Skip to content

Commit 0fb0735

Browse files
authored
Update validate-signed-container-images.md
1 parent af3c900 commit 0fb0735

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

AKS-Arc/validate-signed-container-images.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -136,15 +136,15 @@ Sample output:
136136

137137
| NAME | STATUS | ROLES | AGE | VERSION | INTERNAL-IP | EXTERNAL-IP | OS-IMAGE | KERNEL-VERSION | CONTAINER-RUNTIME |
138138
|-------------------|--------|--------------|-------|---------|-----------------|-------------|---------------------------|------------------------|-----------------------------|
139-
| moc-lsbe393il9d | Ready | control-plane| 3h14m | 1.30.4 | 100.72.248.133 | None | CBL-Mariner/Linux | 5.15.173.1-2.cm2 | containerd://1.6.26 |
140-
| moc-lzwagtkjah5 | Ready | None | 3h12m | 1.30.4 | 100.72.248.134 | None | CBL-Mariner/Linux | 5.15.173.1-2.cm2 | containerd://1.6.26 |
141-
| moc-wlcjnwn5n02 | Ready | None | 14m | 1.30.4 | 100.72.248.135 | None | Windows Server 2022 Datacenter | 10.0.20348.2700 | containerd://1.6.21+Azure |
139+
| moc-lsbe393il9d | Ready | control-plane| 3h14m | 1.30.4 | 100.0.12.133 | None | CBL-Mariner/Linux | 5.15.173.1-2.cm2 | containerd://1.6.26 |
140+
| moc-lzwagtkjah5 | Ready | None | 3h12m | 1.30.4 | 100.0.12.134 | None | CBL-Mariner/Linux | 5.15.173.1-2.cm2 | containerd://1.6.26 |
141+
| moc-wlcjnwn5n02 | Ready | None | 14m | 1.30.4 | 100.0.12.135 | None | Windows Server 2022 Datacenter | 10.0.20348.2700 | containerd://1.6.21+Azure |
142142

143143
From this sample output:
144144

145-
- Control plane IP is 100.72.248.133 (where the ROLES value is `control-plane` and OS image is `CBL-Mariner/Linux`).
146-
- Linux node IP is 100.72.248.134 (where the ROLES value is `none` and OS image is `CBL-Mariner/Linux`).
147-
- Windows node IP is 100.72.248.135 (where the OS image is `Windows Server 2022`).
145+
- Control plane IP is 100.0.12.133 (where the ROLES value is `control-plane` and OS image is `CBL-Mariner/Linux`).
146+
- Linux node IP is 100.0.12.134 (where the ROLES value is `none` and OS image is `CBL-Mariner/Linux`).
147+
- Windows node IP is 100.0.12.135 (where the OS image is `Windows Server 2022`).
148148

149149
## Step 3: run the image validation script on the control plane and worker nodes
150150

@@ -155,43 +155,43 @@ These steps work for both the control plane node and Linux worker node since the
155155
1. Check if the commands can be run on the Linux VM (assuming the private key is in **C:\Users\Administrator\.ssh**):
156156

157157
```bash
158-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.72.248.133 "sudo crictl images --no-trunc"
158+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.0.12.133 "sudo crictl images --no-trunc"
159159
```
160160

161161
1. Copy the Linux-specific files to the Linux VM:
162162

163163
```bash
164-
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\linux\* clouduser@100.72.248.133:.
164+
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\linux\* clouduser@100.0.12.133:.
165165
```
166166

167167
1. Mark the notation binary file as executable:
168168

169169
```bash
170-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.72.248.133 "sudo chmod +x notation"
170+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.0.12.133 "sudo chmod +x notation"
171171
```
172172

173173
1. Execute commands to validate image signature verification. This step can take around 2-5 minutes:
174174

175175
```bash
176-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.72.248.133 "sudo python3 LinuxImageValidate.py"
176+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.0.12.133 "sudo python3 LinuxImageValidate.py"
177177
```
178178

179179
1. Copy the output file to the local directory:
180180

181181
```bash
182-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.72.248.133 "sudo cat imagevalidation_results_linux.json" > imagevalidation_results_controlplane.json
182+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.0.12.133 "sudo cat imagevalidation_results_linux.json" > imagevalidation_results_controlplane.json
183183
```
184184

185185
1. Clean up all files copied to the VM:
186186

187187
```bash
188-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.72.248.133 rm LinuxImageValidate.py notation tsa.crt ca.crt LICENSE imagevalidation_results_linux.json results.yaml
188+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no clouduser@100.0.12.133 rm LinuxImageValidate.py notation tsa.crt ca.crt LICENSE imagevalidation_results_linux.json results.yaml
189189
```
190190

191191
1. Clean up the IP reference from the SSH cache:
192192

193193
```bash
194-
ssh-keygen -R 100.72.248.133
194+
ssh-keygen -R 100.0.12.133
195195
```
196196

197197
Sample output:
@@ -236,41 +236,41 @@ These steps work on all supported Windows OS worker nodes.
236236
1. Check if the commands can be run on the Windows VM (assuming the private key is in folder **C:\Users\Administrator\.ssh**):
237237

238238
```bash
239-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no Administrator@100.72.248.135 "crictl images --no-trunc"
239+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" -o StrictHostKeyChecking=no Administrator@100.0.12.135 "crictl images --no-trunc"
240240
```
241241

242242
1. Copy the Windows-specific files inside the Windows VM:
243243

244244
```bash
245-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.72.248.135 "powershell -ExecutionPolicy Bypass mkdir c:\win"
246-
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\ca.crt Administrator@100.72.248.135:c:\win\ca.crt
247-
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\notation.exe Administrator@100.72.248.135:c:\win\notation.exe
248-
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\tsa.crt Administrator@100.72.248.135:c:\win\tsa.crt
249-
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\WindowsImageValidate.ps1 Administrator@100.72.248.135:c:\win\WindowsImageValidate.ps1
245+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.0.12.135 "powershell -ExecutionPolicy Bypass mkdir c:\win"
246+
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\ca.crt Administrator@100.0.12.135:c:\win\ca.crt
247+
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\notation.exe Administrator@100.0.12.135:c:\win\notation.exe
248+
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\tsa.crt Administrator@100.0.12.135:c:\win\tsa.crt
249+
scp -i "C:\Users\Administrator\.ssh\id_rsa" C:\imagesign\win\WindowsImageValidate.ps1 Administrator@100.0.12.135:c:\win\WindowsImageValidate.ps1
250250
```
251251

252252
1. Execute commands to validate image signature verification. This step can take around 2-5 minutes:
253253

254254
```bash
255-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.72.248.135 "powershell -ExecutionPolicy Bypass -File c:\win\WindowsImageValidate.ps1"
255+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.0.12.135 "powershell -ExecutionPolicy Bypass -File c:\win\WindowsImageValidate.ps1"
256256
```
257257

258258
1. Copy the output file to the local directory:
259259

260260
```bash
261-
scp -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.72.248.135:c:\win\imagevalidation_results_windows.json C:\imagesign\imagevalidation_results_windows.json
261+
scp -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.0.12.135:c:\win\imagevalidation_results_windows.json C:\imagesign\imagevalidation_results_windows.json
262262
```
263263

264264
1. Clean up all files copied to the VM:
265265

266266
```bash
267-
ssh -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.72.248.135 "powershell -ExecutionPolicy Bypass remove-item -force c:\win"
267+
ssh -i "C:\Users\Administrator\.ssh\id_rsa" Administrator@100.0.12.135 "powershell -ExecutionPolicy Bypass remove-item -force c:\win"
268268
```
269269

270270
1. Clean up IP reference from the SSH cache:
271271

272272
```bash
273-
ssh-keygen -R 100.72.248.135
273+
ssh-keygen -R 100.0.12.135
274274
```
275275

276276
Sample output:

0 commit comments

Comments
 (0)