Skip to content

Instantly share code, notes, and snippets.

@TimoDJatomika
TimoDJatomika / current-dyn-ip.sh
Last active February 13, 2018 14:51
Everytime your dynamic IP changes you get a slack notification. How cool is that!
#!/bin/bash
# author: Timo Stankowitz <timo.stankowitz@gmail.com>
# create date: 2017-11-17
# last change: 2018-02-13
# version 3
# everytime your dynamic ip changes you get a notification to your slack channel
# with the current dynamic ip of your router
# create a cronjob and let the script execute every 5 minutes
@TimoDJatomika
TimoDJatomika / config-vault.sh
Last active December 24, 2018 17:45
setup of a high availability vault cluster: setup vault
#!/bin/bash
# author: Timo Stankowitz <timo.stankowitz@inf.h-brs.de>
# version: 6
# last (working) test: 2018-12-24
# use the script to configure vault.
mkdir vault-config vault-log
cd vault-config
wget https://vault-ha.de/files/vault-config.hcl
@TimoDJatomika
TimoDJatomika / config-other-consul-instance.sh
Last active January 18, 2018 09:12
setup of a high availability vault cluster: other instances - setup consul
#!/bin/bash
# author: Timo Stankowitz <timo.stankowitz@smail.inf.h-brs.de>
# version: 2
# other instances: setup consul
# create directory
mkdir consul-persistent-data
mkdir consul-config
@TimoDJatomika
TimoDJatomika / consul-docker-config.sh
Last active December 24, 2018 17:36
setup of a high availability vault cluster: consul setup
#!/bin/bash
# author: Timo Stankowitz <timo.stankowitz@inf.h-brs.de>
# version: 6
# last (working) test: 2018-12-24
# prerequirement: all instances must have the "aws tag" "Cluster" with the value of "vault-cluster"
# create directories
mkdir consul-persistent-data
mkdir consul-config
@TimoDJatomika
TimoDJatomika / acl-ro-hbrs.hcl
Created November 7, 2017 22:16
Read Only Access Controll List for HBRS Students
path "secret/hbrs/*" {
policy = "read"
}
@TimoDJatomika
TimoDJatomika / init-server.sh
Last active December 12, 2018 15:38
Erstellen von drei AWS EC2 Instanzen für den Aufbau eines Hochverfügbaren Vault Clusters
#!/bin/bash
# author: Timo Stankowitz <timo.stankowitz@inf.h-brs.de>
# create date: 2017-11-04
# last change: 2018-12-12
# version 5
# this script creates 3 servers in 3 different AZ's in EU-Central (aka. Frankfurt)
# make sure you have the following variables set in your .bashrc or declare it in this script
# - AWS_ACCESS_KEY_ID
@TimoDJatomika
TimoDJatomika / consul-backend.hcl
Created July 9, 2017 13:47
Example: Vault using Consul as Backend
backend "consul" {
address = "127.0.0.1:8500"
token = "398073a8-5091-4d9c-871a-bbbeb030d1f6"
path = "vault/"
}
listener "tcp" {
address = "0.0.0.0:8200"
tls_disable = "true"
}
backend "file" {
path = "/vault/filestorage"
}
listener "tcp" {
address = "0.0.0.0:8200"
tls_disable = "true"
}

Keybase proof

I hereby claim:

  • I am timodjatomika on github.
  • I am timo_dwins (https://keybase.io/timo_dwins) on keybase.
  • I have a public key ASDtfaDH6-wP3gekhCTF_GwvjXaW7YI2LPihGZfK2Xnl9Qo

To claim this, I am signing this object:

@TimoDJatomika
TimoDJatomika / output
Created December 26, 2016 21:51
dig on vpn.brainoftimo.com
root@strongswan:~# dig A vpn.brainoftimo.com
; <<>> DiG 9.10.3-P4-Ubuntu <<>> A vpn.brainoftimo.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23467
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512