Skip to content

Instantly share code, notes, and snippets.

View gitlabbin's full-sized avatar

Brian Chen gitlabbin

View GitHub Profile
@gitlabbin
gitlabbin / database.tf
Created September 29, 2022 06:46 — forked from smiller171/database.tf
Manage RDS password in Terraform in a sane way
resource "random_password" "db_master_pass" {
length = 40
special = true
min_special = 5
override_special = "!#$%^&*()-_=+[]{}<>:?"
keepers = {
pass_version = 1
}
}
<?xml version="1.0" encoding="UTF-8"?><unload unload_date="2018-12-04 10:46:50">
<sys_remote_update_set action="INSERT_OR_UPDATE">
<application display_value="Global">global</application>
<application_name>Global</application_name>
<application_scope>global</application_scope>
<application_version/>
<collisions/>
<commit_date/>
<deleted/>
<description>Automatically created by the system</description>
@gitlabbin
gitlabbin / config.yml
Created September 7, 2018 05:59 — forked from valdemon/config.yml
Enable ECR (AWS) registries for Spinnaker with Kubernetes provider
# A part of the Halyard config file declaring the ECR registries.
# There can be multiple registries, each in different AWS account.
# In this example there are 3 "stages" accounts - dev, stage & live.
# NOTE: The declared password files must exist and provide valid base64 encoded values,
# otherwise Halayrd will endup with an exception during deployment.
# The values can be fake, they will be updated later by the Kubernetes Job (see 2-nd attached file).
# NOTE: replace ${YOUR_DEV_AWS_ACCOUNT_ID} ${YOUR_DEV_AWS_REGION}
# with appropriate values (same for STAGE & LIVE).
dockerRegistry: