I hereby claim:
- I am davidski on github.
- I am davidski (https://keybase.io/davidski) on keybase.
- I have a public key whose fingerprint is A551 2C4B 205F 51D0 CEA5 2F3E 12F4 01A8 A530 0416
To claim this, I am signing this object:
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
# Based upon https://gist.github.com/tmatilai/7553006 | |
LOCAL_HTTP_PROXY = 'NOPE' | |
KEY_PATH = "D:\Primary Docs\Google Drive\AWS Keypair\SSH Keypairs\#{ENV['AWS_KEYPAIR_NAME']}.pem" | |
USER_DATA = '#!/bin/bash\nmkdir -p /etc/chef/ohai/hints\ntouch /etc/chef/ohai/hints/ec2.json > /tmp/user_data.log\necho\n' | |
# Configures vagrant-cachier and vagrant-proxyconf. | |
# Should be called only on "local machine" providers. |
{ | |
"AWSTemplateFormatVersion": "2010-09-09", | |
"Description": "Create the ELK OpsWorks Stack.", | |
"Metadata": { | |
"AWS::CloudFormation::Interface": { | |
"ParameterGroups": [{ | |
"Label": { "default": "Network"}, | |
"Parameters": [ "VpcID", "SubnetID", "KeyName" ] | |
}, { | |
"Label": { "default": "ELK Config"}, |
function pssh() | |
{ | |
Param | |
( | |
[Parameter(Mandatory=$true)] | |
[String] | |
$destinationHost = $null | |
) | |
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
Vagrant.configure(2) do |config| | |
config.vm.allowed_synced_folder_types = [:rsync] | |
config.vm.synced_folder ".", "/vagrant", disabled: false, type: 'rsync' | |
config.vm.box = 'bento/ubuntu-14.04' | |
config.vm.define "dockerhost" |
library(tm) # text manipulation | |
library(stringi) # better string replacement | |
# specify the source url and the destination location | |
uri <- 'http://www.actiononsugar.org/News%20Centre/Surveys%20/2016/170862.pdf' | |
filename <- 'sugar.pdf' | |
# be kind, download only once | |
if (!file.exists(filename)) { | |
download.file(uri, filename, mode="wb") |
#!/bin/env python | |
from __future__ import print_function | |
import json | |
import boto3 | |
#import os | |
import logging | |
# fetch environment variables | |
#model_id = os.environ['MLModelId'] |
# reusable policy for the roles which Lambda has permission to assume | |
data "aws_iam_policy_document" "lambda-assume-role-policy" { | |
statement { | |
actions = ["sts:AssumeRole"] | |
principals = { | |
type = "Service" | |
identifiers = ["lambda.amazonaws.com"] | |
} | |
} |
I hereby claim:
To claim this, I am signing this object: