I hereby claim:
- I am ErmisCat on github.
- I am ermiscat (https://keybase.io/ermiscat) on keybase.
- I have a public key whose fingerprint is 2681 D3F7 3641 1D00 E0D4 F1DC B414 0C93 B2BD DC7E
To claim this, I am signing this object:
| <!doctype html> | |
| <title>Site Maintenance</title> | |
| <style> | |
| body { text-align: center; padding: 150px; } | |
| h1 { font-size: 50px; } | |
| body { font: 20px Helvetica, sans-serif; color: #333; } | |
| article { display: block; text-align: left; width: 650px; margin: 0 auto; } | |
| a { color: #dc8100; text-decoration: none; } | |
| a:hover { color: #333; text-decoration: none; } | |
| </style> |
| #-------------------------------------------------------------- | |
| # This module creates all resources necessary for a beanstalk | |
| # application and environment | |
| #-------------------------------------------------------------- | |
| variable "env_name" {} | |
| variable "vpc_id" {} | |
| variable "beanstalk_solution_stack_name" {} | |
| variable "beanstalk_private_subnets" {} | |
| variable "beanstalk_public_subnets" {} |
| resource "aws_iam_instance_profile" "beanstalk_service" { | |
| name = "beanstalk-service-user" | |
| roles = ["${aws_iam_role.beanstalk_service.name}"] | |
| } | |
| resource "aws_iam_instance_profile" "beanstalk_ec2" { | |
| name = "beanstalk-ec2-user" | |
| roles = ["${aws_iam_role.beanstalk_ec2.name}"] | |
| } |
| #!/bin/bash | |
| DATE=$(date "+%Y-%m-%d") | |
| GITHUB_OWNER=petenelson | |
| BACKUPS_DIR=~/backups | |
| TAR_FILE=github-repos-$DATE.tar.gz | |
| S3_BUCKET=s3://github-offsite-backup | |
| # Creates a directory if it doesn't exist | |
| # $1: dir path |
| #!/bin/bash | |
| # MKDIR /backup | |
| # git clone this script there | |
| # SETUP CRONTAB: | |
| # crontab -e | |
| # PATH=/usr/local/bin:/bin:/usr/bin:/usr/local/sbin:/usr/sbin:/sbin:/opt/aws/bin | |
| # 0 0 * * * cd /backup && ./jenkins-backup-s3.sh | |
| set -ex |
| #!/bin/bash | |
| AWSENV="sandbox" | |
| SNSTOPIC="sandbox-autoscale" | |
| REGION="us-east-1" | |
| TOPICARN=$(aws-vault exec $AWSENV -- aws sns create-topic --name $SNSTOPIC --region $REGION | grep arn | cut -d'"' -f4) | |
| AUTOSCALEARRAY=($(aws-vault exec $AWSENV -- aws autoscaling describe-auto-scaling-groups --region $REGION | grep AWSEBAutoScalingGroup | sort | uniq -u | cut -d'"' -f4 | grep stack | grep -v arn)) |
| #!/usr/bin/env python | |
| # Guide + Original: | |
| # http://www.systemsup.co.uk/automating-puppet-ssl-certificates-in-an-aws-autoscaling-environment/ | |
| # | |
| # I use a different method for autosigning certificates, using csr_attributes w/ password OID | |
| # I just needed a revocation method so I re-wrote this script to suit my needs. | |
| # This script is crontab'd on the puppet master | |
| # */5 * * * * /bin/python /scriptlocation/revoke.py us-east-1 SQSNAME >> /var/log/revoke.log | |
| # | |
| # Ermis Catevatis |
I hereby claim:
To claim this, I am signing this object:
| function add_ado_git_branch() { | |
| local project="<project name>" | |
| local title=$1 | |
| local description=$2 | |
| local org_url="https://dev.azure.com/<org name>" | |
| local api_version="6.0" | |
| local feature_id="<target feature id>" # (to link as parent to the created story) | |
| local assigned_to="<Your Name in Azure Devops>" | |
| local area="<org name>/<board name>" |
| #!/bin/bash | |
| # Check if the input file is provided | |
| if [ -z "$1" ]; then | |
| echo "Usage: $0 <input-xml-file>" | |
| exit 1 | |
| fi | |
| INPUT_FILE="$1" | |
| OUTPUT_FILE="${INPUT_FILE%.xml}.md" |