19.06.2021 Views

148422597X Kubernetes Management Design Patterns [Vohra 2017-01-29] {E559F6BB}

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2 ■ Kubernetes on CoreOS on AWS

Figure 2-2 shows the output from this command. As you can see, the key fingerprint is 18AD 5014 C99E

F7E3 BA5F 6CE9 50BD D3E0 FC8A 365E, which is the correct key fingerprint; the value is a constant.

Figure 2-2. Importing and validating the CoreOS application signing key

Donwload the latest release tarball and detached signature (.sig) for kube-aws from https://github.

com/coreos/coreos-kubernetes/releases:

wget https://github.com/coreos/coreos-kubernetes/releases/download/v0.7.1/kube-aws-linuxamd64.tar.gz

wget https://github.com/coreos/coreos-kubernetes/releases/download/v0.7.1/kube-aws-linuxamd64.tar.gz.sig

Validate the tarball’s GPG signature.

gpg2 --verify kube-aws-linux-amd64.tar.gz.sig kube-aws-linux-amd64.tar.gz

The primary key fingerprint should be 18AD 5014 C99E F7E3 BA5F 6CE9 50BD D3E0 FC8A 365E, as

shown in Figure 2-3.

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!