzRq/KEMGpOle/3hx2tP8I/P73JroiNyl3imxJjA3izjlJHGZzT7VIbiRAmZX6
- d82G7TLvKiuwRxl+XktATpKH3i2cPQPPDqFX+gkgMegAN+QDbgLGOx5Tvrwc8zxx
- tcFv5QKBgBgMzClSjp0iWkbdNNoUA/tdVSeGgZROOIQrM7AXd3ZApF5qXGp0h6Oj
- iyfiISdUtuPD0xtjSQnsH3c6DS2c1lvCmqzc74BRb6O6CH4XOXhLhwCfEDSZku7d
- Zc5ec3j1XNop6fZAXq2AfueTKIH4Y1NDv+rnKNBpOEBepTpR+YTg
+ MIIEpQIBAAKCAQEA4WuGrnZnZ1DcN2BXa3zUUL8RAsXEwEjus6ITyVVwSTOIPvKI
+ w1iAjFLDBt1ywOQcWaz/sbe1mkoTitoQDFvEQilMBHqcOtu9TActSa0Chnh07Qm/
+ 2fsF9iUg2FinQl/UdWIVHPywjrL0ceL5v45ECN40zTXgsPEBGmXfm/aSwq6VuTWG
+ IBnbrShFscGcDseLzhChIMUphgGeqs/9HFbu73D2BAjwae9CeSMxlA7BZ3v1OCK1
+ 66yUK3+1eNXcGt//Y93MbpmMg5uUWRcuIzzh+YZIMmXnTxuwshMqcgVwBhbrizjN
+ x7Qafkc0jiYXsZ+Og95ICsK4LPisLMlQPwn+oQIDAQABAoIBAQC41Tr8yHdm/qVi
+ /qsPpq5Mey5OkK0QYXzga/A/cL/+NbPssV+0lVfqN15UvbV/NkuMuE58gT72APFf
+ NAheqcwV19jN/18k39KqiWP3+lWMvy5Ywlq+OJcdyjnRS3fx87O4gDEBsKxwhYnr
+ 7AmOqO9eOh0feqL/Us3twESGlLqnx4dVh27i0hVRXaibP5AyadghDi7Vl3pjtcdA
+ tTz4/6h+jsCSs8eCtLZZ5REgihNwvChFrz4nEgF6vJ6k8LdnPCNRC7UL9T+7vTiS
+ z1FyyY7Q/cUJxyn685lY6Ngerqdpv+rzdxaJP+Q4DMZjHo5jzGA4lwfgBodwGzPe
+ c5sH/Rs1AoGBAPTf/wDGw6yKPq1KM667241fPZifxK2DIonr3mZRbfx20js3IcXU
+ zhocSE8iyspQ8xJUPd3YPmIqj73MfwgqxBAgdvZLULynibNqzsAC2h0/nw0Rc9Pa
+ zvPWoyLTsRj48K3nq5ODfsvvHruyGhXwt6mB2t/MRAJ6fCcWHEG3tKJLAoGBAOup
+ Qp6MjJerYDBmB3U3Krt//zNEIapVvBD0ywCrjPjdBNqMx1UpDIPmI+zagTmOMoVO
+ 3aWBUc8jhyPNvzphydvZbrTA81HYCPWEATBe+q7WiCDUQTOTtxdhEygT1Ut1cd6q
+ +AyrTERP75MCZGPNpodFzsrArpvm9oPaAntCD29DAoGBAJ7PUqsnPSn+Mm3ibKhK
+ 7zW9ac4896nsHQ9DqGXFM8aDLQ74T2/k9pGafA7OqqQRYcMmXUUuBC9YGQbnxA8A
+ 5UzsMRrEd6USJsz0XQfMEbbcVwN7qRnhk0wyjHR+xCFE+ZpfYDf4FNifyNfDxwUp
+ q4NEUzXHXOgalcAnp8W7JWwHAoGBAMP2hvhSxaJlluIIJdF542XxZORblmcPTgkH
+ ljtjbCGRoLSf9i3Bqa+Q03TkqiqTLT2fPD6hT8cgswK513eT04imwSE7hdob/C80
+ 6swvXuO+b4plFibugYTGa2ibPXW3Hs5be1MFqrDvi7fCeHppiz3XdcMyAMCRiZJQ
+ 2llmsHEDAoGAK3kp6MHQYJ5X1AVh1s7KK55mLYOeH3NRgfFqFyGzF9QXwYv3rhHd
+ VwNqZRP4nc7vGEWV/r4ksw+6+HEQ2HqpyhsBRNNJRfHsGRI0cIFBiLXAEpiEkx4S
+ q74yFNUOXOXqfSmvX3Hnjhll1PYZO00WlUIQTt6pGpv0ASEO6tH/xVE=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node1-peer
+ name: cnx-api
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpQIBAAKCAQEA4+lsZNA4n+9Rd9qk/yYx32Qgq9He67r2blY6BhGbffo1nA+K
- tQ7mhSnwYVO11ktp359CUpADwCiX4+QuS1eBUUXGjulBb0YBjMlY5Kz25bTHjF4h
- kpkSaiXkvvRnfMZLn6ezY1Sdi9EgYSYcHgjKg2CZFvS9OkSJC4NSNMYo43PS6jzj
- BIQ5ekucdH4LmGbKgz9y3cC2l0vXj4ZtWufmQjYudULIiJ0qliQUzHPMZFGxO/+n
- i2i/a2qYubqyHmlirPrXBhm1bKkUEdPiBjndwdrN/TSQQsPZNleAezKJLfNwl3Fj
- zZ/8KBmKKAFvLM3VedMa/T8wDbJU+wXueyqBMQIDAQABAoIBAQCvOP0/HN8MB2Cp
- Nw53pBPf3glIUFiE//8KoXyGwe68Eiw5SbGotkYAx1eqXEOG9//0D2tcMqDPkeYF
- LZ9yCVrA81ZO9YJ7XGVAqmSPm3NO84gfoRdKsCj6NxwAu8L8qS/nFXXTvnBJ2IR+
- bGBdrwCTtSa+AXeiXqLGmTYQoPE6vJRV5G7NxO2mmMemAI0sBvH3ri6FtF9da1nm
- vJWJzDzptjNdd0CE6Wv/y60j33dbWGjABgcuZv9FgeVNQcpxW4eY+bHW2pto7Mp0
- o7wEQPWHgesE5YAam2zN22T/1eImaEdahgbwrq7VuVa96fCq18kIQFFFDQzH5zsi
- emyiySSBAoGBAPKIe4Teu1xG+amodjFV6KEpjGQxmOyG0R8L7rG+LqT+ObVtmsvw
- 2oCtgsYJSmmgFcTsDAGz59e/t61rlj8VKSYbIZVw4N7ORWqHZk4mZGF0obuFaSYz
- AyVjb4F4QIe0ZHe0kkIRnIyl9jga+LOHeScHqZO1LTwpRUMgRtESGa/5AoGBAPCR
- GrHGsbV2B0zn2hwFueQjCik+2myJ2wFCmNGZkIYZpcTY0Yb2O4+s8VsKMBYQIcRL
- PjUJRh893e3Mk7hKnDQ24DkN+DBwZag2ZBqOPeq8K2mO+G9gH3Olqn57YCWbm5BH
- dCyK7150h+B6ohaT3FvvF3aw3/A6spRkKdie5xj5AoGBAJXGY0Eyq1HZIuT6+8KL
- 4xVjqydU2bN3rj0WCVoKsJODy++WuDmpi8ZbYJ8brbB9A/SQMPn8N/islKmr/yUF
- 1FuL9blr8/KkP4oCA9PPMb5dYGOFh+HnLtIwDfROZstnQ4QJJylV5u+UrfEH9v4n
- c1H/EWH+SOkWM4e4rwL9wo9BAoGBAM8Y6/Uti2EfOcuwMWk8WLqYm6/ERz93Mg2U
- qoCOhgeb3sRmr4JTShU3GhR44cqsmpUk/WmlETPmC78jBex6dpzQvRkA+K+iozE7
- mdPurkj9MxZNmXwwMQNbFDqMtcnKexKrIM0T0lvrT+olSJLNOb//RaDNRgvGTGRJ
- EmlE6sfpAoGAaFy8xWaO0A6geRMg+z9ZKWbeVRC4fVPP249MGeM0FIiiVpMcmZ3Q
- rES9kUc5z8AJboF1454CVsg/niRDZTnLSPkSaa2g5KjmE8JleSlsYHqKFyxK75Ae
- o4sORykMSWETefBQWw5XsnfBu18oMzXkcRJIXN+q0I75wNEioiXLSNc=
+ MIIEpAIBAAKCAQEA106EICkFOviOuRFXNVY7CLL8zUZfhYJbhgkEN1oo2ohpBAY6
+ LbXMN7IGDmTUG4FnDYkRgSBO98iqJG4/zeu4Ha7ByRUURNn1TQS2DfWBG5mKyVP5
+ 3j0Yw9RHOlKO3hAL9U7PG75im3LTHdFZxtSUAtvM6tdHL9kgs/fLFi/tCwmWv9ea
+ yOS5MsmzU9LhB7GpeBK/Hmf2k1HI9R0zjNQHbSPUYWcYblvPIGcjAaiG7JdbPOXM
+ PoDf2UezTcOphR9zn/JIuaZV363AThzopqf44QWPVIB28CiFE9SINXdc+uriR49c
+ RUfjpiQpbiqYhpPg9kkSJB5uAdpbuPXm8uhrBQIDAQABAoIBABB/pcRJIGt6bIVl
+ /MbLis6J2LFqORuj95t3yWjsccD9Pv7d80tZaQLDk486zr4k1l7FKCA695IpQFB2
+ WlFPRNaRc6wS/3CfOxrhx4meTHxu8aGn27fZ+rHW7HZdqTD/DcuIdHptxmSfEepx
+ Bm4kEAuACF3ejUfvXYAs9tUGayWzPFQzFi4KkKYWmc5Dh0D6V6v7T3pM2lurai09
+ D1ao4ODJu6QcYnj+3wWVP34CwImVVEf6n4z7NDosPhOoY/CW+lkpDyuQIu9Z+8rA
+ z1msCLOcaZSfUpRUM2qBwubLeKObNWX6zpAseVIQqDMNj8z4mKHQ3m71FsG+Y9dS
+ ulDN4gECgYEA2jYn9vGlbNHYoMS2u42s4rjMLpnbBmip1lbh19F3j7H2wxIpHv6z
+ cO0OknAUKLMXuvuDVevYksNXmdPr5XYtf66R6k1A5Hz6FnUm806Uzj9G0cuVRM6y
+ n27Y8uVKjCdva5tRHL02kbJT1GMPNnt0DH7H28FmLV5o1Zt5fGO2uEUCgYEA/JeU
+ zrRxoI6neA79sAC3kOZ6E9nd9LpRMeWI6ffoxsKwdguloRNs09RQQHj/L2lsKQHs
+ u3dSS2JgpCKMcbvO1XPNcKQY2h2iRf/gIrAXH6OgGB3s+D11GC0hO8WAi/Q3aSeY
+ CikzMZs4GvIkG3dGSS4gCj/gb5h557KCjT8m88ECgYEAw2x+7CzL7yIcNRcXY+7k
+ 54OC8TU/L4UqnVfgGQ1yW1GRYnBwPV7zy22ygDk6BJ0n4oB/xcJbikzBtnVRrYXi
+ B5iK+2BGfpriypwOzxYQNIn83cTKoP3QgPKf/yCUW+KxaZiG0wstxNwFMY+pvyxe
+ 6RXd3ZRd8sG7d5ou+dS/flUCgYEAoEDfRSFQMcgv0cjZBI//5muDKhMAcaK/nsN8
+ 0MvbIDcm003iYEY9tksuOylI5WCiIYY6FlnGmVMp8xiEOCgqOlxFC+Dgb4l7iaOk
+ JP3JPeaGzKY30OrU3mjLe+t6+dAQU6OuH0wyUZejydy0McTDj+w2oaoTD1oShYBI
+ uapGYUECgYA3EVLDHRpHuUo4Sq2s5aS8e9oDVg51YZYBlaaxakCKSDq1bUWJPzOD
+ tP3P5JxBnjjl9KWmlTcvfTo9je+jqKHz0IDQPXVz6Au5lQoMDecIyYcnWn1eXic1
+ F9xQxmE6rDWK6IVV2PyWKbpdbmmxRjuoCHIVtbs+fNXa2jrNf+GtXg==
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node2-peer
+ name: keystone-webhook-server
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEogIBAAKCAQEA5jO2dA0/98tgDrwtgiy1gC24wC0s3xP/dmiWY6t0ma5Ts9R6
- lWRKjn3bVdI1QQr93F1RghCztc796WNGWJnDY79mV+b+91mj67mqlYLy6/piiq5Z
- KLbTqph+LuEWv7mquV5sH358S0qjDxlxmNvtWvF/hSX5LVC6Roj63kAcsloxWlKT
- DevJeyESrHRaRyJO3uHZWD7Tu1pqiXQ9pprDhylC3QMXdUj2Bj9kPy/2zholCXfG
- RLjbPhkBP8ppGZyOIj+BAFo1iN5mU1Bc6N+/cDUe7dOzZnTkJgqiiCSKBi4cT7x3
- WFvvcNb1EYv+IiWNsSDFC9gvWOhyHdL9ta0v9wIDAQABAoIBABg+Xfq+4nvASW+D
- 1e8dske7iPeESnN78a2QujXo+rCssVgBCp/tHgT/sDfLmZwuAipREaJ3C9Yb5JXN
- xLzUBMXehHLBexylriPHO/XfAqJjjjk4v18QUh5nTPK29eRfM2GuVgjDE2gChkWy
- 0knc75RiVqG5LBLfq55+Ep2RdvQ5ZE28jE+M0b+u+EL54rUTcWZqu6JQ367JlEtJ
- Eklh4YKC+v3SV7W/NQNKizSicntM9cob39/A2ByKxelqxMK3dbYlo/HHw88tzd3X
- ZCBHciFXpB8P6TOvMvWbVgB0Iw6VOwMo98Y7Da4njJ+I1Dp0EoDpG8BudtGc/KpO
- 4Rx2fsECgYEA69a7f/jv/Hgfj/DXo4JLMo4l8ZrMFhjn6d3MdVrfUzE5nwyYcCb4
- /DEaNLE79uQ2L23MllPznFQGXcbmX6yqJhn7ksgq2ARCVLWw1wOVfDacLEkEXun4
- S+UAh0KNdT3hVchMsJ573iN648Ls7Iky8o5SF62EIIFdp1kyKzOH+bECgYEA+eGe
- 3KESAc9sVXv1hVQUN+qB0b5RzeSR/VZezcS3QGZi3K53Wx5IdJWWlzdldK870uz7
- 5bLgZrLGXP4rZIoXji0VV1sinw8x4F9WmprA8AnVRvZChiDulnGeCevTVaoY8A5f
- kfBLMFbiKKJRe9oRWxS6LbgnbbeTwfd1mJjcBicCgYBCvhN0JQwtxAUSpFMyh+Ym
- GYptdKR7QHMpgUaik6QOFCk9dMATRURDgtXqwZm5xl37UDSM+pc/z5u5oFeEDgZd
- IA9NO+68EYCAHqc8QlxkucO62LMu9UH6oIVkwhXsbyW9NCFX/pIJjLrziC+qxS0w
- 7cwXvVheJp5NhPWouj2qEQKBgFwSekqpPs1T9IL7Ddh2xoxj6Dm0esf2tKQ4Mu52
- 0V71WvAdiPUWD3SFuds2GjgIaW6qy5YzduPgc57IOIzvJQbKLdbmSbd6DdKyzmJh
- Kz5HIULoclKhx8e/TZAySMiDyHSLl0Na2xmQqfx28rdD/qkk1gUKmdyfi94opDf5
- +vh5AoGALpHGKbOsezTQ5Q7i5sfJdWZINNy2VfMsemsrsFo2glUIdphMRl9+6J5C
- SgOQUweMO4UrFStviYjMQ/OYjhAHVT1kDqBTfvjUXgndojjf55LeZYkTX36PZ8at
- GyFXzTpJ5kretXahQF47L8bTSvkAcYvnFKsmq95pd52G+oYgKEE=
+ MIIEowIBAAKCAQEA44t8vVujK3ibRtjfFdcE5PjwWDQ7f8ivj2Ylr6aH3lEZ0M1l
+ KRfRy1q7OzMu93i5cvC5e600hio1sYh1USS6FL4Yn6MoRZaU87A+WM/AKGjI3fOc
+ frw4eM/TppMfr6/XWGBm1l9oFO/L1HCWOe+hqMhSZhEZWG5ad7oEJDbK+6jLyIne
+ m5qcTQ8bekKNqDWUzSVBKQ3pP6J6r+Sf+iL3zYCMrnG7zswyz/u/zwoT2GrcIdTV
+ u4LYGHhv8MvYG2GfPJRrT/h5VJNmRwnzaBGKEDDPrFCBHGeEG1f5c23iApJTn+DZ
+ k4CNMrit38d+4AO4HFhAbepyWeUOo0gPcSsuQQIDAQABAoIBAHjihO2Qfno8w7l6
+ w+G1brs6aW1iqm1zr5kuOj076pi4W0+rnt+a8PDpDekggwYkE9m1e8TxuqLAT/A2
+ P6VRLq6QY0KECoQVwKJJ8oV6MWsGaBhKMMy/r/y25IltRfsvHuerp1aiLwhYcOA2
+ xAiZfzfM3MGuudlaHyPWJhcbKPFStiE9n5a+iR6YhrTZ3BoAx5D6PJPPpA0xZjec
+ HrwpqVdxbDZULVC1qrzU90Bw0XA6pwE5gqX4OkIagNAQvic192yWn6GrOgmQGNmJ
+ GIhnYw7Wt44P7fn+ovAZHX7uP5DjwGUsBAFBzNXYAyU6eSwHihlfCLocluNIwBGA
+ XL3hywECgYEA9HTOuDyu0hDR4gxafCfCSJXL9mWT76ZX/CHJTT0Dz/VPUYQWQyA2
+ 6FBg53CybNTbk+YpHo1Z294IAUwFXhXXOs4MH4b1tktIqWBPbuXBMUHAb+bMaFOr
+ 8CB9/zvus7fdy5ik4KuDzb4xdiM71ryd1BUIkKhohf9rxYvtd2TAF/ECgYEA7ko9
+ kQbbQxV0w78AwlnC3WIIaG52bLT+Jd+uy1uz1Nxe0hE+sCbb+DIYNWgv60xhZj9y
+ P18UJz8ljXgvK6n4BFATuWengmDAbhUtGiBF7Lg4fY8f0etHWLnniA7WjLbtfalW
+ Pgb3PXCB4xcRWxt9FI6m6UxW7Kumi9wJRz9gS1ECgYBklK79hRJVIlCJFpYgYWeB
+ 4AiEv/SndSTce7ZMzl8EMKXLH3LdeaK94VyNvYPcXZRe/SNMC9K+MVPP3MyUkp30
+ 9xRr4Ga287DY5+Sm92eO8cPRBwBxqIOlEGlnG+yyC2P5wjuMqWVYwPmu5v5W81Jp
+ EaJtiq0+/QIFzPYO2uhisQKBgQCoThWYJqCdjD0RuQm/PAkPtps7r7HDbD8J3yil
+ h9rHoPL0Kqv9XSUG89L3feRCrIsq3etC6VPhuI88kcO3cnC0Ex8rWBQPWWjxF9Ho
+ Xx0kaqWzwXB3I1gcSgpHpjtR3i52EDHS07azVZDYJcXjdNHuwCcSJxJKTZ7vr/V5
+ tkC8UQKBgHn1rmh3V8UcXikssesgIz/V85e+PquM2Y+E6Eo8ztWNYpXo+WMRVmIt
+ Y8hwwCEmotqEewRi+90fGsnJ5KpzkLRq9HNRTo/TBCcDrmv7UG5kcoDD0tSRcfSy
+ sEe981/ty+Q0xg2im8t25vYcE+aYPSvnCS9E67nkdMynArWI2Ym4
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-etcd-pod15-node3-peer
+ name: apiserver-webhook-server
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAsHi7aYU3sxlIsVQDmhvZXt2gmTuKs07xIqY+iSoFaameLZj1
- vz4yHXphsahvly6Fh/HUeWA8P8idCjcMKWETam5NtES1vrolZnxqE50w2fVzbFMX
- xWr3nQeFWZNYqYJUSciVEzni9XmNm2BU8Lb+Lj0caITkZwb8x2hXVtlpic9fQPQg
- jElYB30fe4mvvDe3dd9jxa6amfLPAdnY2Q9leIoPx2QiFmx5zhx1yImnq+gDVZi6
- Fl1pncl80SNt6K+/Ls4/S9KxDmh3bkVFqcv0/xp3ivAhdKsT+XfXh17gsv2rJTT1
- a7wM9smPZih/Fwbpj52Ivy2oSBDqCJ8C6BHq/wIDAQABAoIBAGI4EDc+yi2ImQj5
- dbfEYEuIluYyWZRLD7L1TEETfke8/CjsxXpXp5T4lH9I/DLs1a1AT73ubhoiEiWp
- Vb+CJEhMdDstMuqguEg+Xtvj1Vi6YC+eX9ClJIPlt7aPZ/2QaFFYroAw670slkAw
- cZY4g2hA4xrZPDaLkQ17aYERKMhmEbzLOFDDj/jzq9Elx/MAewOjs5te5JYpPHii
- gLMjfy3CNaejGi26+mcHe/eGHeRpW8Fgg/0EGk7ESYb8nhVB4oljTLny9jWlIlXd
- V87nMlhqCtky0UUYAu2MjRKys0IfPL/npCZ2be/NtJNn9is7cmQnXq6YhPZF4ewo
- J3Xh8iECgYEA43u8ETzt3qGRq3aGQPLnmeTKFmf2qv3IepSl5dbZ+bZ3YTSkyZ9x
- 4BI5fq+6Yv35/AfUraLY1IXblYX8Bq54TuhW+e6x2efcsHe9O+aT4ttrb83SZXmB
- 9QK/szlk4GT802xCX+b3olD7jkZym7Y/oXPXgsdxdOfKh4d2NGu1EK0CgYEAxpf1
- SzfqwUMVVUYMRKSXEg5MhxApoglF9qYWJ3dNA6dWZhM7wOQ0LYaIvq034ynLVC1e
- DIZTiw0aV2Upq26oWcP/IXMHEW0no9mz0hdyHhnwh8ISy+Y1gEhjV5mF9fCdN/at
- jTG1XdSiJrv2Y7Tf4/lX5m164Ji11Y/+3ioZI9sCgYEAuu5MxuWImm+uYnXNMMXq
- Z13Ias0Xt78/5OsNwGbjS/4S73/xAfXR/806Dc6dnQcTS3Wr4Nt2zn0IykAFr//i
- wQTPpCXvZB7SDPj4OabqU3r3ODKr99L3ZbzShpZdPL//ukS17lS/nVRqwqlFOIt0
- klm8+KynoOdwWBqKmd0ANykCgYAw/8lL9836RTz8Pz5DqYCEufZz1K8RBcy3YJ9S
- uYLNBfqxUMmLfELLgMg4k7CYYfWDHXZ5DKOMSX1YVuODIthy3YMTk7gIuq/vI4XU
- rmg/uRK5zE6q9G/66OFp+b0tw2JnLnv/vGYNcqtXd0UBsN0U+K6Rci3BQKyMtuyh
- kC2HxQKBgQCEEUFt6EMqgXucPbIu7aw3XoocU0oyVpl3LTVQYGdB6VSR0KcqrsZD
- ElIwqL9eCeZ5erKkJqvahBPUp5Py/WRkHGo/ARd9THbaE+MXHGZw8DDSUkrYryQm
- nGXgNPr/exxw13gBTmy3T8sYkG8HuUL2ak/FsUNZH7NJJDV/3zWGoA==
+ MIIEpQIBAAKCAQEAq9M8H/g4JQpjeLOU03JZ2sJ36uGNS3Aiy8Ki369qgdDD+KY5
+ sNCuXVHi4HkrVpHxN1AwDZ2sAVQG06E7s6bVNiFfsUWOwJz4BRvmZLsWvPLXXFvo
+ I1mOk4dssHXGEHLMAXYQhnvN4O+3WkVfbY9+2NEqlWjnmQSZUyZ1L5pF4GCR2VoO
+ rn7HRuGYtaCnUHMzmS8B+qxd2OjiWFzLj3Gqd6Ya+eXUiG5o9QF1OVYeYNGd4Vgr
+ EbV4NWjRjUJW7e6MkTcNXIV0RrE6Ysc7kByIvH3NjoRAH2HaCOVK6/Qx5DntiFED
+ 0G/a0O/FOZVzMcaqFiZ77k3tSHTOdiexJ0F5PQIDAQABAoIBAGPSkmmYUTXjtSpY
+ WiwFkQIwXG6OnwGmofByoSEGzf+hA1kfaQC6G7KHciErA+yFWPfjlCc05MrYwCaO
+ 0xpp4BBUjz1zxZ1NFCITtWPr9SfMhSVZF6IB030N/iz+HxVLPA3VQ4B9yHvXiFPf
+ XbNO3EimK/ElQvd43oKaIxaGr/XL8KzKYUuuyL69Y/I0KAmFgocTL6UXgRZdFY8n
+ dta4CZz3PBrZUWUXOS43fW/aay6yfsd5ykpentnXwVU/ky5KU457Y3WAX6Jiz93E
+ LKYaG5WZc/HOJlTyqifrGMWedou6cIl9evENjocR7dA3tpC2XY8cqpgnt5fhS/J/
+ uvt3scECgYEAx0WWHICBCdo2Ppyv2fPSoyCURQLqkl1JKz4l/+d4iCTaP2wyeo3H
+ 0+BVWpbwyXL1UZxrf6tWIxZ5FHfoko7+Cb1+/KkEqKhRIT8Z0APgcJWa646ktHRf
+ mj+81wUPz/yk+HEgEyg4AUOia5wEf/n0sUrchf3xGi6MMifXyt4cMRkCgYEA3L1n
+ vGcWtYVDjz6iHoh4FkiBMk8M6U9ynORBfIDBH34hxDi3XuJ7PT7W0MxvBTtVb75y
+ GN/409Vf5XIvohgWg8NOhCfI5KqOSeVm27mWi1haRdNEahGbQsRnErZI2PsdTL3p
+ wnKquJ1lTrxIkgRFCk5mhnCwoZA2tvyzj/wuWcUCgYEAuyI9Iw0GoSL8N/ZbKhnQ
+ YIMS2nAvqz3RnbtiYhyU032QO2k3SmHlG7MbVNRU0UmU2YxEY4Oag57yG+ezUBba
+ uHjtTQbIqj5O2iLw8akCV5gXAUlWoWR791YN1/sX62E951YNIhBt77n9SIMesrQg
+ N3Ku/2IHzmeSHvPNseS9otkCgYEA18uej1Pkon5uZqpfiSP26inljA413BycOn72
+ +kVRB32iexbLRUp6GozFKwjAfEfeJUj0eBb1RfoyLrgrkvajhBq6Nn5CajHGur02
+ ihXr87vjPKHmHx+pPmONNIDZxK3xneWHkl3RQnw03v04oO7lo8azejjOpJO8ubVf
+ waJSmdUCgYEArm2Ozk9XR+hVHeYv5E/IimdFfwVgxuZkZIXkhiZjPHtjrw18AtF1
+ QWWHgZySN4QOuLcw+iZRTvg3ZWcFZbuqjtYKZkXZtdvyEETPR+jmFmmUQHKTG1ci
+ yhy5VXFlEUhWoy/8uZyf16vrVvR9g9GUD24/WavfbfhFS3T44ixXMfw=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
abstract: false
layer: site
- name: calico-node-peer
+ name: kubelet-pod15-node1
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEpgIBAAKCAQEAtYlmUOkhZYQezblPk0bgoiFTsQA2xYXrCNBnYS6YrLNLXR8D
+ iTczCGDgeSZGMnHwPjp9bUOxee+P9vKQfeXjH/hQ7ZUESKbkHwfSQ+n10kjujCG3
+ CRToyByu+PJrSxIcbggQk1L9GZ+fJaY5aiS2Wtuzs+psPn94iNyFS1puMwS2PIPI
+ zdSRvJ9TBkd30iBGIBMX6dfCfyfCMeDZMMOnbXV3utTLo0OOCqIJLuwHki/kO/up
+ Udc9X82se0dI00LcwvzRCX0jh8PPQy5HvhEYiw/spDoeTw3UchQvwlJn8HSux6LK
+ V18BCBXeOnjQArPrip4guAFNf52tehthTO54mQIDAQABAoIBAQCFMplmCIg+iiBn
+ 5e4jK8AqdbWIi5WkfEwlnXQc9CmFndBQNS9NALlrDlnlylV7MeqKXjQldaPEyieh
+ k/y8w25QyMvoZoxMGlgLBJwcxI9fia+uFhbMjRD3s0QW2Rgsbs95VGWFE0EuCdal
+ sz8xSFqcc9N40So2+SShltwem+17dF5JlUjjLnTmCMw93bzflx9lO0l5uwSuuxSi
+ KIevn7pSmOG+f/QdWbJogtMFW0lS30p/qlY6VSmn8yiGp5mXPNbwD6b33TkPjAOX
+ l5k4/V5NLwftjW+EMUCodJkG/kFqEA9QpilSxNJBjL9BfxxhJxdPCW3wv/125VM6
+ w6K1KKZ5AoGBAOkP+muXg3aZOuqNxSVZCU2EVZ6yzfiYGeoimS4f8RI8B4ORTmaw
+ v3WOBiWNBAa7kF/8PhJz3DZ0iUsAahW+2GSU8H0ktdl/trg1YfE1n9w3et6XdjJa
+ o2ru8HtrKsBmFQo+HWwYXjhAg8loPihEKYnwCzhIRV0U39+hVCuNN4gvAoGBAMdn
+ OnaE3hnY5z6EBOvrQ4weQTDplcU1U2W9leAnXd07olaMmjeEjHdH+KoEcrSvm2j0
+ QWAHSSt0o1KjYKHPas8qd6kb4PSiOPZz/Me8KkisvPILKTIlSLVACBvQ3w6YyxHP
+ Q/XMh7HHX6ZqQOJ/DUJMmP5AnnG0t3fVyBX7nxG3AoGBAJClDARuenbGztv3tN1j
+ DvT/JqxhyJd6vsqjQnJv/IwWmYs8SW5OT+VDiekQRelvy0DnKhcFtSxO006rKSvp
+ 0B9MmJzyhbJBI0PcTbcIUvi3rhgr5H2H51hchv/yGQxjzrcWqegGj6NV1vTPL5SK
+ CUXEpxH9OJ92byM52yVUdZydAoGBAIO8Vipw007eNr/ddmbqUgDjCAypdVIJTeSc
+ YMTrHR8Iw9JMJ6JgBnDTcpvYPnPSxGiNXhd0GMoFz9TLrQ6ZuqXNF6r4iSD1f46K
+ yEioroK+5EFAUGIZsbRU7kZ6MrMxDI/ij7J3AnrYDgAimGVKrNbNRhJLXKIgU0lv
+ SjYDu253AoGBALqu0qu6F6JXnlNhXbrlHz42KH9gA3TPOvFYEg1WTpe5RKBn2MTa
+ NrKZdIhvwccpzoE5Hc3GXd2axlQQ2mY7CeN66F4UDKiXdXmX8UcjMNIuoMU0Xu/q
+ 4jOiqmFR9KytnTQZdwkDOjLnkwsSmiiExnp7CcgsE9lyZGtIo4exQXny
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubelet-pod15-node2
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEpAIBAAKCAQEAzUwLrKnRX4bQHmoJZWGuZf2uE1s4NKbjNjgnQADzeDURG8PU
+ qwvCIoT0rCZr32A8P3XzboLvS8/zsFwIYK/H8VPhuFZFb7n5ciEnxe2fzN8n1hS3
+ fzZ0mBOO52gff5ZofZaLCYo7D5d5vsR5xEB50MUVi4BTQsNgQa/3bHQpe8OAOCif
+ dXPqm/ZSDomp3apNdvtood2+wW+BCqwab8ubNR40Xx0nEdmD11CF3BtFtPWSJWRy
+ bRvUU5PpxL3RNs8CPIoqJcUVDNgXf0Uq5R/qG3xD5ZTob1lSD1bJlXOPGPa6+pCj
+ 28Klv05FFstrATSBsMLo8vjPKHHewnE1cLnd0wIDAQABAoIBAQC2ZFaG60Sx2wMx
+ 0kFQygz4Xf33AncYCCEbPZ5Zdb7ZUERH558c69BpfLgn7eauyUAdnXxN9ZQGRdWa
+ HNnwlJtNo5mJfVQpZA/jPuOoLGppyOUKhNNV+RpzNgUjQFWjtAxXb5VNP3sjag9m
+ 1gXcvu+69C4lBzhxu0TcdyqaN0XXxorEVNITg1bBKh9+hq/oc2YprhtIXi3YJw4x
+ AsJUKlfzLYpaWk69ECrV+wzPuhvCemNfsIe88NsKboN37nH0XGp0yGSi9VBuMASC
+ DW712tYqujJHuDcB0X374I8qDHLhsWkNlkSZUApUZ/yQTHxDiVnk3K2eFyimtP4w
+ 1Nxool7JAoGBAP204bAfnlwFs//D69Fk81fPtMcd42UClh/izp7ItaXYoNYmkoAM
+ fj29Zsy+DwGihgXwad0IgNBuRs87x+ojwqZ0WdYF8N1B2/JLbp+2aymI+O89ulEV
+ UCHXvIzYBuFriREgvH9yobH8/Ri3D7hf8mBYgV4k/1O3xaZmBtuqyUvPAoGBAM8n
+ IvEBLFfOSGdU1pREzRKNheVOhld774Y8zXo3HHKQm0JWVLwehhyXSnPF5MkUW0DE
+ dB3E1rSU6uhJgdnss+SAhcuAw5i4nihZqdeNcGVlC3VA4m+qpvqz8JfocsOJk3se
+ NI/VZULu+22li1uKDLVAAojsfkcovCHk+lReEDq9AoGAHzeijYlWcvxAqbfxzFIf
+ ny5vkBCdalBnKIU/50nLEB0XrUIRxK/E2NP1UjwQnKLi2tg6LnhdYUgwbk9syeKc
+ kN7ALxWMDa2M4sNlWUGY7gNsngN6aX+13HQvPyVVs2cH9pOQnh38x2nZurDLvmQP
+ 7sr1ICBtSl/ScicbsOvS2QECgYA+EQfTFfrnRBNFgpHYUtTu3iBkGCcAR0349nbK
+ S4DmgpVCRwOUacDdCCdykLR/2u2MdlAkKzn5WTUY7A1P8i/kIu3zj10LgSVCCbtt
+ rh8jAidwtkQiGQt2yjsoCKl6FNpvZRlyjwmMCHak35jlkHNGSyt3QwSC5Z2YujaW
+ 2KgcMQKBgQDdclOO6gKuxvJ9J/Akcho11Bb/j+WMKnfE+1Z9zw+k043qOIabh/lk
+ e0vhqAdtcmUQVcFLYAS9wxNaSJMv85nh3YSJZmuQ6fce54jLIzEL0Bf/5I/wP7Oz
+ RfRMb5QBC8oCsNHqAIMdwF/bL45tjE07zP2v2+QjLFub+aaV0aQnjA==
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubelet-pod15-node3
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEpAIBAAKCAQEArO5/4THPPlSAmzxWoTDaeHiE5WtMYZea+WBXVaZTFjyxz3sQ
+ JxOfkER6NcZXv7Bxq+uIJSNdlRd7tx1KRbTX5C6XwaLP0hUX0teMoE6flcUXw4wS
+ OV//+6MRz6bKe6SJHvGODJSbY0r7iL2uwSQ5+INAi9gAi8eXyCJETvNIMRi87P9h
+ AHJuJ3GmGt8dTSdaGiLb86ULlRh0TzkWPmodIKEBbhsUDGXa6H1RSOa1eMeiN/dJ
+ tUqwiUFZz/O99au3Ow60uQVBIGw4nQ0IcJzCZTXuQsP2tOlEPWQorQ3udkJw7N/0
+ b5thQX8oShxoWy5K3vEMU485Dhi1g1g9Aw6pKQIDAQABAoIBAA38K7NWh+AOjWgA
+ dTEL9l8PwA+docuyqwHH3Mg8bzO5LNgOp7vBRoIwR4HZzHbgGhFBNv1p4sOP5p1k
+ bQE+Isd9TSCHvi7LLeYLMIA2W4mNKuLRjRe+v8Dl6ybT4kQlhkFOX6J80iQxiC4C
+ yQMtntKOKsYkbcbgGVJCEywfWJM/vtkhq8OucW0eqkMDJaDxnlKfRoTP/XdfNtV2
+ gq2uh78n1JunTg6Z9RrQ7rTajxgKqY9hU4fumD769zQivNTWgjCRHLupvFR3Exu5
+ /vZyEUhBaMei0IkALWspa0SKXN03UwJ5b0l2XKaJSQDQ5GSBGtsnMsalSVvkibwq
+ dzusAAECgYEA2puiu6Ce9tNJJDFhjxV34Cf1/8FMz1tK8aEwU/BASmSBRAszGJQX
+ Vyt4jcnXPJ0yYaxFhDIg9oxK79GG275iWrbEIw5jpQEUF3O+FkHWlfNbomJVVoj9
+ tQLn+8DaMSKYOZpvoxIRiYAe6qzZ64lUl8paH+Pnqrf5buIQ0QtdASkCgYEAyoLM
+ RtScJ7+TxHzW+su4A04QmMNShazr7kODDXQquGCQZCY+Q3G8qDebZFoYv6OpRLKV
+ OrqCyV5gkpxgFdKoRfTFlFWAL275enssz8U7qC22sjnoJRt2jVQLawp0+dI07Z+B
+ 0IyZ+F0zcFOOXBmmuUAnvG5+BCLUnoFj2i+RaAECgYEAquQ/sq09l3ZUFxcDTPdb
+ Xr/ebrCNewvC6mE3hmap2332D1sx9mTOWjaBZ1YCDEBWwkQJk+4cFqBVdGQ3KFEM
+ Uh3N9hmpi7PsIOk6D+wn89DqMWbtj1hH/NjowMVhzEde+Kjh3HijfPnLMWkuchJJ
+ Lt/g1E01LR/kvem7e6+GZQECgYEAiVIYYw9YtDtcYCinPnlV1ifhaTVJiAuyEGcH
+ PuA+97fDMaYdIm7FluveGzZdAdZguYy/VIuUlCfDJKeVIDcwk/9e2y7/NSrzUPKl
+ eF4uDeSxtjk+CauNwFf1RihZGe5Ipbk7tcchwSCx+MEwD5P1UjkGuOfT28oikzj6
+ FMGcwAECgYBV8XwB9w//CArVVb1XTaGJHMr4CWRooaXagF1LN5u16UzXHiyKuQTV
+ Zuowr5MdEMXRLM1FuvtRlS9JuUzjydcPsYiAEX3TevWbfXmG95ogh7DoVy4JNDTw
+ jve2PWAGX7y2cHIu6ICtBsIZPBfWa9gXP4ur55xmgLsp1e4PGwO/Wg==
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubelet-pod15-node4
+ schema: metadata/Document/v1
+ storagePolicy: cleartext
+schema: deckhand/CertificateKey/v1
+---
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEowIBAAKCAQEAtXUc432oYkcBASXUcHMmzH0kCcEXT4cd+q+2CEGdzPx2yepC
+ b2QX7OVjy/QJGakjhhqeSJFq4j/BiIzwy56YTLohGqPVQ0ef5vlfWkj48oPiIch4
+ NbFdA3wC/mtrDDb65eNIfwMBQF8QXC2fW/2IiZC5Eps5YBr7fC8H919+C7n+VlBy
+ KgitP6LSu/YbjbzyMrk46QLdPUlVRJ3XlRPU6Dpj2KHhDZsIuRMxfSH2fp6ZKmnz
+ /0EmHirZzHo/6G03p3pAGr4vUTJciMLbFrkQDZPL9azJXc16+Ama64buqwhDmJjz
+ 2kRQVD9u1pq8ZZNtsP5LT63Z1j9YwvEs1XhoQQIDAQABAoIBAD+Af56hQAc8n/5d
+ 1c2QjthrRuxe9aBwQa6URVj4VZgCFjQtVhiTZ8gQsu8SNQkU5wisUg5FTall9H2s
+ DSzFELlxPdqL0TtdWnlDdforpWuBeeamuGLZ8hohEQ8mWm0I5J8E/j7st0hmvFv1
+ 31obDOhPjGUVi2u1paLc9qW8dmj1lFBWLH6pHOz5T1ookqE3WE51Q74sUQdEQ+G+
+ TmtdeqxkaSbsJtI0paswgrwfyePcxZAHtgJ7XQsps6hZs3HOwcdBrlgwjWLjUS+R
+ p754XCDYWcdfPyYFyRIitsBq9bIQeC1GUlfBtE7yB+oTxC/gQ8csgDy0uzh0Yt7d
+ Pa66tkECgYEA2KyB2PENLScY3AylDmZg1sYG9ETrOWsc4/+pK/qOetrCgVDPbC25
+ ioA15yr3cvfOoiLyE+yaHwqM8rGkOAiqFS+ejJXlJv5fiRG4BdKrKOFuQqronZiK
+ P4vWORNu7KFT5ixrqkr2FUJF4Swhq7CDU00Ye3ivur2UCUcyVpURhnkCgYEA1mRR
+ eYCI+6tOHt+3Pd3ynt7JqVExEI3yxFB75Vkime8eMTreNoUM8rL/Lc5hw/JADH7x
+ auohW2khrt7E+kAzElPsM/6o3LVxZG1J3Hx6Gb6+Istw+ZVSmeMq4MbUVOSciAq3
+ UhYvuW1/z6046hc/8nszZ8Y9J2vO2Lpw6La8ngkCgYASFMs9LFh6JSIY8uEvQ3Hf
+ WmUoKzwp7Xtat3IJnn4XWHwUyIaWs3YhTbOx188QhAd1Vk83RG5UGtBKTHK0zlxL
+ Kk8j0jpuN5oHWTgvHDZ2UeGepJ6G0DzxMp0s5CdEje3vblOJwXmpqn8kXEdvCWrc
+ H7nkS9z2S224HH3h5cyxmQKBgQCF0cpVR9i5Fj1F4ihTkpUdezxu1kIE7kVpKj+b
+ cZ66bNnwqqkHaNcjKn1DTz4Q+8XkxtvT+15k22Nt7pkPB0GZoA6gicVHNm4X3Gut
+ F3lzVm8B8vCKqR0M9xHNie4BK01VUTMKJtUVLfcIXzxWSbrdlO8KSF/lmlJbT0yo
+ xV9IWQKBgDjNgceLrg39N0Xb9LUMFSl01DyMW7dJtg4XdKHh6lQleyVrMl8C6096
+ bkE/5hwc+AJhwBsgWiUqmc11XnoEv3oOTV9kqXFTDwm+YKjZ5VTy3QFGsc2DhQXT
+ rBK/O0qsEQYvxYj/a085jmG8fpO0irCzg3m8bVZqFW10QE8s90Qc
+ -----END RSA PRIVATE KEY-----
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: kubelet-pod15-node5
schema: metadata/Document/v1
storagePolicy: cleartext
schema: deckhand/CertificateKey/v1
---
data: |
-----BEGIN PUBLIC KEY-----
- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAp7X883U0mWqIjFAppzE7
- vgLzK5XUkHLi6bxqtZ00o6yDC1hrLT1w1dAHfhipQssnnkw5NffApHx39FE8Jkkc
- j+Vnc8VM53t6wAvpQuTLQDS4UQF2Hn5zJf8D5Ag7qaG7M5tWcVUvDJbGNnXDBPPu
- pvQWkGQVHVA4Gfb/n3mH7yGGEwi2bo/uYjA/t33Amhom1QO4h1yz4fR5MBFouK0p
- SdOCsgzU9r+whxsMJXNZnbXzXn/G0nfEclIzcHU1kpGoTuvTsFJUWYibnz58wh9/
- 8aW4gTSbcnwnemwZXi71XYoRh6BlDtPl2yCm8BKR3jr8DgWvWKRb5Mxya+/393Xh
- GQIDAQAB
+ MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAthm99SZVyd0qthuKrpsn
+ hrD7Wi3X2dhud0WbBCKOo8Ppc7+7xsr0dAY1f67FZskoOU9OJ/0I5Ft+lTnHNDCb
+ UN2dPXwcXRYJoL4LOIzCMvlhT3XMR6jDmNVgdQxt2W0TY/spw0L4dSjuCbkPag8E
+ jAoPtJ/k3rDEcqC4G66KJ+tVV0lzansC9Yum7jRnQZeA0eAcz2EEDIi0ldrygI8S
+ 2mhDycqb9nnVV4SBy9olU1C6YRpG2JSf4GeudKVlIH6nV+Z7OABsqp5V+qSZ00TY
+ XWvQ2/BLiRTza0CxpcqzP7oZZvMxCnO5cJusWuulwHH5SMnHryReHsqqXpU8jJCs
+ VwIDAQAB
-----END PUBLIC KEY-----
metadata:
layeringDefinition:
@@ -2420,31 +3110,31 @@ schema: deckhand/PublicKey/v1
---
data: |
-----BEGIN RSA PRIVATE KEY-----
- MIIEpAIBAAKCAQEAp7X883U0mWqIjFAppzE7vgLzK5XUkHLi6bxqtZ00o6yDC1hr
- LT1w1dAHfhipQssnnkw5NffApHx39FE8Jkkcj+Vnc8VM53t6wAvpQuTLQDS4UQF2
- Hn5zJf8D5Ag7qaG7M5tWcVUvDJbGNnXDBPPupvQWkGQVHVA4Gfb/n3mH7yGGEwi2
- bo/uYjA/t33Amhom1QO4h1yz4fR5MBFouK0pSdOCsgzU9r+whxsMJXNZnbXzXn/G
- 0nfEclIzcHU1kpGoTuvTsFJUWYibnz58wh9/8aW4gTSbcnwnemwZXi71XYoRh6Bl
- DtPl2yCm8BKR3jr8DgWvWKRb5Mxya+/393XhGQIDAQABAoIBAQCZpieqvLSF4Y5c
- Toz6uiZrvLQgOFLYTAkL7y0sWmyBj2k3mbgHaITZvo8+vUVFBm6znk3D3cnGaKpV
- UZ9zzAO46YlQDXCZmw0oqUD5ojd8CVDcFiSrZ1oDc5GS9uACV0P00dnuVwaV2ASc
- nGMhRIJevr11Z9vYUUg0sZAcAPHC6E3zQfscau/IKu2lO6G52nF13gVl9731Zeat
- V7J/WdtbgvRApuhlP7wFFy7mvqHvOJXnXlaSvd0cQ6zANhVJRAHmunYLy6kBHBmE
- TiG7n+TMYdmDAYXgBeeWgOoM9JSg5KBdmGyuM98/LxYGM50k3waaxSZ2O6veu9zG
- gZ/6e4vpAoGBANPtvE6TZPSoMi7nTTpJsXY/Wd8f9R+et82n2zlnnW9oXxvqUIRf
- soHtBlD3smhxknRgH812FkM5oPYtIzA58ulpqtqnKGwSdNcXIuUBss52O8NinZY0
- wk/1zG+SXI+/sm8pd/yWw9g+F5mcekq4fkQmCYmQfimuzXkIWsBYkroDAoGBAMqW
- RO8kHFmnmIxXBv4ILnNocfA9gTrSoj05rnslYfyPD91n84iWrPzq/fRhbnZnknmU
- N3pVKAW+owdEp9eoyfLoyFdmBPjPFX7/cPOXqCcdq3lDsCWYixaGZ1z9otMVp6vF
- xT4AAxo6uwEk258NzwU1Jm31x0/MlPSe4WYPapuzAoGACo4Mkt1Eaer2lN9wOTby
- X7FICJTO4IRHIzb49CL09Fd+ZSWGXRFnEpF7fwzXFdySLrma2+DFuxNjsN8OoZhB
- QN7CY6FvofJJX20Hj+BFx4Kb918x+gkmpFTZmbTwZzhk6qRmFW5s0phFFKF2dcI6
- h6pdTzyjC/Boy15fJrVCmYECgYEAo22IHLcv26+VI5nNPT9SYa2fROQJDXAAi42t
- 0RA+NOUgMkd6sfSDhuD3j57N4tz4z/Wer6RkzgWVNPbQw+wZRkk93Sui1SkRuUrO
- TuRINY38162gOyQNCFXSqrS+FrUAd1TrInIWDqHUXD7koTIdkKDo6In+iMSMYa6O
- PKwxH3sCgYB4OHoRKVQNU4RuR68xvQY/ggy5cmtEhZzNHlbpchAiw+4JhbQ76q/W
- Iyo0raU0OOg0hvb2ideRZre5lWJZqT9QT31ZXC+3xr89ZYvmjOjFI2WuOCLRsXXy
- pxmNrG6xskY+azT3rC5ouh1r9vz1E0oCJq4H6aVUBqZ1AkQI49AM0g==
+ MIIEpQIBAAKCAQEAthm99SZVyd0qthuKrpsnhrD7Wi3X2dhud0WbBCKOo8Ppc7+7
+ xsr0dAY1f67FZskoOU9OJ/0I5Ft+lTnHNDCbUN2dPXwcXRYJoL4LOIzCMvlhT3XM
+ R6jDmNVgdQxt2W0TY/spw0L4dSjuCbkPag8EjAoPtJ/k3rDEcqC4G66KJ+tVV0lz
+ ansC9Yum7jRnQZeA0eAcz2EEDIi0ldrygI8S2mhDycqb9nnVV4SBy9olU1C6YRpG
+ 2JSf4GeudKVlIH6nV+Z7OABsqp5V+qSZ00TYXWvQ2/BLiRTza0CxpcqzP7oZZvMx
+ CnO5cJusWuulwHH5SMnHryReHsqqXpU8jJCsVwIDAQABAoIBAQCo4f7WGRN+/2rZ
+ MXnQrXxe4kx6OgHxu1PXseouT45SOyOLgco4d4l3ATski4Xv6acwX2hwla9leaVP
+ 6CHjOSESQjXODAiSHBoZxabKb2C7vaSN+QXXf6DHYTzv0PMfrpVJKGp2+OlMXwVE
+ Zyjwh7UD22Dtd0zfarkGRh/5LEpc8cYtQNZO8IphLnmM9oZgE0FJ7+t3d6cqVopu
+ QTNvh3BY13FFE0igUsgrtRGXKvNItaJ6mXNlY2+DfKcWKemvgyv2hayRm7e91qT7
+ 07MF3qb/cdVy98ilzkezLwSad0yix6w6hgtWgYI5eWpH9QrZIGK7bAewFoJGrNey
+ g7xb68chAoGBAOygoaBEQwbdMGLSpiPRIBv+Am+6yOWMpFwSQe03eCZLssW3EfA4
+ TLc60QbJcs51laE4E3cpNxc5GZKney56gmxD+uWaex1Qvw6qlQkJQKDVywYA9k69
+ 8i7wc6mOAp6TCFacuqM4P54qvfCfnkBujuZf22jaDkqkUqxzMiag3VnNAoGBAMUC
+ Tj9pyFi//Kv+Gw/f481/PC97225mSxAIOVXy73emg/w1k6qQsKl3IlDSZwaWqeIm
+ 1jKI+XjJn4FucXZ6ZZTRbrr4Nd4ciWTrpVzkSq/dHAvIZ7wTMp1jEWZ3mDQagYwP
+ PHRt7Ds8uCoCtJwIKjjaAmOiKdQTYbWUEW4JDGqzAoGBAKa4GoiP7+XDLFdEcbhk
+ nMn8Mv1Dzk4lxJv2ZSrc3TOmPCQf82ycTjj/IM02XERpBm7b0qMvj9g16/WvORQr
+ Tv82+myRZlLmVGbh+zWtpjJrz6rAPMqH/D3kPqnlG6VclRBpRvq/I9ut47vIyrg8
+ 7UQVn8KFeHJQysskMt6SksK1AoGBAJkfk6XiGGAyyLb9yBbsk+jTLfpSMFl8lHcf
+ jUDqk4nSGN/c3KtDzqvI9xkOkBkk3WHzgaTBpfVl8N3u8618sJuctI4KAgRi9b9F
+ EMBEiHBsUTIvT8F0wnBl4c5cwiYtO+eaqAhur5/TL+knNS3ZgsexWw4Jqq01a0pw
+ jaOS0N3VAoGAW9e8c2scLfyIx4L83BDmgCpciiNP7Hw4qOuGbaftZsc9fM1MbzKx
+ ovUAKJUudTOZphIMXaEoqb5+bON1c5pOigFQ15sLvuOgJTn1kNLRwIFXVyPSv7pp
+ gsUHJBCEnz0OCgxv/vsGeY827IDW28a4cPPw/QthfuTZiOF3LJLKLyw=
-----END RSA PRIVATE KEY-----
metadata:
layeringDefinition:
diff --git a/site/intel-pod15/secrets/certificates/ingress.yaml b/site/intel-pod15/secrets/certificates/ingress.yaml
new file mode 100644
index 0000000..5a30cf1
--- /dev/null
+++ b/site/intel-pod15/secrets/certificates/ingress.yaml
@@ -0,0 +1,108 @@
+---
+# Example manifest for ingress cert.
+# NEWSITE-CHANGEME: must be replaced with proper/valid set,
+# self-signed certs are not supported.
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: ingress-crt
+ schema: metadata/Document/v1
+ labels:
+ name: ingress-crt-site
+ storagePolicy: cleartext
+schema: deckhand/Certificate/v1
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIDNjCCAh6gAwIBAgIJAIqyyCruEs0zMA0GCSqGSIb3DQEBCwUAMBUxEzARBgNV
+ BAMMCmluZ3Jlc3MtY2EwHhcNMjAwNzEwMjAxNjQ2WhcNMzAwNzA4MjAxNjQ2WjAi
+ MSAwHgYDVQQDDBcqLmludGVsLXBvZDE3Lm9wbmZ2Lm9yZzCCASIwDQYJKoZIhvcN
+ AQEBBQADggEPADCCAQoCggEBAMv+Q9RnipooU3zU9Om0ghzpY2L3TbxShyizObld
+ 4SLungyjKy0ElIn4dRQar/x8BF//K/qgQK1P3vhDoosVzQsT6lwQqzOyfVCOetjv
+ HMIjzHjLcYEfSCon8tZwmFzz7v5hAyvP5qQJzCjXOBt52HCMIkLxgScN7lIJMzgv
+ kezZnvfWd0pntitjIoIl/47uQD2nopJiCeA4lF8iz3kAjxeU5fxejlDiQ+sxq+EW
+ CJ2FO8ou95Yh7BauFPr6zAwOuirUroxVjR3J/aLjy0uGsPCDUl6thCwAHoIqdlok
+ F+6SuiZ14rZMq5HmlXT+ALNh+TTyIlLP60uc62N3V5kssAMCAwEAAaN8MHowCQYD
+ VR0TBAIwADAdBgNVHQ4EFgQUfTsTBuqoBACa4kZjMfqLESGFS90wCwYDVR0PBAQD
+ AgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAiBgNVHREEGzAZghcq
+ LmludGVsLXBvZDE3Lm9wbmZ2Lm9yZzANBgkqhkiG9w0BAQsFAAOCAQEAgMQGUeL5
+ h3Ysj3/zaxUM4Jrb4j6qn2szjz7q/ZPYo46Vdbg789HMvGfsPsLccBAdxIvzfp35
+ OkP6tmFlmNHg22Nmu0G9EKfy+lXuspsMEU2O8S+jFB6mVrQihnq2MXHxXdQzYAEg
+ x4ZAAC78PMHdRjXgfcTufxkwjJx5FHiIQhv3e6f9+Jr8LQLUxDIJTmpNkHXzPgjM
+ tVPUNuqZprX3m3oDM4PXv1xF42I89cNZRvR7/YFl8ZhITAdCOQ7HiJeBO/1Yyd3R
+ zyp7fclTXDZh6s7bmZBfFXDiyJpJeFHInTVrMqK3Q4u0jDmDJH+t01MEUjMaqOlz
+ usMQUi0wphAWpg==
+ -----END CERTIFICATE-----
+...
+---
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: ingress-ca
+ schema: metadata/Document/v1
+ labels:
+ name: ingress-ca-site
+ storagePolicy: cleartext
+schema: deckhand/CertificateAuthority/v1
+data: |
+ -----BEGIN CERTIFICATE-----
+ MIIC/TCCAeWgAwIBAgIJALiv9mc7SJL/MA0GCSqGSIb3DQEBCwUAMBUxEzARBgNV
+ BAMMCmluZ3Jlc3MtY2EwHhcNMjAwNzEwMjAxNjQ1WhcNMzAwNzA4MjAxNjQ1WjAV
+ MRMwEQYDVQQDDAppbmdyZXNzLWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
+ CgKCAQEAsdLuV9LVazMW/f5pQ/yRsKIDm3/W8+dqSvuXqa5wKmkKre3BICauTqcK
+ vDqn4m5MOrYgJJAeFBDpLPIk07XJPSDLZ+04qg621Jv+2fEJipPFmSebUbqdoG/S
+ MBDyzeBb/WKHGhtxcgpBzfnj7HspreIcFLh1TfYHS34uJDpOs4yDv8tWkyEFEAv1
+ w3n1W/wLyVLDHN6KpUVQsAsPzt+4bcYRr4tapU45ZPANEvmfSVSqZIJKeShunyZ8
+ bQIr8b3XCbjY/zexu8+RMXUkb404MR5vvOf8yNfGZEv4xoyMN+BWcE1GbObH1HJf
+ xwor9z1NnlJboyCWDYPp/3EcVjpHzQIDAQABo1AwTjAdBgNVHQ4EFgQUgNkj8PoW
+ nHPtt7Nj7JFCal7vxIEwHwYDVR0jBBgwFoAUgNkj8PoWnHPtt7Nj7JFCal7vxIEw
+ DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAj72hoR/6JO22k+2N4RzW
+ 4ITjPZRzgbs+LU7MA6Fw4MapSQx5MwgUMI23bez3AG7MefN7E3IKT+j3CDkA5v9S
+ X/pLo7bLvLWVOFjHFqiLZ01xGm9nw7QmpNLmR42PrZTiNx5cBBJAvtkx1i8mY+fA
+ mhAxPzwy7mLkpXkeEha6zDyf5Cuy/42mJ/BpRrAlzaU/59w0YwQuTXzNrp5HIYlI
+ Fy9xE9rME7Y9zy0V2VhaFncmQD+DedJMjm/guBTy1D6Hyl0v+DPfEmLs3NCZ7coG
+ 3kHS35ipqgT6GnZpKlqxcpBD2EWN5XC+Romsu1D+1OPc0ZnTUENs9836UFgaOAhT
+ YQ==
+ -----END CERTIFICATE-----
+...
+---
+metadata:
+ layeringDefinition:
+ abstract: false
+ layer: site
+ name: ingress-key
+ schema: metadata/Document/v1
+ labels:
+ name: ingress-key-site
+ storagePolicy: cleartext
+schema: deckhand/CertificateKey/v1
+data: |
+ -----BEGIN RSA PRIVATE KEY-----
+ MIIEpgIBAAKCAQEAy/5D1GeKmihTfNT06bSCHOljYvdNvFKHKLM5uV3hIu6eDKMr
+ LQSUifh1FBqv/HwEX/8r+qBArU/e+EOiixXNCxPqXBCrM7J9UI562O8cwiPMeMtx
+ gR9IKify1nCYXPPu/mEDK8/mpAnMKNc4G3nYcIwiQvGBJw3uUgkzOC+R7Nme99Z3
+ Sme2K2MigiX/ju5APaeikmIJ4DiUXyLPeQCPF5Tl/F6OUOJD6zGr4RYInYU7yi73
+ liHsFq4U+vrMDA66KtSujFWNHcn9ouPLS4aw8INSXq2ELAAegip2WiQX7pK6JnXi
+ tkyrkeaVdP4As2H5NPIiUs/rS5zrY3dXmSywAwIDAQABAoIBAQCCVFXjy69K5H7K
+ n4hGFDSY4ifEX/pDWnrN7wvvOWKQneFOc6UvIuD/8URj7tUHO/jTmETx4BbSY9gx
+ x4x+zhPtgvDVlzS6V8wmfpFQLhyykIqflmNTOrgxbsqAZPmDUbocvcB36mER5syQ
+ P0iyjTtSVMXC/Wclm4nq0cPunr3dktwsVxVpqV/BH2kmFXNQMl57+6jYXvLcM5Nk
+ iA1usA5c+rGozXk2ADsEpBGlm/bz/2zLMpIr9NOylyq3Cy7UtXztnH5jpV2CB2jh
+ JR+e6Md0fd68EHM8g6MnOgwcIZH3jH8ScbqDYq5pAzsYvlgZn/5Srg0YsXV4P3am
+ TPFhCrVhAoGBAOepIpJ+GOzhcrZ8FNAPel9hhOgjnWjEI2kwVmmV48NDLn6ECmGB
+ 9MhMBsXeiNuHln0t/sHqimuFCUo4eluUhMu3x17gs30Uc8R3ZOtdmgqk7zpB2arW
+ C7eO8D/U8ctkJPJ8rMRBTzbt0ihxHYPCwr3Yg32INEt3DWuj2pHrgHOTAoGBAOFs
+ +L00jAP/qkF/aIpJfHVRfLpGBol6ZRTUTVlUn1Fj4idydvOUBcSFG+36ft2qMfgu
+ l6NiEh1losdVqq6MoVT+PCm1KQKh07bNrp7aAjSUN5Z1jAHnCPQRjTuvgFZzaa+U
+ mg20MhFn/MBvWK2oF0GnhbN3dcJdM/9M8LzpN3fRAoGBALeFJ9xBhOFzoHqsRZim
+ Cl2xVabJQBQU/bCBGJPAqJSxjg2v8MFaQF7Ey8DJEEZJXZCBdYaNlWakF73yjAws
+ 1h7E0m55N/fo0eVcaFiE6FlyXAoczKEnvFSIKg+HVJ26EgL/faZjzqtHL+vV4HnX
+ OotHELPLyRHXmIwjXC2pETN9AoGBAIX34QtwwxVNR72NHm+wpIqEVv/Mxe3GE3SB
+ h0ZjiBsypSCUYiT3/0V/Zc3UZLkPgIriBbRPgDyAPnEAdGMvqGF+hfqzcx/hVJT7
+ P5+gKFdfDnoYeZBX4XZLSAgEkNzP0itKwRML2AWIKymiAq2Ri+C00jyJ7i4IffJn
+ o1phr1lBAoGBAN53tvpr8KzKK6EPy5Q7fZf0nfrA6H4GQhCkLciGZWDPBBLQ2w64
+ 3APepY2w6ecgg/Wc2tHtuavoKD1HdSsGE0E09JZ1bXXKHOdwS2s47qITMzHZzmLF
+ 7Mtu9Fw2+TEsC/utmtoa3lNaIES4mQMSB2NVCJxEfRySMISlM1NbeVVd
+ -----END RSA PRIVATE KEY-----
+...
diff --git a/site/intel-pod15/secrets/ingress.yaml b/site/intel-pod15/secrets/ingress.yaml
deleted file mode 100644
index b799fdb..0000000
--- a/site/intel-pod15/secrets/ingress.yaml
+++ /dev/null
@@ -1,135 +0,0 @@
----
-# Example manifest for ingress cert.
-# NEWSITE-CHANGEME: must be replaced with proper/valid set,
-# self-signed certs are not supported.
-metadata:
- layeringDefinition:
- abstract: false
- layer: site
- name: ingress-crt
- schema: metadata/Document/v1
- labels:
- name: ingress-crt-site
- storagePolicy: cleartext
-schema: deckhand/Certificate/v1
-data: |
- -----BEGIN CERTIFICATE-----
- MIIFKzCCA5OgAwIBAgIMW2h6FCcFdKeaw3vnMA0GCSqGSIb3DQEBCwUAMBIxEDAO
- BgNVBAMTB0FpcnNoaXAwHhcNMTgwODA2MTY0MDUyWhcNMTkwODA2MTY0MDUyWjBJ
- MTUwMwYDVQQDEyxpbmdyZXNzLmFpcnNoaXAtc2Vhd29ydGh5LmF0bGFudGFmb3Vu
- ZHJ5LmNvbTEQMA4GA1UEChMHQWlyc2hpcDCCAaIwDQYJKoZIhvcNAQEBBQADggGP
- ADCCAYoCggGBALvNHm/G/ylh6aPcvrhOcb4qz1BjcNtnxH8bzZng/rMeX3W2AzjC
- r2JloJcDvOLBp/TkLOZPImnFW2/GCwktxPgXZuBTPzFV50g77KsPFw0fn3Si7+bs
- F22tLhdOGk6MQj/WW4pKGHqdw1/VbPwOHBT+I4/scR1L2SZxYtSFIKGenHJH+PMV
- bCdwnNOR80F8KRzK5iZs/r6S/QqVheieARSWWnk2+TtkM1BloGOhLSd+ZkWh9VO1
- eOnZowkaDAJwD/G6zoSr5n+beaXzDnEcoVXFSwd4FLoV+om77o92XmZ4rVw0vTMO
- k6jVwmkdT+dM2K2hLUG/TXWoV2/Qms70gzDOs85RtAkTPe4Ohtdpr51Q0hd35TKG
- YLKzX/OPblD68iYJYSBvMPpAVTbFYVPW1AQx8wWfannYbMoeL8XTEOKfkqm90YP9
- EhIdtmw4D7GZxlzG5FXXutmT9sqLfqlRu/RynAhBP8NQvw74WumhOe8r7GhCwgzC
- gaPLGjeekoS6LQIDAQABo4IBSDCCAUQwDAYDVR0TAQH/BAIwADCBzQYDVR0RBIHF
- MIHCgixpbmdyZXNzLmFpcnNoaXAtc2Vhd29ydGh5LmF0bGFudGFmb3VuZHJ5LmNv
- bYIta2V5c3RvbmUuYWlyc2hpcC1zZWF3b3J0aHkuYXRsYW50YWZvdW5kcnkuY29t
- gilub3ZhLmFpcnNoaXAtc2Vhd29ydGh5LmF0bGFudGFmb3VuZHJ5LmNvbYIsaG9y
- aXpvbi5haXJzaGlwLXNlYXdvcnRoeS5hdGxhbnRhZm91bmRyeS5jb22HBAoXFQuH
- BAoXFgswEwYDVR0lBAwwCgYIKwYBBQUHAwEwDwYDVR0PAQH/BAUDAwegADAdBgNV
- HQ4EFgQUfTAjNgn/1U1Uh1MJDYT2m4dzhsYwHwYDVR0jBBgwFoAUJFuXPZo6RzfE
- BlJjnnk5jhcP4wIwDQYJKoZIhvcNAQELBQADggGBAE2ISWmrxqrledJI3aLaS9Yw
- WsZc8O8CnIyLoxrE85vUubFjuI9ixC/6dJxl2iB1n0H8JgmFREox32Q4+kDJI8V/
- X9x0PFpRzL7QEPrLZhW94Yis3sOphLW0rf0t06ZepdHHeodYJu1pVMDmLq6bKXdX
- vo+/WwKnZBXC1qPbXJByv/CN9MtViXOnBGORFRTJPb6U8379LNWclJ/LW12yTwNk
- JGIbZU61Vxu+2nLIabmmRoODH2jomgMOMMzLgjT3Hvw3whe8GrUoxDiPYQVTDGNm
- ly6m+5B1Nx06fkZazonozeaOhSQ7RblUSbo+w8TJmLRzD9ft7p4vpjBGxRADMcuF
- DOjATgdZeisBUHTGEO0P6wJOBQuCFMX9AVl+u8ZpcuRaRaN+pBE6/BqcHBB6qV/N
- w2DdNtP8BrJ3kJVNEDIo5oTbH5SToxgA4hWBV42M1rB+5vIMDKN3rwVDdNKWYhYc
- VZpU3V9V6JzSW1O2w4Wu9PdbWJD9oSvC0qJgnjOXzg==
- -----END CERTIFICATE-----
-...
----
-metadata:
- layeringDefinition:
- abstract: false
- layer: site
- name: ingress-ca
- schema: metadata/Document/v1
- labels:
- name: ingress-ca-site
- storagePolicy: cleartext
-schema: deckhand/CertificateAuthority/v1
-data: |
- -----BEGIN CERTIFICATE-----
- MIID7TCCAlWgAwIBAgIMW2h3tgSwie0Ypx8eMA0GCSqGSIb3DQEBCwUAMBIxEDAO
- BgNVBAMTB0FpcnNoaXAwHhcNMTgwODA2MTYzMDQ2WhcNMTkwODA2MTYzMDQ2WjAS
- MRAwDgYDVQQDEwdBaXJzaGlwMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKC
- AYEAny0Nqu9U2tXdCCTNzD2T62htMmBLg3CmzWajfbfFl7ALqzo3HgbbY3PxTHDE
- OJ/lwdm0HkEaGfEDXhJd06WZsa8+fKGqhKXvZXwXx5mJ8LCGxz6xiaxwo9lnKe6V
- o3YX7bJ5YIVxQ2jhvZo+dY8Z/buloi2Tp2HbqTejKULH9+qdiQTDXAnyR0NLqzJ0
- YQ4v4yU3zix3nBi8z29lQekGO9quNEka3nw2n0Gxmq5z1bNALGCF5F759mVkB0uT
- fPGF+zm9eqlqAgduYg7R+JYUumVHvIoRY454GtAdZHTJHJZP0gQSGJsLff8ROFpI
- GVYsOZhJXU9Ihc5VBC5PMErbmCn0YkuxAWNOYBstZ8l+uY6YiPoFV5Ulc/8M0If+
- T6jbqzWoFC+4ysgY95RKOw53S4o/T6AFwiIKIw0xp3UfHCf6kr5Y0+XdDn5CXpJB
- d1KK3PoUWzPSsxcUMXvgKWT4x1vsCId21dn1SmVSOEBhM08VZfjd5bvL9Xjt/E0j
- mUqDAgMBAAGjQzBBMA8GA1UdEwEB/wQFMAMBAf8wDwYDVR0PAQH/BAUDAwcEADAd
- BgNVHQ4EFgQUJFuXPZo6RzfEBlJjnnk5jhcP4wIwDQYJKoZIhvcNAQELBQADggGB
- AJaoEtnDoWUUs4nSSqIGcoCfpIO0oqVp8DvkBOcxz5Rz8vMVJSC24/UnuCD2Wknx
- 2V/E3edXIeRo7duhPtNCT7c8OKY/pJsZQTgOczn4rphoD1pmAIPZmpG6ssPadPiM
- EP8xWJHZt8NXG7D5kJX2COvBvgNeWXL6MF7Tv8+t5xzt59Vitdb/7lm9Z6jjpvN+
- zoG0pKx3XYESsnLAVAf00F+kWwds/3x3gQywUAQUDER0jliYUE5id+sojp357Cl9
- XtY+8zSnTduuP8CfMhwv5p6j9xbqacfT7AzpQ6cy4xcQ7MA6JBQcxbaq4NtvIf6+
- d/5N9d8LGnfXdCd9iwNy9Qk23Ea0SNhnk9F/NqGBPakU4TbHh4iTYMC/+hDGInpO
- TIRelTidNBFNaIBg3Z0vsh0lDwbt/xhpXip+ZVBqKMTtktEceiVGru9cYUQA2tKI
- XNoc5s0uQGMpdFzgED4lXZf+n7yGVMKohvi7Yn96HqujGIrVH6qThsI6m7pUSz40
- +g==
- -----END CERTIFICATE-----
-...
----
-metadata:
- layeringDefinition:
- abstract: false
- layer: site
- name: ingress-key
- schema: metadata/Document/v1
- labels:
- name: ingress-key-site
- storagePolicy: cleartext
-schema: deckhand/CertificateKey/v1
-data: |
- -----BEGIN RSA PRIVATE KEY-----
- MIIG4wIBAAKCAYEAu80eb8b/KWHpo9y+uE5xvirPUGNw22fEfxvNmeD+sx5fdbYD
- OMKvYmWglwO84sGn9OQs5k8iacVbb8YLCS3E+Bdm4FM/MVXnSDvsqw8XDR+fdKLv
- 5uwXba0uF04aToxCP9ZbikoYep3DX9Vs/A4cFP4jj+xxHUvZJnFi1IUgoZ6cckf4
- 8xVsJ3Cc05HzQXwpHMrmJmz+vpL9CpWF6J4BFJZaeTb5O2QzUGWgY6EtJ35mRaH1
- U7V46dmjCRoMAnAP8brOhKvmf5t5pfMOcRyhVcVLB3gUuhX6ibvuj3ZeZnitXDS9
- Mw6TqNXCaR1P50zYraEtQb9NdahXb9CazvSDMM6zzlG0CRM97g6G12mvnVDSF3fl
- MoZgsrNf849uUPryJglhIG8w+kBVNsVhU9bUBDHzBZ9qedhsyh4vxdMQ4p+Sqb3R
- g/0SEh22bDgPsZnGXMbkVde62ZP2yot+qVG79HKcCEE/w1C/Dvha6aE57yvsaELC
- DMKBo8saN56ShLotAgMBAAECggGAYzZDhA1+sx/0zApL/xYB5NK83t0Ju/8fwX6w
- qUBBjeLXz1mubgf7m2HQ6ragzLI9xpPcXHcl2PbYDT50ig7R5baHNK8FzUxyeKif
- qOa56Mbx+C4zyqyi2+AHX2x1XVWfkhXuGip2sCA0HKalgqr5juWLZ/ci8rUlLLft
- 3BPQX1FpmL4I+HIyxsspLmQGPGwZVAqkd1xRX+BLKZJAQdlm/LdJaIvwMr4Glcx6
- ZOe68QhHgzXCYsyV6gR9qstF2OvVuLa2mUc7EzYInFIFhXUdAAwmDqkuuLRdRQhf
- Ur8nqQW33T0cG0GBUzgBI5YmSPJvTSzcPmeSyNVx2/Yb0pkuXtCw67oDcAsN4nW8
- uls49E2RaiLJYsy5vPsX5aJNcAxw/CWLdadQ3ukviD/MDJbpTl4F52GOVYL6K4XH
- g5TJjj7xzjmK3ldR/Kscg7HpCitQLGUYdgIsAFdspXf4aSIa68IjDrc5NsJZuMzc
- PbVHrw7QYNfHY7VNdUlOVqH5lS3BAoHBANRqKrQXtnJmM006TCEJXdcN/5M685jz
- +L4Ox0Rhrq8ROgcN5q/hjKb6kP/MccQ9voGQOl9TKEyinGNdTtyc/fuH7RNlQwpS
- HT+vEzVEcrSe8UFs8c6oJnHFO72ylFcibFf56LvbI3L8BZXp7gPSPQkp5f1NWEZk
- X5bUL4UNiOm0diltba/ofxywF0M9WGD00eqi0Q29JRlvun+355j06CENxRoonNZC
- wk1evIxhhckP9zLjI2Ykb1hV6yzwPWtmyQKBwQDiVgru/B396KhzDhLl5AL+pBWA
- GsfiCbmPLh6W6V5VzldB4+GlMRrJ4zSjZQ3/nvX5KepqjMn1N6LQpZQUI/YShCKE
- mW0XMiAfbp2d23MRMjLD8L/bIoBHQOPkCaMjbmyDOlCagWakEvHJO/TieVgTmYk6
- mtEYVjJFWI9OCNMAHdl8ovWr3p+8YbVZ8LLv5ZO/V1cIjczoNQ6p8LG/pPMTDLXM
- ScN9a8z3f8LQLBHBlu0155xvt95PQLAon/x21kUCgcAvPVk36hoiQQZhw3hQ1JNx
- E2TmanLobkHAiurYE11VA+DC1t2Z+fBc5la+/MnEWfL3P4srzgOlX3imRIcYWzXE
- 7crUyG1ray2kDxyXeRyFfN+srDzut8is/q81lfSVmEs+GY8f0DGHDfN0Dq1nXidC
- 1XWXqs7aANKdaZ0T2xm61+57ciG1wGAckjDqPEdecLQKmaEijBEnIgj5BH5WLwk8
- 6KIQGj4fDIPHzyzhj4LAX3ObdpZVzf6RR7JgsSEHtLkCgcBROW2dDC87MqZY++D+
- TVBhz8LDgVjgHntQDc3+fGtVQcKAq+YLYU7qyrXWOWrHpGVDcK5mZHYJoVi1peY5
- QBqL1I2KpoDGxT9P6GN6BgoKTsh3FsvTOVNtvrTJ3keEbJlWkrPgbrXGBeJtRC4C
- pGdeSUg9FtgY8r4BsuFisLoAHbYyC008y5zpfusVBtNAUlQuY4qhUDoLzxafF/jB
- /NEasgH/+SzFss0QuPHRwS7yGVaxdJfoY8TNDjrpqVhx0T0CgcEAvKG4UoWvT8gJ
- pIeeAxxnv9yrMxgpntu4RXPDHgfX5tva6EaM3r3nLXjd9FVtlQ4cNBMhp9HNhS3a
- dK+oEDcBysVxxfltlS2Bx0+gQf3WxgBCJwayKe3i/XCDza92EENgxTPmqB1LHiq5
- 2b5aOl2Y5fP0eX6UryxRc443c/ejMHw4lGwnno0qpRk9M9Ucqv5J96QCfAlBSQQS
- gOG9cypL0kBWzCejn9W4av8HkM8Noqd7Tqul1onv/46OBaX51kt3
- -----END RSA PRIVATE KEY-----
-...
diff --git a/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key1.yaml b/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key1.yaml
index e21876e..d2270aa 100644
--- a/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key1.yaml
+++ b/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key1.yaml
@@ -1,13 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: apiserver-encryption-key-key1
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-# https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/
-# use head -c 32 /dev/urandom | base64
-data: n9VBwseT/JjV7r9vbUR/MvCobe01Bdh9XtWgsNF5zLY=
+data: HliiOP6v0mr/Ut/3F3EaMi+ySwGMXZjXrIvD06DdFdU=
...
diff --git a/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key2.yaml b/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key2.yaml
new file mode 100644
index 0000000..0961a52
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/apiserver-encryption-key-key2.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: apiserver-encryption-key-key2
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: KdSTgZBjuiAGiCDCLxN0zupEXAVL8QXVCG3xpoDAWW4=
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_tempest_password.yaml b/site/intel-pod15/secrets/passphrases/aqua_executor.yaml
index af90ec0..da565c0 100644
--- a/site/intel-pod15/secrets/passphrases/osh_tempest_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/aqua_executor.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
+ name: aqua_executor
schema: metadata/Document/v1
- name: osh_tempest_password
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 4e016fdee23330f49442
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_ldap_password.yaml b/site/intel-pod15/secrets/passphrases/aqua_orchestrator.yaml
index 2edf0f2..8118840 100644
--- a/site/intel-pod15/secrets/passphrases/osh_keystone_ldap_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/aqua_orchestrator.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
+ name: aqua_orchestrator
schema: metadata/Document/v1
- name: osh_keystone_ldap_password
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 4196a0c5553b1f89a63b
...
diff --git a/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_admin_password.yaml b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_admin_password.yaml
new file mode 100644
index 0000000..867eff2
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_admin_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: artifactory_oslo_db_admin_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 4cd27c12008c9f1925e3
+...
diff --git a/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_artifactory_password.yaml b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_artifactory_password.yaml
new file mode 100644
index 0000000..2ea70cd
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_artifactory_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: artifactory_oslo_db_artifactory_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: ee967e33d13fb25d6735
+...
diff --git a/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_audit_password.yaml b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_audit_password.yaml
new file mode 100644
index 0000000..c903de2
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_audit_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: artifactory_oslo_db_audit_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: f8ec1ec496f21ae9911984c5
+...
diff --git a/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_sst_password.yaml b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_sst_password.yaml
new file mode 100644
index 0000000..20edc8a
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/artifactory_oslo_db_sst_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: artifactory_oslo_db_sst_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 2b4dd533625d1d225673
+...
diff --git a/site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_access_key.yaml b/site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_access_key.yaml
new file mode 100644
index 0000000..96eec3f
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_access_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: artifactory_rgw_s3_admin_access_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: bfd0dea7a4f611285532
+...
diff --git a/site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_secret_key.yaml b/site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_secret_key.yaml
new file mode 100644
index 0000000..964b784
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/artifactory_rgw_s3_admin_secret_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: artifactory_rgw_s3_admin_secret_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 302114310a41157d839b
+...
diff --git a/site/intel-pod15/secrets/passphrases/cedric_crypt_password.yaml b/site/intel-pod15/secrets/passphrases/cedric_crypt_password.yaml
deleted file mode 100644
index ddf1fb6..0000000
--- a/site/intel-pod15/secrets/passphrases/cedric_crypt_password.yaml
+++ /dev/null
@@ -1,12 +0,0 @@
----
-schema: deckhand/Passphrase/v1
-metadata:
- schema: metadata/Document/v1
- name: cedric_crypt_password
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-# Pass: password123
-data: $6$qgvZ3LC9.t59Akqy$HAJfJpdrN8Ld9ssGyjFPzyJ3WUGN.ucqhSyA25LFjBrSYboVFgX8wLomRwlf5YIn1siaXHSh4JaPJED3BO36J1
-...
diff --git a/site/intel-pod15/secrets/passphrases/ceph_fsid.yaml b/site/intel-pod15/secrets/passphrases/ceph_fsid.yaml
index 7201502..aeebc70 100644
--- a/site/intel-pod15/secrets/passphrases/ceph_fsid.yaml
+++ b/site/intel-pod15/secrets/passphrases/ceph_fsid.yaml
@@ -1,12 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ceph_fsid
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-# uuidgen
-data: 7b7576f4-3358-4668-9112-100440079807
+data: b8f87e6e-19ca-4665-9eaa-705d9de1c329
...
diff --git a/site/intel-pod15/secrets/passphrases/ceph_swift_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ceph_swift_keystone_password.yaml
index 9a9af1f..46d2904 100644
--- a/site/intel-pod15/secrets/passphrases/ceph_swift_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ceph_swift_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ceph_swift_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: c2c2cd6119b839215387
...
diff --git a/site/intel-pod15/secrets/passphrases/control_db_admin_password.yaml b/site/intel-pod15/secrets/passphrases/control_db_admin_password.yaml
new file mode 100644
index 0000000..c5cb94e
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/control_db_admin_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: control_db_admin_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 9da2ef6c8af985399059
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_postgres_replication_password.yaml b/site/intel-pod15/secrets/passphrases/control_db_user_password.yaml
index 2176e71..d424679 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_postgres_replication_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/control_db_user_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
+ name: control_db_user_password
schema: metadata/Document/v1
- name: ucp_postgres_replication_password
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: d421b168e30d0200b86d
...
diff --git a/site/intel-pod15/secrets/passphrases/control_insight_password.yaml b/site/intel-pod15/secrets/passphrases/control_insight_password.yaml
new file mode 100644
index 0000000..1fa2c62
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/control_insight_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: control_insight_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 0363656f0436655d1b88
+...
diff --git a/site/intel-pod15/secrets/passphrases/distribution_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/distribution_postgres_password.yaml
new file mode 100644
index 0000000..947ffbb
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/distribution_postgres_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: distribution_postgres_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 3b7d8106e5e00a45ea8e
+...
diff --git a/site/intel-pod15/secrets/passphrases/distribution_redis_password.yaml b/site/intel-pod15/secrets/passphrases/distribution_redis_password.yaml
new file mode 100644
index 0000000..4092cd8
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/distribution_redis_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: distribution_redis_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 5c403969218eea99dfb3
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_password.yaml b/site/intel-pod15/secrets/passphrases/global_passphrase.yaml
index abdaa5b..e100c02 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/global_passphrase.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
+ name: global_passphrase
schema: metadata/Document/v1
- name: ucp_postgres_exporter_password
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: mWPd8-UhfHeddODwz1TXGNd3
...
diff --git a/site/intel-pod15/secrets/passphrases/global_salt.yaml b/site/intel-pod15/secrets/passphrases/global_salt.yaml
new file mode 100644
index 0000000..c5d28bc
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/global_salt.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: global_salt
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: FQO6ez1aS0EOMEv1y0ae?Moe
+...
diff --git a/site/intel-pod15/secrets/passphrases/mfix_crypt_password.yaml b/site/intel-pod15/secrets/passphrases/grego_crypt_password.yaml
index 6c2f681..3084c5d 100644
--- a/site/intel-pod15/secrets/passphrases/mfix_crypt_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/grego_crypt_password.yaml
@@ -2,7 +2,7 @@
schema: deckhand/Passphrase/v1
metadata:
schema: metadata/Document/v1
- name: mfix_crypt_password
+ name: grego_crypt_password
layeringDefinition:
abstract: false
layer: site
diff --git a/site/intel-pod15/secrets/passphrases/ipmi_admin_password.yaml b/site/intel-pod15/secrets/passphrases/ipmi_admin_password.yaml
index 0b49b62..3e65fd0 100644
--- a/site/intel-pod15/secrets/passphrases/ipmi_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ipmi_admin_password.yaml
@@ -1,13 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ipmi_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
- labels:
- name: ipmi-admin-password-site
+ abstract: false
storagePolicy: cleartext
data: root
...
diff --git a/site/intel-pod15/secrets/passphrases/maas-region-key.yaml b/site/intel-pod15/secrets/passphrases/maas-region-key.yaml
index 73d4a69..29b5c2e 100644
--- a/site/intel-pod15/secrets/passphrases/maas-region-key.yaml
+++ b/site/intel-pod15/secrets/passphrases/maas-region-key.yaml
@@ -1,12 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: maas-region-key
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-# openssl rand -hex 10
-data: 9026f6048d6a017dc913
+data: 2610ca1466a610967b8e
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_addons_keystone_ranger-agent_password.yaml b/site/intel-pod15/secrets/passphrases/osh_addons_keystone_ranger-agent_password.yaml
new file mode 100644
index 0000000..00a149c
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_addons_keystone_ranger-agent_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_addons_keystone_ranger-agent_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 1f315777a20097bd175f
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_db_password.yaml
new file mode 100644
index 0000000..0adfcc7
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_db_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_addons_ranger-agent_oslo_db_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 9b507c12deb83969bfa5
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_messaging_password.yaml
new file mode 100644
index 0000000..e2dbbb9
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_addons_ranger-agent_oslo_messaging_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_addons_ranger-agent_oslo_messaging_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 7b72d693bd2a5ed7cf6a
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_addons_ranger_admin_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_addons_ranger_admin_oslo_db_password.yaml
new file mode 100644
index 0000000..5dd1dda
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_addons_ranger_admin_oslo_db_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_addons_ranger_admin_oslo_db_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 321a480812552b7336a5
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_password.yaml
new file mode 100644
index 0000000..62133cc
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_addons_ranger_oslo_db_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 58dba6634fab9d618f31
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_sst_password.yaml b/site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_sst_password.yaml
new file mode 100644
index 0000000..4587190
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_addons_ranger_oslo_db_sst_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_addons_ranger_oslo_db_sst_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 6246846c2b514ade61c6
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_db_password.yaml
index c5f866c..e83e234 100644
--- a/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_barbican_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 81d61e27283f43107c6b
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_admin_password.yaml
index bb19957..67a7e18 100644
--- a/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_barbican_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 2a40bf53de32d5ee7a8a
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_password.yaml
index 9bf0217..341b6e9 100644
--- a/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_barbican_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_barbican_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 82d4b0a3ecd325f15291
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_barbican_password.yaml b/site/intel-pod15/secrets/passphrases/osh_barbican_password.yaml
index 5122192..76b2c0b 100644
--- a/site/intel-pod15/secrets/passphrases/osh_barbican_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_barbican_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_barbican_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 49b51eb652aaf8c75fdb
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_barbican_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_barbican_rabbitmq_erlang_cookie.yaml
index 32f8dae..ab060d2 100644
--- a/site/intel-pod15/secrets/passphrases/osh_barbican_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_barbican_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_barbican_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: b8a80c017ee76079f72c
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_db_password.yaml
index b22f898..54da3ed 100644
--- a/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_cinder_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 4334b35ef18a44842897
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_admin_password.yaml
index 040e657..0c8c00f 100644
--- a/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_cinder_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: b24ee59712be5f0f24d1
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_password.yaml
index 5d76ba7..e62096a 100644
--- a/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_cinder_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_cinder_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6766eeeaf6d9aef59e65
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_cinder_password.yaml b/site/intel-pod15/secrets/passphrases/osh_cinder_password.yaml
index 26565db..da3e404 100644
--- a/site/intel-pod15/secrets/passphrases/osh_cinder_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_cinder_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_cinder_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 3c100d5335a363626794
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_cinder_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_cinder_rabbitmq_erlang_cookie.yaml
index b1ac8ff..0cba9ef 100644
--- a/site/intel-pod15/secrets/passphrases/osh_cinder_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_cinder_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_cinder_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 0d763879b2cc170b4d10
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_cinder_test_password.yaml b/site/intel-pod15/secrets/passphrases/osh_cinder_test_password.yaml
new file mode 100644
index 0000000..fb9ad40
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_cinder_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_cinder_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 9074a5045a7316388d7f
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_glance_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_glance_oslo_db_password.yaml
index 0739069..22e52c7 100644
--- a/site/intel-pod15/secrets/passphrases/osh_glance_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_glance_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_glance_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: b9b4cb6776ff5975fa93
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_admin_password.yaml
index 57db752..d591aed 100644
--- a/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_glance_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6546d19d7c8f75975bb7
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_password.yaml
index d103c27..de95c75 100644
--- a/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_glance_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_glance_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 55da947a21fbdb92d6e9
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_glance_password.yaml b/site/intel-pod15/secrets/passphrases/osh_glance_password.yaml
index 93ae0f2..68ce63b 100644
--- a/site/intel-pod15/secrets/passphrases/osh_glance_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_glance_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_glance_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6e443487d422016970b1
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_glance_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_glance_rabbitmq_erlang_cookie.yaml
index 496fae3..924bcd0 100644
--- a/site/intel-pod15/secrets/passphrases/osh_glance_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_glance_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_glance_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: a1380168b04bd43b93d2
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_glance_test_password.yaml b/site/intel-pod15/secrets/passphrases/osh_glance_test_password.yaml
new file mode 100644
index 0000000..e8d7f4a
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_glance_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_glance_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: b1a57860260ed26b0553
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_oslo_db_password.yaml
index 3352d4c..41e8fca 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 1197453ccd2b82a97cc9
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_admin_password.yaml
index 074e688..8b2036c 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6816f32b46947f5a7354
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_password.yaml
index 39f1327..54a274d 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6ac74e28984cbb81647c
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_password.yaml
index 5777ebb..7ca7b13 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 00d5066ecfcc04211133
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_rabbitmq_erlang_cookie.yaml
index 74e2a99..9a7d7ac 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 0a3895e96e31c1cef0b4
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_stack_user_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_stack_user_password.yaml
index 36db28b..5d5c445 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_stack_user_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_stack_user_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_stack_user_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 06c494fc73431239bf06
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_test_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_test_password.yaml
new file mode 100644
index 0000000..985b273
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_heat_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 5ecfb0db3050d1876ee2
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_heat_trustee_password.yaml b/site/intel-pod15/secrets/passphrases/osh_heat_trustee_password.yaml
index 58129ef..2977f08 100644
--- a/site/intel-pod15/secrets/passphrases/osh_heat_trustee_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_heat_trustee_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_heat_trustee_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 5314abff4622367f1b9e
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_horizon_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_horizon_oslo_db_password.yaml
index 7c78d45..6914d49 100644
--- a/site/intel-pod15/secrets/passphrases/osh_horizon_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_horizon_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_horizon_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 0bdeb5c331a30eb92c0e
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_horizon_secret_key.yaml b/site/intel-pod15/secrets/passphrases/osh_horizon_secret_key.yaml
new file mode 100644
index 0000000..3bf8fed
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_horizon_secret_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_horizon_secret_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 6a921508-b29f-47c1-a8af-a1764254fa0b
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_dmaap_mechid_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_dmaap_mechid_password.yaml
new file mode 100644
index 0000000..cbd1c19
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_dmaap_mechid_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_dmaap_mechid_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: password@123
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_elasticsearch_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_elasticsearch_admin_password.yaml
index 78c265e..dffee24 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_elasticsearch_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_elasticsearch_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_elasticsearch_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: ecc30a41c669a5d94fd3
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_grafana_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_grafana_admin_password.yaml
index 9232de7..12faa2e 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_grafana_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_grafana_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_grafana_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 784304aeb93212318487
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_password.yaml
index 6d5f49e..73f3d76 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_grafana_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 17b95b8d80f1065116a6
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_session_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_session_password.yaml
index bd4e573..e5aefa0 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_session_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_grafana_oslo_db_session_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_grafana_oslo_db_session_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 10b6f8b95fa1d353812b
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_kibana_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_kibana_admin_password.yaml
new file mode 100644
index 0000000..e66e256
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_kibana_admin_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_kibana_admin_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 78652003acb1807ef2cf
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_nagios_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_nagios_admin_password.yaml
index 52dbe16..5510ac1 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_nagios_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_nagios_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_nagios_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: b476fc58d4d05adb92b7
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_openstack_exporter_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_openstack_exporter_password.yaml
index 64f78e1..c443b63 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_openstack_exporter_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_openstack_exporter_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_openstack_exporter_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: d85c6c4a1437346fc6c4
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_admin_password.yaml
index 9c68e9d..9141509 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_oslo_db_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 40e1fff98f774a9aae9c
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_audit_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_audit_password.yaml
new file mode 100644
index 0000000..67b89e1
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_audit_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_oslo_db_audit_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 14735c537fa4d19114993a1d
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_exporter_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_exporter_password.yaml
index f134f46..cfecffd 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_exporter_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_exporter_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_oslo_db_exporter_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: e0eb681ab3ec0835eea2
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_sst_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_sst_password.yaml
new file mode 100644
index 0000000..bbb716b
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_oslo_db_sst_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_oslo_db_sst_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: b5e7ed62c1aaa0642a6e
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_prometheus_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_prometheus_admin_password.yaml
index b3df5f6..7da4cb9 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_prometheus_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_prometheus_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_prometheus_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 5445cb252292fc7ecef0
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_ks_password.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_ks_password.yaml
new file mode 100644
index 0000000..4edcede
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_ks_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_rgw_ks_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 87c1e15d9f330cdbf757
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_access_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_access_key.yaml
index 9f64719..f487ac4 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_access_key.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_access_key.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_rgw_s3_admin_access_key
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: admin_access_key
+data: 4c05ba07638ef552637a
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_secret_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_secret_key.yaml
index 3e06f91..a56df5d 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_secret_key.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_admin_secret_key.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_rgw_s3_admin_secret_key
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: admin_secret_key
+data: 84823aa4fea390be81da
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_access_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_access_key.yaml
new file mode 100644
index 0000000..dc8760a
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_access_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_rgw_s3_artifactory_access_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 237cbd434aab9b2ef9a7
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_access_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_access_key.yaml
new file mode 100644
index 0000000..f2f5598
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_access_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_rgw_s3_artifactory_edge_access_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: ae0bedce798aab5e4894
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_secret_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_secret_key.yaml
new file mode 100644
index 0000000..e65248f
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_edge_secret_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_rgw_s3_artifactory_edge_secret_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: e76cca7d9079565fed68
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_secret_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_secret_key.yaml
new file mode 100644
index 0000000..b63316f
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_artifactory_secret_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_infra_rgw_s3_artifactory_secret_key
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: a86e188093b546b2f134
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_access_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_access_key.yaml
index 97c7d23..4bfe501 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_access_key.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_access_key.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_rgw_s3_elasticsearch_access_key
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: elastic_access_key
+data: 4be40165cf243849ce24
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_secret_key.yaml b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_secret_key.yaml
index 60f0134..8e168b9 100644
--- a/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_secret_key.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_infra_rgw_s3_elasticsearch_secret_key.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_infra_rgw_s3_elasticsearch_secret_key
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: elastic_secret_key
+data: 41db866f111b9e98bda7
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_ironic_password.yaml b/site/intel-pod15/secrets/passphrases/osh_ironic_password.yaml
new file mode 100644
index 0000000..5dc8732
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_ironic_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_ironic_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: df799986b06062b67600
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_admin_password.yaml
index 6c3f446..8254de6 100644
--- a/site/intel-pod15/secrets/passphrases/osh_keystone_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_keystone_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 0bbaf9908f63abec8ffb
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_ldap_mechid_password.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_ldap_mechid_password.yaml
new file mode 100644
index 0000000..63a18a2
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_ldap_mechid_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_keystone_ldap_mechid_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: jaBKI5mnShZo
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_db_password.yaml
index 07b2206..e971645 100644
--- a/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_keystone_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: e28ff33112f431393c5f
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_admin_password.yaml
index aec85c0..44e4286 100644
--- a/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_keystone_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 251f79f6619507cb564a
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_password.yaml
index be716f4..98ba6c8 100644
--- a/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_keystone_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 8705f5bffc21bf936ecc
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_rabbitmq_erlang_cookie.yaml
index ee7e4bd..0ee87aa 100644
--- a/site/intel-pod15/secrets/passphrases/osh_keystone_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_keystone_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 77053705b0d876d70e06
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_keystone_test_password.yaml b/site/intel-pod15/secrets/passphrases/osh_keystone_test_password.yaml
new file mode 100644
index 0000000..e5ccdea
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_keystone_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_keystone_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 1ab4a7eabbfb8caff443
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_db_password.yaml
index 4d0b157..c7495dc 100644
--- a/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_neutron_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 1c52321dd18be8539320
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_admin_password.yaml
index 4ac42c9..0e66a44 100644
--- a/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_neutron_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 02c86d0afc3756f32191
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_password.yaml
index 6be02b9..3e6ecef 100644
--- a/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_neutron_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_neutron_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 7167d842dc91f63563f9
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_neutron_password.yaml b/site/intel-pod15/secrets/passphrases/osh_neutron_password.yaml
index dd0b2b6..7423bba 100644
--- a/site/intel-pod15/secrets/passphrases/osh_neutron_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_neutron_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_neutron_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6dad3c0076fc2f75adf5
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_neutron_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_neutron_rabbitmq_erlang_cookie.yaml
index 9e8ff8d..3f24985 100644
--- a/site/intel-pod15/secrets/passphrases/osh_neutron_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_neutron_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_neutron_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: c3174153efc80db4f9e0
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_neutron_test_password.yaml b/site/intel-pod15/secrets/passphrases/osh_neutron_test_password.yaml
new file mode 100644
index 0000000..4cc9c40
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_neutron_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_neutron_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 87f7ec3f8587c42b339f
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_metadata_proxy_shared_secret.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_metadata_proxy_shared_secret.yaml
index 37d5c62..dbc4142 100644
--- a/site/intel-pod15/secrets/passphrases/osh_nova_metadata_proxy_shared_secret.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_metadata_proxy_shared_secret.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_nova_metadata_proxy_shared_secret
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 97116c2cc10b6432e586
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_oslo_db_password.yaml
index 2cd60f5..086b0a1 100644
--- a/site/intel-pod15/secrets/passphrases/osh_nova_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_nova_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: de987b0a8d611000bbbe
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_admin_password.yaml
index 487bcc5..e208a45 100644
--- a/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_nova_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: cc66bf25afc7279f48fd
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_password.yaml
index 13569ba..e14016a 100644
--- a/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_nova_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 15cbdb5512e2ba31b3f6
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_password.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_password.yaml
index 4c2223d..52770a6 100644
--- a/site/intel-pod15/secrets/passphrases/osh_nova_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_nova_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: c097b9f5328cb1c48d19
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_rabbitmq_erlang_cookie.yaml
index 7a885e6..d26ee15 100644
--- a/site/intel-pod15/secrets/passphrases/osh_nova_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_nova_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: bf390ed87e3685e4120f
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_nova_test_password.yaml b/site/intel-pod15/secrets/passphrases/osh_nova_test_password.yaml
new file mode 100644
index 0000000..831640c
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_nova_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_nova_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: c174c2656414b7f92086
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_oslo_cache_secret_key.yaml b/site/intel-pod15/secrets/passphrases/osh_oslo_cache_secret_key.yaml
index 11747a7..57c41f9 100644
--- a/site/intel-pod15/secrets/passphrases/osh_oslo_cache_secret_key.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_oslo_cache_secret_key.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_oslo_cache_secret_key
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6f53155f59500f1e7891
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_oslo_db_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_oslo_db_admin_password.yaml
index 48df9ee..6179e9d 100644
--- a/site/intel-pod15/secrets/passphrases/osh_oslo_db_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_oslo_db_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_oslo_db_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 542429244cb5fa5144d7
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_oslo_db_audit_password.yaml b/site/intel-pod15/secrets/passphrases/osh_oslo_db_audit_password.yaml
new file mode 100644
index 0000000..c789f01
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_oslo_db_audit_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_oslo_db_audit_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: e07f4cf97ba8eb6a4b93af8a
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_oslo_db_exporter_password.yaml b/site/intel-pod15/secrets/passphrases/osh_oslo_db_exporter_password.yaml
index 61b4144..2e79144 100644
--- a/site/intel-pod15/secrets/passphrases/osh_oslo_db_exporter_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_oslo_db_exporter_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_oslo_db_exporter_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 9347f3f993afdcc54aa7
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_oslo_db_sst_password.yaml b/site/intel-pod15/secrets/passphrases/osh_oslo_db_sst_password.yaml
new file mode 100644
index 0000000..095b03f
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/osh_oslo_db_sst_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: osh_oslo_db_sst_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 6205c5348408e50800a3
+...
diff --git a/site/intel-pod15/secrets/passphrases/osh_oslo_messaging_admin_password.yaml b/site/intel-pod15/secrets/passphrases/osh_oslo_messaging_admin_password.yaml
index e7d97e2..aed4d7b 100644
--- a/site/intel-pod15/secrets/passphrases/osh_oslo_messaging_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_oslo_messaging_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_oslo_messaging_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 2baf2f74d688f61b01d5
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_placement_password.yaml b/site/intel-pod15/secrets/passphrases/osh_placement_password.yaml
index c72b59a..dd1f7b3 100644
--- a/site/intel-pod15/secrets/passphrases/osh_placement_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_placement_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_placement_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: ba05f4a3db6f5d385cc0
...
diff --git a/site/intel-pod15/secrets/passphrases/osh_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/osh_rabbitmq_erlang_cookie.yaml
index a3b5a2b..6795073 100644
--- a/site/intel-pod15/secrets/passphrases/osh_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/osh_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: osh_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 44c9d5f99a0dc430d736
...
diff --git a/site/intel-pod15/secrets/passphrases/ozone-mariadb-admin-password.yaml b/site/intel-pod15/secrets/passphrases/ozone-mariadb-admin-password.yaml
new file mode 100644
index 0000000..051fd29
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ozone-mariadb-admin-password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ozone-mariadb-admin-password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 77543b92b70888c87a86
+...
diff --git a/site/intel-pod15/secrets/passphrases/ozone-mariadb-ozoneuser-password.yaml b/site/intel-pod15/secrets/passphrases/ozone-mariadb-ozoneuser-password.yaml
new file mode 100644
index 0000000..432ded0
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ozone-mariadb-ozoneuser-password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ozone-mariadb-ozoneuser-password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 520dc65817c81cce0262
+...
diff --git a/site/intel-pod15/secrets/passphrases/private_docker_key.yaml b/site/intel-pod15/secrets/passphrases/private_docker_key.yaml
deleted file mode 100644
index b423174..0000000
--- a/site/intel-pod15/secrets/passphrases/private_docker_key.yaml
+++ /dev/null
@@ -1,14 +0,0 @@
----
-schema: deckhand/Passphrase/v1
-metadata:
- schema: metadata/Document/v1
- name: private_docker_key
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-# sample key for potential private docker registry
-# see Docker documentation for info on how to generate the key
-# base64 of password123
-data: cGFzc3dvcmQxMjM=
-...
diff --git a/site/intel-pod15/secrets/passphrases/ro_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ro_keystone_password.yaml
new file mode 100644
index 0000000..db5224d
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ro_keystone_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ro_keystone_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 7d3836bec472b1f52b5b
+...
diff --git a/site/intel-pod15/secrets/passphrases/ro_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/ro_oslo_db_password.yaml
new file mode 100644
index 0000000..4a3f755
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ro_oslo_db_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ro_oslo_db_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: b7ff6432ccdfc2933aa1
+...
diff --git a/site/intel-pod15/secrets/passphrases/ro_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/ro_oslo_messaging_password.yaml
new file mode 100644
index 0000000..dc2aef7
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ro_oslo_messaging_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ro_oslo_messaging_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 4b66b507477a671b884b
+...
diff --git a/site/intel-pod15/secrets/passphrases/sridhar_crypt_password.yaml b/site/intel-pod15/secrets/passphrases/sridhar_crypt_password.yaml
deleted file mode 100644
index 8e7e839..0000000
--- a/site/intel-pod15/secrets/passphrases/sridhar_crypt_password.yaml
+++ /dev/null
@@ -1,12 +0,0 @@
----
-schema: deckhand/Passphrase/v1
-metadata:
- schema: metadata/Document/v1
- name: sridhar_crypt_password
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-# Pass: password123
-data: $6$qgvZ3LC9.t59Akqy$HAJfJpdrN8Ld9ssGyjFPzyJ3WUGN.ucqhSyA25LFjBrSYboVFgX8wLomRwlf5YIn1siaXHSh4JaPJED3BO36J1
-...
diff --git a/site/intel-pod15/secrets/passphrases/tenant_ceph_fsid.yaml b/site/intel-pod15/secrets/passphrases/tenant_ceph_fsid.yaml
index 18bd485..517a78a 100644
--- a/site/intel-pod15/secrets/passphrases/tenant_ceph_fsid.yaml
+++ b/site/intel-pod15/secrets/passphrases/tenant_ceph_fsid.yaml
@@ -1,12 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: tenant_ceph_fsid
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-# uuidgen
-data: 29d8953d-0bb6-4ba1-a48a-f9be1c0937a9
+data: abd60b4a-bddb-4cfa-8219-80a1b19294f5
...
diff --git a/site/intel-pod15/secrets/passphrases/ubuntu_crypt_password.yaml b/site/intel-pod15/secrets/passphrases/ubuntu_crypt_password.yaml
new file mode 100644
index 0000000..c9bfd95
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ubuntu_crypt_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ubuntu_crypt_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: $6$IKfnXwwYKa2QoNdY$Xc9TJGLvVUV1E2AMiSedzUNaqYc2tT4nTZDbBDBXM8KAx9DlZExkP7LR2JutAk4NdjEYsd.9eP07DIz4CscGs1
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_airflow_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_airflow_oslo_messaging_password.yaml
index 33c4125..b853fbe 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_airflow_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_airflow_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_airflow_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 89c4981c0825adcd6f5b
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_airflow_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_airflow_postgres_password.yaml
index 8a1d648..f141587 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_airflow_postgres_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_airflow_postgres_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_airflow_postgres_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: a31326f9cf7f5f2f2125
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_armada_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_armada_keystone_password.yaml
index 866efcc..4f0aa77 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_armada_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_armada_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_armada_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: fea9b3b1e3650aecab84
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_barbican_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_barbican_keystone_password.yaml
index cb2da22..f1d7afa 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_barbican_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_barbican_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_barbican_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 164a0ffdadc9ad1f8345
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_barbican_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_barbican_oslo_db_password.yaml
index 95a76ed..5b2f60f 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_barbican_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_barbican_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_barbican_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 7fd97744a43f7e20da0a
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_deckhand_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_deckhand_keystone_password.yaml
index 5ee27f2..12d9aed 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_deckhand_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_deckhand_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_deckhand_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 2b357afcb6076ec8659e
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_deckhand_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_deckhand_postgres_password.yaml
index e63319b..396e2f2 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_deckhand_postgres_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_deckhand_postgres_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_deckhand_postgres_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: d7ac199f84434fe1dc9e
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_drydock_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_drydock_keystone_password.yaml
index b8083b5..b4d92c8 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_drydock_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_drydock_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_drydock_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 154e98e5d9dc3ef90514
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_drydock_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_drydock_postgres_password.yaml
index 2eff525..75cfe3b 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_drydock_postgres_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_drydock_postgres_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_drydock_postgres_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 38bd15f7d982b9050fd1
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_keystone_admin_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_keystone_admin_password.yaml
index 91f74fd..8f14ee6 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_keystone_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_keystone_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_keystone_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: e8c0978f627217977f5d
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_keystone_ldap_mechid_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_keystone_ldap_mechid_password.yaml
new file mode 100644
index 0000000..485c256
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_keystone_ldap_mechid_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_keystone_ldap_mechid_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: jaBKI5mnShZo
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_keystone_oslo_db_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_keystone_oslo_db_password.yaml
index a9cb153..ba5ac0d 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_keystone_oslo_db_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_keystone_oslo_db_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_keystone_oslo_db_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6bd6f4cf671aae6ae404
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_keystone_test_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_keystone_test_password.yaml
new file mode 100644
index 0000000..54e9c62
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_keystone_test_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_keystone_test_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 8a1c6c8f9bcbe9f1008f
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_maas_admin_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_maas_admin_password.yaml
index 402c129..d13b16a 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_maas_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_maas_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_maas_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 1f87e617edd38f29edb6
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_maas_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_maas_postgres_password.yaml
index 96ec574..6f2cad3 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_maas_postgres_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_maas_postgres_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_maas_postgres_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: fc586150e1147a00625b
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_openstack_exporter_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_openstack_exporter_keystone_password.yaml
index b513af4..47caf53 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_openstack_exporter_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_openstack_exporter_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_openstack_exporter_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 6524330ecaa616f414b9
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_oslo_db_admin_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_admin_password.yaml
index b3c1325..0bc3f2c 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_oslo_db_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_oslo_db_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 54ad0456aa41636984ef
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_oslo_db_audit_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_audit_password.yaml
new file mode 100644
index 0000000..631e486
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_audit_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_oslo_db_audit_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 7fa670df72ad480bd3551cd0
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_oslo_db_exporter_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_exporter_password.yaml
new file mode 100644
index 0000000..01d253f
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_exporter_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_oslo_db_exporter_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 0fd79883de23224dab16
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_oslo_db_sst_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_sst_password.yaml
new file mode 100644
index 0000000..36c25fe
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_oslo_db_sst_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_oslo_db_sst_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 2e182479b83b3f0f33a8
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_oslo_messaging_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_oslo_messaging_password.yaml
index 95d6c0e..aefd9ef 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_oslo_messaging_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_oslo_messaging_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_oslo_messaging_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: b57377ddd63f59a35f0e
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_postgres_admin_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_postgres_admin_password.yaml
index 546de05..dc29155 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_postgres_admin_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_postgres_admin_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_postgres_admin_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 23d988007e8348692e89
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_postgres_audit_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_postgres_audit_password.yaml
new file mode 100644
index 0000000..0d844e9
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_postgres_audit_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_postgres_audit_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: ba09e179bda413b215493acb
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_postgres_password.yaml
new file mode 100644
index 0000000..f93f605
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_postgres_exporter_postgres_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_postgres_exporter_postgres_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 5db4f4d08d7cf340e3c3
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_postgres_replica_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_postgres_replica_password.yaml
new file mode 100644
index 0000000..5588807
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_postgres_replica_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_postgres_replica_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 747d2a08baf907500062
+...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_promenade_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_promenade_keystone_password.yaml
index ac40d1e..c571bd9 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_promenade_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_promenade_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_promenade_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
data: password123
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_rabbitmq_erlang_cookie.yaml b/site/intel-pod15/secrets/passphrases/ucp_rabbitmq_erlang_cookie.yaml
index 6a2aef9..4e718af 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_rabbitmq_erlang_cookie.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_rabbitmq_erlang_cookie.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_rabbitmq_erlang_cookie
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: 66d5e88c2baee8bec7f8
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_shipyard_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_shipyard_keystone_password.yaml
index 181a52a..528712f 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_shipyard_keystone_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_shipyard_keystone_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_shipyard_keystone_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
data: password123
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_shipyard_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_shipyard_postgres_password.yaml
index de0eed7..3ca5fc1 100644
--- a/site/intel-pod15/secrets/passphrases/ucp_shipyard_postgres_password.yaml
+++ b/site/intel-pod15/secrets/passphrases/ucp_shipyard_postgres_password.yaml
@@ -1,11 +1,11 @@
---
schema: deckhand/Passphrase/v1
metadata:
- schema: metadata/Document/v1
name: ucp_shipyard_postgres_password
+ schema: metadata/Document/v1
layeringDefinition:
- abstract: false
layer: site
+ abstract: false
storagePolicy: cleartext
-data: password123
+data: aa9548df9b68d0b4041b
...
diff --git a/site/intel-pod15/secrets/passphrases/ucp_webhook_keystone_password.yaml b/site/intel-pod15/secrets/passphrases/ucp_webhook_keystone_password.yaml
new file mode 100644
index 0000000..51ad440
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/ucp_webhook_keystone_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: ucp_webhook_keystone_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 2ff5613d2f0e82fbec42
+...
diff --git a/site/intel-pod15/secrets/passphrases/xray_mongo_root_password.yaml b/site/intel-pod15/secrets/passphrases/xray_mongo_root_password.yaml
new file mode 100644
index 0000000..a6b9a11
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/xray_mongo_root_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: xray_mongo_root_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 264845d431d8770a74d7
+...
diff --git a/site/intel-pod15/secrets/passphrases/xray_mongo_user_password.yaml b/site/intel-pod15/secrets/passphrases/xray_mongo_user_password.yaml
new file mode 100644
index 0000000..55f05cd
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/xray_mongo_user_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: xray_mongo_user_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 753439fbb71c765022b4
+...
diff --git a/site/intel-pod15/secrets/passphrases/xray_postgres_password.yaml b/site/intel-pod15/secrets/passphrases/xray_postgres_password.yaml
new file mode 100644
index 0000000..c6b9013
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/xray_postgres_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: xray_postgres_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: 3638fa6b3c97d0a83c01
+...
diff --git a/site/intel-pod15/secrets/passphrases/xray_rabbitmq_password.yaml b/site/intel-pod15/secrets/passphrases/xray_rabbitmq_password.yaml
new file mode 100644
index 0000000..a74d3aa
--- /dev/null
+++ b/site/intel-pod15/secrets/passphrases/xray_rabbitmq_password.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/Passphrase/v1
+metadata:
+ name: xray_rabbitmq_password
+ schema: metadata/Document/v1
+ layeringDefinition:
+ layer: site
+ abstract: false
+ storagePolicy: cleartext
+data: e7f9baece7597844b147
+...
diff --git a/site/intel-pod15/secrets/publickey/jamesg_ssh_public_key.yaml b/site/intel-pod15/secrets/publickey/jamesg_ssh_public_key.yaml
new file mode 100644
index 0000000..2bb95e2
--- /dev/null
+++ b/site/intel-pod15/secrets/publickey/jamesg_ssh_public_key.yaml
@@ -0,0 +1,11 @@
+---
+schema: deckhand/PublicKey/v1
+metadata:
+ schema: metadata/Document/v1
+ name: jamesg_ssh_public_key
+ layeringDefinition:
+ abstract: false
+ layer: site
+ storagePolicy: cleartext
+data: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDA7b3WfWHcluL4fIRgqain/96vqLeSwmHYr6WQe1RAITFbrSfU2fgtP+9z+8l1StJUBaRVsYSQEilksQclOm6ie6LrWhOPZq3b3bl+qidQ02iK1ErHKUak1YJj35SsU+h2MAkDszgrvIK7YbM6j8CMl2UfkT2Ps+mAEqdPOxvq5v49OtYOMHfssRB2rmeSzH7LKq9h3SSjDNwmP49IjgeLahjE1fBGBBy2/arg7kpAOW+o0He3QxgkZ7bqPIHAVMAxItCJjuDjneiXtMY9SGd/CdaFmxgu+YUMVAzFNwUN+uKixisEx3TTpWWqvblw+QJAVfeq629YobvBoPO0eLfR james.gu@att.com
+...
diff --git a/site/intel-pod15/secrets/publickey/opnfv_ssh_public_key.yaml b/site/intel-pod15/secrets/publickey/jenkins_ssh_public_key.yaml
index b63fdbb..1292472 100644
--- a/site/intel-pod15/secrets/publickey/opnfv_ssh_public_key.yaml
+++ b/site/intel-pod15/secrets/publickey/jenkins_ssh_public_key.yaml
@@ -2,10 +2,10 @@
schema: deckhand/PublicKey/v1
metadata:
schema: metadata/Document/v1
- name: opnfv_ssh_public_key
+ name: jenkins_ssh_public_key
layeringDefinition:
abstract: false
layer: site
storagePolicy: cleartext
-data: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBdh8nzrD+7dOBoV44JNL8sjjIjMs79ufdi+H7W72HSWPnPF/2Ou4+YVIWCWjo+4q7UwZZdppSW59ziAt1SgUw8YerpM9kti4VDqs6BrDr7FTfaHvfiJ4c1LIu+aAE4PjHVyHmRvaxSvzqjDzuQpdxRHuvfUrJOqldTedCzkUfRXoODVP14SKv+45bv5BglL5ODoq4/5vQ2QFhVLRnPsEXwqyIz16fqqziC2PrrvCM8LPHjv/R4MtL8ekCJi3+wKTnIekD77k2FK3b6uVtyOaFmpRoKj5gg1OokxS5Pe5hizjEY3U2xuNjKB+C+KHOafJrLQmCO2AT4NXz06OQTJaD opnfv@pod15-jump
+data: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBdh8nzrD+7dOBoV44JNL8sjjIjMs79ufdi+H7W72HSWPnPF/2Ou4+YVIWCWjo+4q7UwZZdppSW59ziAt1SgUw8YerpM9kti4VDqs6BrDr7FTfaHvfiJ4c1LIu+aAE4PjHVyHmRvaxSvzqjDzuQpdxRHuvfUrJOqldTedCzkUfRXoODVP14SKv+45bv5BglL5ODoq4/5vQ2QFhVLRnPsEXwqyIz16fqqziC2PrrvCM8LPHjv/R4MtL8ekCJi3+wKTnIekD77k2FK3b6uVtyOaFmpRoKj5gg1OokxS5Pe5hizjEY3U2xuNjKB+C+KHOafJrLQmCO2AT4NXz06OQTJaD jenkins@pod15-jump
...
diff --git a/site/intel-pod15/secrets/publickey/mfix_ssh_public_key.yaml b/site/intel-pod15/secrets/publickey/mfix_ssh_public_key.yaml
deleted file mode 100644
index c06d7d8..0000000
--- a/site/intel-pod15/secrets/publickey/mfix_ssh_public_key.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
----
-schema: deckhand/PublicKey/v1
-metadata:
- schema: metadata/Document/v1
- name: mfix_ssh_public_key
- layeringDefinition:
- abstract: false
- layer: site
- storagePolicy: cleartext
-data: ssh-rsa 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 mf4716@att.com
-...
diff --git a/site/intel-pod15/site-definition.yaml b/site/intel-pod15/site-definition.yaml
index dfafb62..068cd36 100644
--- a/site/intel-pod15/site-definition.yaml
+++ b/site/intel-pod15/site-definition.yaml
@@ -8,10 +8,10 @@ metadata:
name: intel-pod15
storagePolicy: cleartext
data:
- site_type: cntt
+ site_type: cruiserlite
repositories:
global:
- revision: v1.7
+ revision: refs/changes/79/755079/5
url: https://opendev.org/airship/treasuremap.git
...
diff --git a/site/intel-pod15/software/charts/kubernetes/container-networking/etcd.yaml b/site/intel-pod15/software/charts/kubernetes/container-networking/etcd.yaml
deleted file mode 100644
index 4776953..0000000
--- a/site/intel-pod15/software/charts/kubernetes/container-networking/etcd.yaml
+++ /dev/null
@@ -1,127 +0,0 @@
----
-# The purpose of this file is to build the list of calico etcd nodes and the
-# calico etcd certs for those nodes in the environment.
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: kubernetes-calico-etcd
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: kubernetes-calico-etcd-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
- substitutions:
- # Generate a list of control plane nodes (i.e. genesis node + master node
- # list) on which calico etcd will run and will need certs. It is assumed
- # that Airship sites will have 3 control plane nodes, so this should not need to
- # change for a new site.
- - src:
- schema: pegleg/CommonAddresses/v1
- name: common-addresses
- path: .genesis.hostname
- dest:
- path: .values.nodes[0].name
- - src:
- schema: pegleg/CommonAddresses/v1
- name: common-addresses
- path: .masters[0].hostname
- dest:
- path: .values.nodes[1].name
- - src:
- schema: pegleg/CommonAddresses/v1
- name: common-addresses
- path: .masters[1].hostname
- dest:
- path: .values.nodes[2].name
-
- # Certificate substitutions for the node names assembled on the above list.
- # NEWSITE-CHANGEME: Per above, the number of substitutions should not need
- # to change with a standard Airship deployment. However, the names of each
- # deckhand certficiate should be updated with the correct hostnames for your
- # environment. The ordering is important (Genesis is index 0, then master
- # nodes in the order they are specified in common-addresses).
-
- # Genesis hostname - pod15-node1
- - src:
- schema: deckhand/Certificate/v1
- name: calico-etcd-pod15-node1
- path: .
- dest:
- path: .values.nodes[0].tls.client.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: calico-etcd-pod15-node1
- path: .
- dest:
- path: .values.nodes[0].tls.client.key
- - src:
- schema: deckhand/Certificate/v1
- name: calico-etcd-pod15-node1-peer
- path: .
- dest:
- path: .values.nodes[0].tls.peer.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: calico-etcd-pod15-node1-peer
- path: .
- dest:
- path: .values.nodes[0].tls.peer.key
-
- # master node 1 hostname - pod15-node2
- - src:
- schema: deckhand/Certificate/v1
- name: calico-etcd-pod15-node2
- path: .
- dest:
- path: .values.nodes[1].tls.client.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: calico-etcd-pod15-node2
- path: .
- dest:
- path: .values.nodes[1].tls.client.key
- - src:
- schema: deckhand/Certificate/v1
- name: calico-etcd-pod15-node2-peer
- path: .
- dest:
- path: .values.nodes[1].tls.peer.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: calico-etcd-pod15-node2-peer
- path: .
- dest:
- path: .values.nodes[1].tls.peer.key
-
- # master node 2 hostname - pod15-node3
- - src:
- schema: deckhand/Certificate/v1
- name: calico-etcd-pod15-node3
- path: .
- dest:
- path: .values.nodes[2].tls.client.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: calico-etcd-pod15-node3
- path: .
- dest:
- path: .values.nodes[2].tls.client.key
- - src:
- schema: deckhand/Certificate/v1
- name: calico-etcd-pod15-node3-peer
- path: .
- dest:
- path: .values.nodes[2].tls.peer.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: calico-etcd-pod15-node3-peer
- path: .
- dest:
- path: .values.nodes[2].tls.peer.key
-
-data: {}
-...
diff --git a/site/intel-pod15/software/charts/kubernetes/container-networking/policies.yaml b/site/intel-pod15/software/charts/kubernetes/container-networking/policies.yaml
new file mode 100644
index 0000000..c6a4f85
--- /dev/null
+++ b/site/intel-pod15/software/charts/kubernetes/container-networking/policies.yaml
@@ -0,0 +1,135 @@
+---
+schema: nc/Policy/v1
+metadata:
+ schema: metadata/Document/v1
+ name: site-policy
+ labels:
+ name: site-policy
+ layeringDefinition:
+ abstract: false
+ layer: site
+ parentSelector:
+ name: type-policy
+ actions:
+ - method: merge
+ path: .
+ storagePolicy: cleartext
+data:
+ policy:
+ sitelevel:
+ priority: 5
+ rules: []
+ hostendpoints:
+ priority: 9
+ rules:
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node1-oam
+ labels:
+ host: nc-control
+ intf-alias: oam
+ spec:
+ interfaceName: dmz.150
+ node: pod15-node1
+ expectedIPs:
+ - 10.10.150.21
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node1-ksn
+ labels:
+ host: nc-control
+ intf-alias: ksn
+ spec:
+ interfaceName: data1.152
+ node: pod15-node1
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node2-oam
+ labels:
+ host: nc-control
+ intf-alias: oam
+ spec:
+ interfaceName: dmz.150
+ node: pod15-node2
+ expectedIPs:
+ - 10.10.150.22
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node2-ksn
+ labels:
+ host: nc-control
+ intf-alias: ksn
+ spec:
+ interfaceName: data1.152
+ node: pod15-node2
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node3-oam
+ labels:
+ host: nc-control
+ intf-alias: oam
+ spec:
+ interfaceName: dmz.150
+ node: pod15-node3
+ expectedIPs:
+ - 10.10.150.23
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node3-ksn
+ labels:
+ host: nc-control
+ intf-alias: ksn
+ spec:
+ interfaceName: data1.152
+ node: pod15-node3
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node4-oam
+ labels:
+ host: nc-compute
+ intf-alias: oam
+ spec:
+ interfaceName: dmz.150
+ node: pod15-node4
+ expectedIPs:
+ - 10.10.150.24
+ - apiVersion: projectcalico.org/v3
+ kind: HostEndpoint
+ metadata:
+ name: pod15-node4-ksn
+ labels:
+ host: nc-compute
+ intf-alias: ksn
+ spec:
+ interfaceName: data1.152
+ node: pod15-node4
+# - apiVersion: projectcalico.org/v3
+# kind: HostEndpoint
+# metadata:
+# name: pod15-node5-oam
+# labels:
+# host: nc-compute
+# intf-alias: oam
+# spec:
+# interfaceName: dmz.150
+# node: pod15-node5
+# expectedIPs:
+# - 10.10.150.25
+# - apiVersion: projectcalico.org/v3
+# kind: HostEndpoint
+# metadata:
+# name: pod15-node5-ksn
+# labels:
+# host: nc-compute
+# intf-alias: ksn
+# spec:
+# interfaceName: data1.152
+# node: pod15-node5
+...
diff --git a/site/intel-pod15/software/charts/kubernetes/etcd/etcd.yaml b/site/intel-pod15/software/charts/kubernetes/etcd/etcd.yaml
deleted file mode 100644
index a0dda4c..0000000
--- a/site/intel-pod15/software/charts/kubernetes/etcd/etcd.yaml
+++ /dev/null
@@ -1,131 +0,0 @@
----
-# The purpose of this file is to build the list of k8s etcd nodes and the
-# k8s etcd certs for those nodes in the environment.
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: kubernetes-etcd
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: kubernetes-etcd-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
- substitutions:
- # Generate a list of control plane nodes (i.e. genesis node + master node
- # list) on which k8s etcd will run and will need certs. It is assumed
- # that Airship sites will have 3 control plane nodes, so this should not need to
- # change for a new site.
- - src:
- schema: pegleg/CommonAddresses/v1
- name: common-addresses
- path: .genesis.hostname
- dest:
- path: .values.nodes[0].name
- - src:
- schema: pegleg/CommonAddresses/v1
- name: common-addresses
- path: .masters[0].hostname
- dest:
- path: .values.nodes[1].name
- - src:
- schema: pegleg/CommonAddresses/v1
- name: common-addresses
- path: .masters[1].hostname
- dest:
- path: .values.nodes[2].name
-
- # Certificate substitutions for the node names assembled on the above list.
- # NEWSITE-CHANGEME: Per above, the number of substitutions should not need
- # to change with a standard Airship deployment. However, the names of each
- # deckhand certficiate should be updated with the correct hostnames for your
- # environment. The ordering is important (Genesis is index 0, then master
- # nodes in the order they are specified in common-addresses).
-
- # Genesis Exception*
- # *NOTE: This is an exception in that `genesis` is not the hostname of the
- # genesis node, but `genesis` is reference here in the certificate names
- # because of certain Promenade assumptions that may be addressed in the
- # future. Therefore `genesis` is used instead of `pod15-node1` here.
- - src:
- schema: deckhand/Certificate/v1
- name: kubernetes-etcd-genesis
- path: .
- dest:
- path: .values.nodes[0].tls.client.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: kubernetes-etcd-genesis
- path: .
- dest:
- path: .values.nodes[0].tls.client.key
- - src:
- schema: deckhand/Certificate/v1
- name: kubernetes-etcd-genesis-peer
- path: .
- dest:
- path: .values.nodes[0].tls.peer.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: kubernetes-etcd-genesis-peer
- path: .
- dest:
- path: .values.nodes[0].tls.peer.key
-
- # master node 1 hostname - pod15-node2
- - src:
- schema: deckhand/Certificate/v1
- name: kubernetes-etcd-pod15-node2
- path: .
- dest:
- path: .values.nodes[1].tls.client.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: kubernetes-etcd-pod15-node2
- path: .
- dest:
- path: .values.nodes[1].tls.client.key
- - src:
- schema: deckhand/Certificate/v1
- name: kubernetes-etcd-pod15-node2-peer
- path: .
- dest:
- path: .values.nodes[1].tls.peer.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: kubernetes-etcd-pod15-node2-peer
- path: .
- dest:
- path: .values.nodes[1].tls.peer.key
-
- # master node 2 hostname - pod15-node3
- - src:
- schema: deckhand/Certificate/v1
- name: kubernetes-etcd-pod15-node3
- path: .
- dest:
- path: .values.nodes[2].tls.client.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: kubernetes-etcd-pod15-node3
- path: .
- dest:
- path: .values.nodes[2].tls.client.key
- - src:
- schema: deckhand/Certificate/v1
- name: kubernetes-etcd-pod15-node3-peer
- path: .
- dest:
- path: .values.nodes[2].tls.peer.cert
- - src:
- schema: deckhand/CertificateKey/v1
- name: kubernetes-etcd-pod15-node3-peer
- path: $
- dest:
- path: .values.nodes[2].tls.peer.key
-
-data: {}
-...
diff --git a/site/intel-pod15/software/charts/osh-infra/fluentbit.yaml b/site/intel-pod15/software/charts/osh-infra/fluentbit.yaml
deleted file mode 100644
index 5d2f287..0000000
--- a/site/intel-pod15/software/charts/osh-infra/fluentbit.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: fluentbit
- labels:
- name: fluentbit-type
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- hosttype: fluentbit-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- pod:
- replicas:
- fluentd: 1
-...
diff --git a/site/intel-pod15/software/charts/osh-infra/fluentd.yaml b/site/intel-pod15/software/charts/osh-infra/fluentd.yaml
deleted file mode 100644
index 3652a3e..0000000
--- a/site/intel-pod15/software/charts/osh-infra/fluentd.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: fluentd
- labels:
- name: fluentd-type
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- hosttype: fluentd-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- pod:
- replicas:
- fluentd: 1
-...
diff --git a/site/intel-pod15/software/charts/osh-infra/grafana.yaml b/site/intel-pod15/software/charts/osh-infra/grafana.yaml
deleted file mode 100644
index b35614f..0000000
--- a/site/intel-pod15/software/charts/osh-infra/grafana.yaml
+++ /dev/null
@@ -1,23 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- replacement: true
- name: grafana
- labels:
- name: grafana-type
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: grafana-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- pod:
- replicas:
- grafana: 1
-...
diff --git a/site/intel-pod15/software/charts/osh-infra/ingress.yaml b/site/intel-pod15/software/charts/osh-infra/ingress.yaml
deleted file mode 100644
index d449881..0000000
--- a/site/intel-pod15/software/charts/osh-infra/ingress.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- replacement: true
- name: osh-infra-ingress-controller
- labels:
- name: osh-infra-ingress-controller-type
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: osh-infra-ingress-controller-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- pod:
- replicas:
- ingress: 1
- error_page: 1
-...
diff --git a/site/intel-pod15/software/charts/osh-infra/mariadb.yaml b/site/intel-pod15/software/charts/osh-infra/mariadb.yaml
deleted file mode 100644
index 335d4e9..0000000
--- a/site/intel-pod15/software/charts/osh-infra/mariadb.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- replacement: true
- name: osh-infra-mariadb
- labels:
- name: osh-infra-mariadb-type
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: osh-infra-mariadb-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- pod:
- replicas:
- server: 1
- ingress: 1
-...
diff --git a/site/intel-pod15/software/charts/osh-infra/prometheus.yaml b/site/intel-pod15/software/charts/osh-infra/prometheus.yaml
deleted file mode 100644
index d00e96a..0000000
--- a/site/intel-pod15/software/charts/osh-infra/prometheus.yaml
+++ /dev/null
@@ -1,35 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- replacement: true
- name: prometheus
- labels:
- name: prometheus-type
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: prometheus-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- pod:
- replicas:
- prometheus: 1
- resources:
- enabled: true
- prometheus:
- limits:
- memory: "4Gi"
- cpu: "2000m"
- requests:
- memory: "2Gi"
- cpu: "1000m"
- storage:
- requests:
- storage: 20Gi
-...
diff --git a/site/intel-pod15/software/charts/osh/openstack-compute-kit/libvirt.yaml b/site/intel-pod15/software/charts/osh/openstack-compute-kit/libvirt.yaml
deleted file mode 100644
index 85ec726..0000000
--- a/site/intel-pod15/software/charts/osh/openstack-compute-kit/libvirt.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
----
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: libvirt
- replacement: true
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: libvirt-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- network:
- backend:
- - openvswitch
- # - sriov
-...
diff --git a/site/intel-pod15/software/charts/osh/openstack-compute-kit/neutron.yaml b/site/intel-pod15/software/charts/osh/openstack-compute-kit/neutron.yaml
index 824c03d..fcbac5b 100644
--- a/site/intel-pod15/software/charts/osh/openstack-compute-kit/neutron.yaml
+++ b/site/intel-pod15/software/charts/osh/openstack-compute-kit/neutron.yaml
@@ -1,11 +1,4 @@
---
-# This file defines hardware-specific settings for neutron. If you use the same
-# hardware profile as this environment, you should not need to change this file.
-# Otherwise, you should review the settings here and adjust for your hardware.
-# In particular:
-# 1. logical network interface names
-# 2. physical device mappigns
-# TODO: Should move to global layer and become tied to the hardware profile
schema: armada/Chart/v1
metadata:
schema: metadata/Document/v1
@@ -15,60 +8,19 @@ metadata:
abstract: false
layer: site
parentSelector:
- name: neutron-type
+ name: neutron-cruiserlite
+ component: neutron
actions:
- method: merge
path: .
storagePolicy: cleartext
data:
- wait:
- timeout: 1800
- test:
- timeout: 900
values:
- labels:
- sriov:
- node_selector_key: sriov
- node_selector_value: enabled
- pod:
- security_context:
- neutron_sriov_agent:
- pod:
- runAsUser: 42424
- container:
- neutron_sriov_agent_init:
- privileged: true
- runAsUser: 0
- readOnlyRootFilesystem: false
- neutron_sriov_agent:
- readOnlyRootFilesystem: true
- privileged: true
- network:
- interface:
- sriov:
- - device: ens785f0
- num_vfs: 32
- promisc: false
- backend:
- - openvswitch
- - sriov
+ ## NOTE: "besteffort" helps prevent sriov init script from failing due to the network
+ ## card on pod 15 servers (Intel 82599ES) does not support vf true promiscious mode
+ ## setting. The "besteffort" flag was originally designed for dev environment and is
+ ## not suitable for production environment as it silents all errors during sriov init.
conf:
sriov_init:
- besteffort
- plugins:
- ml2_conf:
- ml2:
- mechanism_drivers: l2population,openvswitch,sriovnicswitch
- ml2_type_vlan:
- ## NOTE: Must have at least 1 sriov network defined
- network_vlan_ranges: external,sriovnet1:100:4000
- sriov_agent:
- securitygroup:
- firewall_driver: neutron.agent.firewall.NoopFirewallDriver
- sriov_nic:
- ## NOTE: Must have at least 1 sriov network to physical device
- ## mapping, otherwise sriov agent readiness check
- ## will fail.
- physical_device_mappings: sriovnet1:ens785f0
- exclude_devices: ""
...
diff --git a/site/intel-pod15/software/charts/osh/openstack-compute-kit/nova.yaml b/site/intel-pod15/software/charts/osh/openstack-compute-kit/nova.yaml
deleted file mode 100644
index 9761a25..0000000
--- a/site/intel-pod15/software/charts/osh/openstack-compute-kit/nova.yaml
+++ /dev/null
@@ -1,47 +0,0 @@
----
-# This file defines hardware-specific settings for nova. If you use the same
-# hardware profile as this environment, you should not need to change this file.
-# Otherwise, you should review the settings here and adjust for your hardware.
-# In particular:
-# 1. vcpu_pin_set will change if the number of logical CPUs on the hardware
-# changes.
-# 2. pci alias / passthrough_whitelist could change if the NIC type or NIC
-# slotting changes.
-# TODO: Should move to global layer and become tied to the hardware profile
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: nova
- replacement: true
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: nova-cntt
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
- substitutions:
- - src:
- schema: drydock/HardwareProfile/v1
- name: intel-pod15
- path: .cpu_sets.kvm
- dest:
- path: .values.conf.nova.DEFAULT.vcpu_pin_set
-data:
- values:
- network:
- backend:
- - openvswitch
- # - sriov
- conf:
- nova:
- filter_scheduler:
- available_filters: "nova.scheduler.filters.all_filters"
- enabled_filters: "RetryFilter,AvailabilityZoneFilter,RamFilter,CoreFilter,DiskFilter,ComputeFilter,ImagePropertiesFilter,ServerGroupAntiAffinityFilter,ServerGroupAffinityFilter,AggregateInstanceExtraSpecsFilter,AggregateCoreFilter,AggregateRamFilter,AggregateMultiTenancyIsolation,JsonFilter,IoOpsFilter,AggregateDiskFilter,AllHostsFilter,IsolatedHostsFilter,AggregateImagePropertiesIsolation,PciPassthroughFilter,AggregateIoOpsFilter,NumInstancesFilter,AggregateNumInstancesFilter,MetricsFilter,SimpleCIDRAffinityFilter,AggregateTypeAffinityFilter,NUMATopologyFilter,ComputeCapabilitiesFilter,DifferentHostFilter,SameHostFilter"
- pci:
- alias: '{"name": "numa0", "capability_type": "pci", "product_id": "154c", "vendor_id": "8086", "device_type": "type-PCI"}'
- passthrough_whitelist: |
- [{"address": "0000:05:06.*", "physical_network": "sriovnet1"},{"address": "0000:05:07.*", "physical_network": "sriovnet1"},{"address": "0000:05:08.*", "physical_network": "sriovnet1"},{"address": "0000:05:09.*", "physical_network": "sriovnet1"}]
-...
diff --git a/site/intel-pod15/software/charts/ucp/ceph/ceph-client-update.yaml b/site/intel-pod15/software/charts/ucp/ceph/ceph-client-update.yaml
deleted file mode 100644
index eb921b8..0000000
--- a/site/intel-pod15/software/charts/ucp/ceph/ceph-client-update.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
----
-# The purpose of this file is to define environment-specific parameters for ceph
-# client update
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: ucp-ceph-client-update
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: ucp-ceph-client-update-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- conf:
- pool:
- target:
- # NEWSITE-CHANGEME: Total number of OSDs. Does not need to change if
- # your HW matches this site's HW. Verify for your environment.
- # 8 OSDs per node x 3 nodes = 24
- osd: 3
-...
diff --git a/site/intel-pod15/software/charts/ucp/ceph/ceph-client.yaml b/site/intel-pod15/software/charts/ucp/ceph/ceph-client.yaml
deleted file mode 100644
index e1e8ecf..0000000
--- a/site/intel-pod15/software/charts/ucp/ceph/ceph-client.yaml
+++ /dev/null
@@ -1,100 +0,0 @@
----
-# The purpose of this file is to define envrionment-specific parameters for the
-# ceph client
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: ucp-ceph-client
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: ucp-ceph-client-global
- actions:
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- conf:
- pool:
- target:
- # NEWSITE-CHANGEME: The number of OSDs per ceph node. Does not need to
- # change if your deployment HW matches this site's HW.
- osd: 1
- spec:
- # RBD pool
- - name: rbd
- application: rbd
- replication: 1
- percent_total_data: 40
- - name: cephfs_metadata
- application: cephfs
- replication: 1
- percent_total_data: 5
- - name: cephfs_data
- application: cephfs
- replication: 1
- percent_total_data: 10
- # RadosGW pools
- - name: .rgw.root
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.control
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.data.root
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.gc
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.log
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.intent-log
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.meta
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.usage
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.users.keys
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.users.email
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.users.swift
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.users.uid
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.buckets.extra
- application: rgw
- replication: 1
- percent_total_data: 0.1
- - name: default.rgw.buckets.index
- application: rgw
- replication: 1
- percent_total_data: 3
- - name: default.rgw.buckets.data
- application: rgw
- replication: 1
- percent_total_data: 34.8
-...
diff --git a/site/intel-pod15/software/charts/ucp/ceph/ceph-osd.yaml b/site/intel-pod15/software/charts/ucp/ceph/ceph-osd.yaml
deleted file mode 100644
index 25297d9..0000000
--- a/site/intel-pod15/software/charts/ucp/ceph/ceph-osd.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
----
-# The purpose of this file is to define environment-specific parameters for
-# ceph-osd
-schema: armada/Chart/v1
-metadata:
- schema: metadata/Document/v1
- name: ucp-ceph-osd
- layeringDefinition:
- abstract: false
- layer: site
- parentSelector:
- name: ucp-ceph-osd-global
- actions:
- - method: replace
- path: .values.conf.storage.osd
- - method: merge
- path: .
- storagePolicy: cleartext
-data:
- values:
- conf:
- storage:
- osd:
- - data:
- type: directory
- location: /var/lib/ceph/osd/osd-one
- journal:
- type: directory
- location: /var/lib/ceph/journal/osd-one
-...
diff --git a/site/intel-pod15/software/charts/ucp/divingbell/divingbell.yaml b/site/intel-pod15/software/charts/ucp/divingbell/divingbell.yaml
index 7e5adb0..bfab525 100644
--- a/site/intel-pod15/software/charts/ucp/divingbell/divingbell.yaml
+++ b/site/intel-pod15/software/charts/ucp/divingbell/divingbell.yaml
@@ -8,6 +8,7 @@
schema: armada/Chart/v1
metadata:
schema: metadata/Document/v1
+ replacement: true
name: ucp-divingbell
layeringDefinition:
abstract: false
@@ -25,31 +26,19 @@ metadata:
path: .values.conf.uamlite.users[0].user_sshkeys[0]
src:
schema: deckhand/PublicKey/v1
- name: opnfv_ssh_public_key
+ name: jenkins_ssh_public_key
path: .
- dest:
path: .values.conf.uamlite.users[1].user_sshkeys[0]
src:
schema: deckhand/PublicKey/v1
- name: sridhar_ssh_public_key
- path: .
- - dest:
- path: .values.conf.uamlite.users[1].user_crypt_passwd
- src:
- schema: deckhand/Passphrase/v1
- name: sridhar_crypt_password
+ name: jamesg_ssh_public_key
path: .
- dest:
path: .values.conf.uamlite.users[2].user_sshkeys[0]
src:
schema: deckhand/PublicKey/v1
- name: mfix_ssh_public_key
- path: .
- - dest:
- path: .values.conf.uamlite.users[2].user_crypt_passwd
- src:
- schema: deckhand/Passphrase/v1
- name: mfix_crypt_password
+ name: sridhar_ssh_public_key
path: .
- dest:
path: .values.conf.uamlite.users[3].user_sshkeys[0]
@@ -57,24 +46,18 @@ metadata:
schema: deckhand/PublicKey/v1
name: cedric_ssh_public_key
path: .
- - dest:
- path: .values.conf.uamlite.users[3].user_crypt_passwd
- src:
- schema: deckhand/Passphrase/v1
- name: cedric_crypt_password
- path: .
data:
values:
conf:
uamlite:
users:
- - user_name: opnfv
+ - user_name: jenkins
user_sudo: true
user_sshkeys: []
- - user_name: sridhar
+ - user_name: jamesg
user_sudo: true
user_sshkeys: []
- - user_name: mfix
+ - user_name: sridhar
user_sudo: true
user_sshkeys: []
- user_name: cedric
diff --git a/site/intel-pod15/software/config/common-software-config.yaml b/site/intel-pod15/software/config/common-software-config.yaml
index b85499b..7ac7a83 100644
--- a/site/intel-pod15/software/config/common-software-config.yaml
+++ b/site/intel-pod15/software/config/common-software-config.yaml
@@ -13,4 +13,7 @@ data:
osh:
# NEWSITE-CHANGEME: Replace with the site name
region_name: intel-pod15
+ location:
+ # NEWSITE-CHANGEME: Replace with the site's corridor (c1 - Dev, c2 - IST, c3 - SIL, prod - PROD)
+ location_corridor: c15
...
diff --git a/site/intel-pod15/software/config/corridor.yaml b/site/intel-pod15/software/config/corridor.yaml
new file mode 100644
index 0000000..a29bfa2
--- /dev/null
+++ b/site/intel-pod15/software/config/corridor.yaml
@@ -0,0 +1,26 @@
+---
+schema: nc/CorridorConfig/v1
+metadata:
+ schema: metadata/Document/v1
+ name: corridor-config
+ layeringDefinition:
+ abstract: false
+ layer: site
+ parentSelector:
+ corridor: '1'
+ region: 'global'
+ actions:
+ - method: merge
+ path: .
+ storagePolicy: cleartext
+data:
+ corridor: 'c15'
+ infrastructure:
+ dns:
+ upstream_servers:
+ - 10.10.150.20
+ - 10.10.151.20
+ # Repeat the same values as above, but formatted as a common separated
+ # string
+ upstream_servers_joined: 10.10.150.20, 10.10.151.20
+...
diff --git a/tools/deploy.sh b/tools/deploy.sh
index 7a940a6..37c276c 100755
--- a/tools/deploy.sh
+++ b/tools/deploy.sh
@@ -121,9 +121,9 @@ pegleg_collect() {
sudo mkdir -p collect/${SITE_NAME}
sudo -E ${AIRSHIP_CMD} pegleg site -r /target/airship collect -s collect/${SITE_NAME} $SITE_NAME
-# sudo mkdir -p render/${SITE_NAME}
-# sudo -E ${AIRSHIP_CMD} pegleg site -r /target/treasuremap render $SITE_NAME \
-# -s /target/render/${SITE_NAME}/manifest.yaml
+ sudo mkdir -p render/${SITE_NAME}
+ sudo -E ${AIRSHIP_CMD} pegleg site -r /target/airship render $SITE_NAME \
+ -s /target/render/${SITE_NAME}/manifest.yaml
}
pre_genesis() {
diff --git a/tools/files/Corefile-intel-pod15 b/tools/files/Corefile-intel-pod15
new file mode 100644
index 0000000..8ec5292
--- /dev/null
+++ b/tools/files/Corefile-intel-pod15
@@ -0,0 +1,12 @@
+.:53 {
+ forward . 8.8.8.8 8.8.4.4
+ log
+ errors
+}
+
+intel-pod15.opnfv.org:53 {
+ file /root/coredns/intel-pod15.db
+ log
+ errors
+}
+
diff --git a/tools/files/intel-pod15.db b/tools/files/intel-pod15.db
new file mode 100644
index 0000000..2f3ce0e
--- /dev/null
+++ b/tools/files/intel-pod15.db
@@ -0,0 +1,25 @@
+intel-pod15.opnfv.org. IN SOA dns.intel-pod15.opnfv.org. admin.intel-pod15.opnfv.org. 2015082541 7200 3600 1209600 3600
+dns.intel-pod15.opnfv.org. IN A 10.10.150.20
+iam-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+shipyard-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+cloudformation-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+compute-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+dashboard-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+grafana-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+identity-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+image-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+kibana-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+nagios-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+network-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+nova-novncproxy-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+object-store-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+orchestration-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+placement-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+volume-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+kubernetes-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+mini-mirror-nc.intel-pod15.opnfv.org. IN A 10.10.151.129
+ranger-agent-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+ro-nc.intel-pod15.opnfv.org. IN A 10.10.150.129
+drydock-nc.intel-pod15.opnfv.org. IN A 10.10.151.129
+maas-nc.intel-pod15.opnfv.org. IN A 10.10.151.129
+