Skip to content

Instantly share code, notes, and snippets.

View temp.md

ensure clean plan

taint

e.g. terraform taint --module=vpc.lbs aws_instance.this.1

remove from cluster

set host and fingerprint in user data

first time to 2 or 3

then to 1 when doing 2 and 3

apply

double check plan

ami diff

@ehershey
ehershey / incognitoTrick.js
Last active Jul 9, 2018 — forked from matyasfodor/incognitoTrick.js
Tampermonkey script to fake incognito check
View incognitoTrick.js
// ==UserScript==
// @name Incognito trick
// @namespace http://tampermonkey.net/
// @version 0.1
// @description Prevent sites detecting if you're in incognito by calling the success callback of webkitRequestFileSystem even if it's failing.
// @author You
// @run-at document-start
// @match http://www.cnbc.com/*
// @grant none
// ==/UserScript==
View keybase.md

Keybase proof

I hereby claim:

  • I am ehershey on github.
  • I am ehershey (https://keybase.io/ehershey) on keybase.
  • I have a public key ASDAlXz05PmSafUYDLsxCJk-vNoiPWG52a1xvTYvMXdJ5go

To claim this, I am signing this object:

@ehershey
ehershey / bigredbuttonosx
Last active May 24, 2018
How to use the Dream Cheeky Big Red Button on a Mac in OS X
View bigredbuttonosx
# Alternative to homebrew - install Mono directly via http://download.mono-project.com/archive/3.12.1/macos-10-x86/MonoFramework-MDK-3.12.1.macos10.xamarin.x86.pkg
# Install homebrew -
ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
# Install mono
brew install mono
# Download windows executable
open https://www.dropbox.com/s/3xmsr8cw02dfkl3/DreamCheekyBTN.zip
# Unzip
unzip DreamCheekyBTN.zip
# Create script
View pivot-distros.pl
#!/usr/bin/perl
# input is TSV in format with headers below from spreadsheet e.g. https://docs.google.com/spreadsheets/d/19itb2SErcZXT8AeCPylTZ0pXaTyZMwl5ncsGZ0ajsJM/edit#gid=0
# month, project, distro, cost, hours, tasks
#
# Output is TSV with column per distro suitable for stacked area chart
#
#
use Data::Dumper;
my $data = {};
View windowsnewpass.sh
#!/bin/sh
#
# windowsnewpass.sh
#
# Usage: windowsnewpass.sh [ <PASSWORD> ]
#
# A new password will be randomly generated if none is specified.
# The password can then be used for logging into the host via RDP.
#
#
View -
import boto3
from google.appengine.ext import testbed
import json
from google.appengine.api import mail
from google.appengine.api import urlfetch
testbed = testbed.Testbed()
testbed.activate()
@ehershey
ehershey / todo 20160707.md
Last active Jul 7, 2016
todo 20160707.md
View todo 20160707.md
  • email i
  • email ii
  • email iii
  • test new packages
  • lunch
  • new package CR
  • Re-review scope doc
  • 30 minutes on kdc scope doc
  • jira sweep
  • Double check r+r calendar
View todo 20160708.md
  • email i
  • email ii
  • email iii
  • lunch
  • Re-review scope doc
  • run
  • Chef meeting
  • Ask BM about epic name
  • Later
    • Email KR about 360R
@ehershey
ehershey / todo 20160706.md
Last active Jul 7, 2016
todo 20160706.md
View todo 20160706.md
  • email i
  • email ii
  • email iii
  • new packaging patch build
  • lunch
  • BF sweep
  • Re-review scope doc
  • 30 minutes on kdc scope doc
  • jira sweep
  • Look up flight info