dhclient is the Dynamic Host Configuration Protocol (DHCP) Client one would use to allow a client to connect to a DHCP server.
$ sudo nano /etc/rc.local
#!/bin/bash
dhclient
exit 0| // | |
| // Basic instrumentation profiler by Cherno | |
| // Usage: include this header file somewhere in your code (eg. precompiled header), and then use like: | |
| // | |
| // Instrumentor::Get().BeginSession("Session Name"); // Begin session | |
| // { | |
| // InstrumentationTimer timer("Profiled Scope Name"); // Place code like this in scopes you'd like to include in profiling | |
| // // Code | |
| // } |
dhclient is the Dynamic Host Configuration Protocol (DHCP) Client one would use to allow a client to connect to a DHCP server.
$ sudo nano /etc/rc.local
#!/bin/bash
dhclient
exit 0| systemctl stop [servicename] | |
| systemctl disable [servicename] | |
| rm /etc/systemd/system/[servicename] | |
| rm /etc/systemd/system/[servicename] symlinks that might be related | |
| systemctl daemon-reload | |
| systemctl reset-failed |
| #!/bin/bash | |
| usage() { | |
| echo "Usage $0 -c mongo_docker_container_name" | |
| } | |
| while [[ $# > 1 ]] | |
| do | |
| key="$1" |
| # Backup DB | |
| docker run \ | |
| --rm \ | |
| --link running_mongo:mongo \ | |
| -v /data/mongo/backup:/backup \ | |
| mongo \ | |
| bash -c ‘mongodump --out /backup --host $MONGO_PORT_27017_TCP_ADDR’ | |
| # Download the dump | |
| scp -r USER@REMOTE:/data/mongo/backup ./backup | |
| # Configuration options are limited to SSL/TLS | |
| # Enable SSL session caching for improving performance by avoiding the costly session negotiation process where possible | |
| # SSL Labs doesn't assume that SNI is available to the client, so it only tests the default virtual server | |
| # setting this globally to make it work across all the nginx virtual servers (including the default virtual server) | |
| ssl_session_cache shared:ssl_session_cache:10m; | |
| ssl_session_timeout 10m; | |
| server { | |
| listen 443 ssl; |
| # Basically the nginx configuration I use at konklone.com. | |
| # I check it using https://www.ssllabs.com/ssltest/analyze.html?d=konklone.com | |
| # | |
| # To provide feedback, please tweet at @konklone or email eric@konklone.com. | |
| # Comments on gists don't notify the author. | |
| # | |
| # Thanks to WubTheCaptain (https://wubthecaptain.eu) for his help and ciphersuites. | |
| # Thanks to Ilya Grigorik (https://www.igvita.com) for constant inspiration. | |
| server { |
| #!/bin/bash | |
| # | |
| # -------------------------------------------------------------------------------------------- | |
| # Nginx IP Address Deny List download and format | |
| # -------------------------------------------------------------------------------------------- | |
| # This file pulls from http://www.stopforumspam.com/downloads/bannedips.zip to | |
| # retrieve a list of IPs known to be associated with spam. The program | |
| # downloads, unzips, and formats the IP addresses into an NGINX config using | |
| # 'deny' | |
| # |
The shorewall documentation explains in http://shorewall.org/Docker.html how to configure shorewall for use with docker. The problem with the configuration is that it only allows connections from the host to the main bridge docker0. Connections to other networks on dynamically created bridges, with names starting by default with br-, is blocked. Instead of the recommended contents of /etc/shorewall/interfaces, use wild-card interface names as follows:
#ZONE INTERFACE OPTIONS
#dock docker0 bridge # disabled default recommendation
dock docker0 physical=docker+,routeback=1
dock br physical=br-+,routeback=1
| #!/bin/bash | |
| # Script to install the virtual packages for Hyper-V in Debian | |
| echo "Installing the needed packages..." | |
| apt install hyperv-daemons | |
| echo "" | |
| echo "Making the needed changes to '/etc/initramfs-tools/modules' ..." | |
| echo "" >> /etc/initramfs-tools/modules |