Skip to content

Instantly share code, notes, and snippets.

View install-ingress-nginx.sh
#!/bin/bash
echo "Installing ingress controller..."
echo '
apiVersion: v1
kind: Namespace
metadata:
name: ingress-nginx
labels:
app.kubernetes.io/name: ingress-nginx
View keybase.md

Keybase proof

I hereby claim:

  • I am aledbf on github.
  • I am aledbf (https://keybase.io/aledbf) on keybase.
  • I have a public key whose fingerprint is 6AFB C49A 3045 ADC1 6268 A244 7861 3601 6A8B A02A

To claim this, I am signing this object:

@aledbf
aledbf / Transantiago public endpoints.md
Created July 12, 2017 22:36 — forked from radutzan/Transantiago public endpoints.md
APIs REST públicas con data del Transantiago. Respuestas en JSON.
View Transantiago public endpoints.md

Importante

Transantiago implementó estas APIs para uso interno, por lo que no hay ninguna garantía sobre su funcionalidad, mantenimiento o futura existencia. Úsalas bajo tu propio riesgo. (Probablemente no es aconsejable que las uses para nada crítico.)

Paraderos alrededor de un punto

http://www.transantiago.cl/restservice/rest/getpuntoparada?lat=-33.6089714&lon=-70.5742975&bip=1

Estimación de parada

http://www.transantiago.cl/predictor/prediccion?codsimt=PA420&codser=504 (código de servicio es opcional, pero el parámetro debe estar presente aunque esté vacío)

Lista de servicios

View gist:9d62dbf11318168c85dd43e54cf5daa1
ipconfig | grep -E -i "IP Address" | grep -E -o "[0-9][0-9.]+"
@aledbf
aledbf / exabgp-setup.sh
Created September 6, 2016 15:41 — forked from totallyunknown/exabgp-setup.sh
Virtual IP with ExaBGP
View exabgp-setup.sh
#!/usr/bin/env bash
LOCAL_AS=65210
PEER_AS=65200
LB_IP="1.2.3.4"
HOST_IP=`ip address list | grep "scope global" | grep -v "scope global lo" | cut -d" " -f6 | cut -d"/" -f 1`
GATEWAY=`ip route | grep "^default" | cut -d" " -f3`
EXA_BGP_CONFIG="/etc/exabgp/exabgp.conf"
EXA_BGP_CHECK="/etc/exabgp/exabgp-check.sh"
View Transparent Proxy to docker containers.md

This is an example of using Linux Kernel's Transparent Proxy to route all TCP traffic to docker containers without having to resort to PROXY protocol which is not supported by some applications (e.g. sshd). To get the demo to work you only need vagrant installed:

git clone [this-gist] tproxy-demo
cd tproxy-demo
vagrant up
View haproxy-rc.yaml
apiVersion: v1
kind: ReplicationController
metadata:
name: service-loadbalancer
labels:
app: service-loadbalancer
version: v1
spec:
replicas: 1
selector:
View storifyeditor-haproxy.cfg
global
log 127.0.0.1:514 local0
defaults
mode http
log global
option httplog
option http-server-close
option dontlognull
option redispatch
@aledbf
aledbf / haproxy.cfg
Created October 13, 2015 19:58 — forked from GABeech/haproxy.cfg
Stack Exchange HAProxy
View haproxy.cfg
# This is an example of the Stack Exchange Tier 1 HAProxy config
# The only things that have been changed from what we are running are:
# 1. User names have been removed
# 2. All Passwords have been remove
# 3. IPs have been changed to use the example/documentation ranges
# 4. Rate limit numbers have been changed to randome numbers, don't read into them
userlist stats-auth
group admin users $admin_user
user $admin_user insecure-password $some_password