Skip to content

Instantly share code, notes, and snippets.

Working from home

Kaan Karakaya TheYkk

Working from home
Block or report user

Report or block TheYkk

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View pro.yaml
apiVersion: v1
- apiVersion:
kind: Prometheus
creationTimestamp: "2019-09-24T14:59:50Z"
generation: 1
app: prometheus-operator-prometheus
chart: prometheus-operator-6.11.0
TheYkk /
Created Aug 12, 2019 — forked from denji/
Simple Sentry docker-compose.yml
  1. Download docker-compose.yml to dir named sentry
  2. Change SENTRY_SECRET_KEY to random 32 char string
  3. Run docker-compose up -d
  4. Run docker-compose exec sentry sentry upgrade to setup database and create admin user
  5. (Optional) Run docker-compose exec sentry pip install sentry-slack if you want slack plugin, it can be done later
  6. Run docker-compose restart sentry
  7. Sentry is now running on public port 9000
View sonic-benchmark_batch-push.js
var mongoose = require("mongoose");
var SonicChannelIngest = require("sonic-channel").Ingest;
var MessageModel = mongoose.model("message", new mongoose.Schema({
session_id : String,
website_id : String,
type : String,
content : Object
TheYkk / Let's encrypt wildcard TLS certificates for Azure DNS using cert-manager on AKS (Azure Kubernetes Service)

This gist will guide you through the setup of a wildcard Let's encrypt TLS certificate.

Let's encrypt

Let’s encrypt is one of a new kind of Certificate Authority. You can get a TLS certificate from them for your website free of charge and without any manual overhead. These certificates are trusted in most browsers that are out there and will show up as valid. Instead of sending Mails or even paper around you can call an API and prove your domain ownership with simple challenges. Basically you call the API with a hostname or domain name you need a TLS certificate for and you get back a challenge string that you need to put in a well known location on your http host or as a txt record in your dns system.

The little helper for Kubernetes: Cert-Manager

You can find many clients that manage the proces

View error.log
➜ sudo apt install qdirstat
[sudo] password for yk:
Reading package lists... Done
Building dependency tree
Reading state information... Done
qdirstat is already the newest version (1.5-1).
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
17 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue? [Y/n] y
View config.json
"search.useIgnoreFiles": false,
"editor.mouseWheelZoom": true,
"terminal.integrated.fontFamily": "",
"extensions.ignoreRecommendations": false,
"local-history.daysLimit": 0,
"local-history.path": "D:\\Program\\Backup",
"workbench.iconTheme": "material-icon-theme",
"editor.multiCursorModifier": "ctrlCmd",
View docker-compose.yml
version: '2'
image: gitea/gitea:1.7.1
- ./data:/data
- "3000:3000"
- "2022:22"
if [[ $DEBUG == "true" ]]; then
set -x
# Check if FQDN is given
if [ -z "$1" ]; then
echo "Usage: $0"
exit 1
TheYkk /
Created May 16, 2019 — forked from superseb/
Cleanup host added as custom to Rancher 2.0
docker rm -f $(docker ps -qa)
docker volume rm $(docker volume ls -q)
cleanupdirs="/var/lib/etcd /etc/kubernetes /etc/cni /opt/cni /var/lib/cni /var/run/calico /opt/rke"
for dir in $cleanupdirs; do
echo "Removing $dir"
rm -rf $dir
kubectl create clusterrolebinding kubernetes-dashboard --clusterrole=cluster-admin --serviceaccount=kube-system:kubernetes-dashboard
kubectl -n kube-system describe secret $(kubectl -n kube-system get secret | grep admin-user | awk '{print $1}')
You can’t perform that action at this time.