I hereby claim:
- I am andrewfarley on github.
- I am farleyfarley (https://keybase.io/farleyfarley) on keybase.
- I have a public key ASBUtTMxseOpuT_0pnSQpvra0ZWIHVQCfJGLAOhx9Ns9xAo
To claim this, I am signing this object:
#!/bin/bash | |
apt update -y && apt install awscli make joe -y | |
mkdir -p ~/.aws/ | |
cat > ~/.aws/config <<EOL | |
[default] | |
region = us-east-2 | |
aws_access_key_id = TODOTODO | |
aws_secret_access_key = TODOTODO | |
EOL | |
aws ecr get-login --region us-east-2 | sed 's/-e none//' | bash |
concurrent = 10 | |
check_interval = 0 | |
[session_server] | |
session_timeout = 1800 | |
[[runners]] | |
name = "shared-autoscaling" | |
url = "https://gitlab.WEBSITE.com/" | |
token = "AUTO-INSERTED-FROM-REGISTER" |
I hereby claim:
To claim this, I am signing this object:
kubectl create clusterrolebinding cluster-admin-binding \ | |
--clusterrole cluster-admin \ | |
--user $(gcloud config get-value account) |
import os | |
import flask | |
import requests | |
BASE_URL = 'https://YOURGITLABURL/api/v4' | |
TOKEN = 'YOURADMINAPITOKEN' | |
app = flask.Flask(__name__) |
#!/bin/bash | |
LOGFILE=/tmp/backup-gitlab-to-s3.log | |
GITLAB_BACKUP_FOLDER=/var/opt/gitlab/backups | |
S3_FILE_PREFIX=gitlab | |
S3_BUCKET_PATH=bucket-name-goes-here/gitlab-rotating-backups | |
SLACK_USERNAME="Backup Gitlab Daily - `hostname`" | |
SLACK_CHANNEL="#farley-testing" | |
# SLACK_CHANNEL="#monitoring" | |
SLACK_ICON="https://s3.amazonaws.com/kudelabs-archives/harddrive256.png" |
import bcrypt | |
import hashlib | |
import time | |
import random | |
import string | |
from datetime import datetime, date | |
print("100 iterations of hashing") | |
print("=========================") |
#!/bin/bash | |
# Install docker | |
apt-get update | |
apt-get install -y apt-transport-https ca-certificates curl software-properties-common | |
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add - | |
add-apt-repository \ | |
"deb [arch=amd64] https://download.docker.com/linux/ubuntu \ | |
$(lsb_release -cs) \ | |
stable" | |
apt-get update |
""" | |
This snippet shows how to listen for the SIGTERM signal on Unix and execute a | |
simple function open receiving it. | |
To test it out, uncomment the pid code and kill the process with: | |
$ kill -15 pid | |
""" | |
import signal | |
import sys |
[Unit] | |
Description=Keeps a tunnel to 'remote.example.com' open | |
After=network.target | |
[Service] | |
User=autossh | |
# -p [PORT] | |
# -l [user] | |
# -M 0 --> no monitoring | |
# -N Just open the connection and do nothing (not interactive) |