Wes Winham winhamwr@gmail.com
There are many tutorials floating around the web that almost get you a dynamic VPN in EC2. The goal of this tutorial is to be a one-stop-shop for this specific setup.
Wes Winham winhamwr@gmail.com
There are many tutorials floating around the web that almost get you a dynamic VPN in EC2. The goal of this tutorial is to be a one-stop-shop for this specific setup.
sudoer-amazing: | |
file.append: | |
- name: /etc/sudoers | |
- text: | |
- "ydavid ALL=(ALL) NOPASSWD: ALL" | |
sudoer-defaults: | |
file.append: | |
- name: /etc/sudoers | |
- text: |
# Create using kubectl: | |
# $ kubectl create -f splunk-daemonset.yaml | |
# | |
# You should also add config on your indexer to deal with the json formatted files: | |
# https://answers.splunk.com/answers/148307/how-to-parse-and-extract-json-log-files-in-splunk.html | |
# | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: splunk-forwarder |
HOST=localhost | |
PORT=9200 | |
TO_NODE=YOUR_NODE_NAME | |
curl "http://$HOST:$PORT/_cat/shards" | grep UNAS | awk '{print $1,$2}' | while read var_index var_shard; do | |
curl -XPOST "http://$HOST:$PORT/_cluster/reroute" -d " | |
{ | |
\"commands\" : [ | |
{ | |
\"allocate\" : |
curl -s 10.0.0.145:8500/v1/kv/my_key/my_otehr_key/this_is_the_key?dc=dc1 | jq -r '.[0].Value' | base64 --decode |