Skip to content

Instantly share code, notes, and snippets.

View dylanninin's full-sized avatar
🏠
Working from home

dylanninin dylanninin

🏠
Working from home
View GitHub Profile
# Compiled source #
###################
*.com
*.class
*.dll
*.exe
*.o
*.so
# Packages #
@dylanninin
dylanninin / StrongSwan_build_notes.txt
Created August 13, 2021 04:20 — forked from metral/StrongSwan_build_notes.txt
StrongSwan vici python usage snippet
# install notes for ubuntu 14.04 / odroid xu4
sudo apt-get install libgmp3-dev
# dont apt-get StrongSwan! (its really old)
wget https://download.strongswan.org/strongswan-5.5.1.tar.bz2
tar xvfj strongswan-5.5.1.tar.bz2
cd strongswan-5.5.1
sudo ./configure --prefix=/usr --sysconfdir=/etc --enable-python-eggs --enable-python-eggs-install --enable-vici
sudo make
sudo make install
@dylanninin
dylanninin / curl.conf
Last active August 7, 2021 10:33
website response speed monitor with collectd
# file: curl.conf
LoadPlugin curl
<Plugin curl>
<Page "bing_cn">
URL "https://cn.bing.com"
MeasureResponseTime true
MeasureResponseCode true
<Statistics>
TotalTime true
NamelookupTime true
@dylanninin
dylanninin / .gitconfig
Created February 18, 2016 16:36 — forked from pksunkara/config
Sample of git config file (Example .gitconfig)
[user]
name = Pavan Kumar Sunkara
email = pavan.sss1991@gmail.com
[core]
editor = vim
whitespace = fix,-indent-with-non-tab,trailing-space,cr-at-eol
excludesfile = ~/.gitignore
[sendemail]
smtpencryption = tls
smtpserver = smtp.gmail.com
@dylanninin
dylanninin / alisms.py
Last active November 14, 2020 07:21
阿里云短信的 Python sdk 简直无法直视:1)居然直接提供下载链接,而不能 pip install;2)不支持 Python 3;3)Python 写出了 Java 的感觉。。。以下是 Python 3 的一个简化版本,由同事提供,我做了简单调整。
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import base64
import datetime
import hmac
import json
import urllib
import uuid
@dylanninin
dylanninin / Netfilter-IPTables-Diagrams.md
Created April 12, 2018 08:38 — forked from nerdalert/Netfilter-IPTables-Diagrams.md
Linux NetFilter, IP Tables and Conntrack Diagrams

Linux NetFilter, IP Tables and Conntrack Diagrams

IPTABLES TABLES and CHAINS

IPTables has the following 4 built-in tables.

1) Filter Table

Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.

@dylanninin
dylanninin / log4j.properties
Created November 12, 2013 05:48
A configuration for log4j properties. Be free to use it as a template and modify at will. Reference http://logging.apache.org/
#Log4J配置
#定义日志输出级别和输出流重定向
#修订历史:
# 2013-11-12 dylanninin@gmail.com init
log4j.rootLogger=CONSOLE,ROLLING_FILE,MAIL
log4j.addivity.org.apache=true
#####################################################################
#输出日志信息到控制台 级别INFO
log4j.appender.CONSOLE=org.apache.log4j.ConsoleAppender
log4j.appender.Threshold=DEBUG
@dylanninin
dylanninin / tmux.conf
Created May 3, 2018 09:30
tmux dot conf
# cat << EOF > /dev/null
# https://github.com/gpakosz/.tmux
# (‑●‑●)> dual licensed under the WTFPL v2 license and the MIT license,
# without any warranty.
# Copyright 2012— Gregory Pakosz (@gpakosz).
# /!\ do not edit this file
# instead, override settings in ~/.tmux.conf.local, see README.md
# -- general -------------------------------------------------------------------

MicroService Proxy Gateway Solutions

Kong, Traefik, Caddy, Linkerd, Fabio, Vulcand, and Netflix Zuul seem to be the most common in microservice proxy/gateway solutions. Kubernetes Ingress is often a simple Ngnix, which is difficult to separate the popularity from other things.

Github Star Trend:

Github Star History for Kong vs traefik vs fabio vs caddy vs Zuul

This is just a picture of this link from Feb

@dylanninin
dylanninin / iptables_rules.sh
Created June 27, 2018 12:43 — forked from virtualstaticvoid/iptables_rules.sh
25 Most Frequently Used Linux IPTables Rules Examples
# Modify this file accordingly for your specific requirement.
# http://www.thegeekstuff.com
# 1. Delete all existing rules
iptables -F
# 2. Set default chain policies
iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT DROP