Skip to content

Instantly share code, notes, and snippets.

Avatar
👈
That's me

J. Gavin Ray jgavinray

👈
That's me
View GitHub Profile
View uninstallk3s.sh
ssh $(whoami)@192.168.0.25 '/usr/local/bin/k3s-uninstall.sh'
ssh $(whoami)@192.168.0.26 '/usr/local/bin/k3s-agent-uninstall.sh'
ssh $(whoami)@192.168.0.27 '/usr/local/bin/k3s-agent-uninstall.sh'
ssh $(whoami)@192.168.0.28 '/usr/local/bin/k3s-agent-uninstall.sh'
ssh $(whoami)@192.168.0.29 '/usr/local/bin/k3s-agent-uninstall.sh'
@jgavinray
jgavinray / installk3s.sh
Last active Jul 3, 2020
Install K3s from scratch - from local machine
View installk3s.sh
# Assumptions below:
# Your local user has ssh access to the server and agent machines
# Your user on those machines is a sudo user with NOPASSWD configured
export USER=$(whoami)
export SERVER_IP=192.168.0.25
export AGENT_1_IP=192.168.0.26
export AGENT_2_IP=192.168.0.27
export AGENT_3_IP=192.168.0.28
View FreeBSD Blocking Countries
$ sudo mkdir /etc/pf-files
In /etc/pf.conf the following needs to be added:
1. In the prerequisites-section add:
table <blocked_zones> persist file "/etc/pf-files/blocked_zones"
2. In the block-section add early:
block in quick proto tcp from <blocked_zones> to any port { 22 80 }
blocn_traffic.sh
#! /bin/sh
# Purpose: Block all traffic from specific countries. Use ISO code. #
@jgavinray
jgavinray / README.MD
Created Mar 29, 2020 — forked from lmarkus/README.MD
Extracting / Exporting custom emoji from Slack
View README.MD

Extracting Emoji From Slack!

Slack doesn't provide an easy way to extract custom emoji from a team. (Especially teams with thousands of custom emoji) This Gist walks you through a relatively simple approach to get your emoji out.

If you're an admin of your own team, you can get the list of emoji directly using this API: https://api.slack.com/methods/emoji.list. Once you have it, skip to Step 3

HOWEVER! This gist is intended for people who don't have admin access, nor access tokens for using that list.

Follow along...

@jgavinray
jgavinray / ubuntu.ks
Created Feb 17, 2020 — forked from funzoneq/ubuntu.ks
Ubuntu kickstart file
View ubuntu.ks
#Generated by Kickstart Configurator
#platform=x86
# Fetch content from here
url –url http://nl.archive.ubuntu.com/ubuntu/
#System language
lang en_US.UTF-8
#Language modules to install
View keybase.md

Keybase proof

I hereby claim:

  • I am jgavinray on github.
  • I am jgavinray (https://keybase.io/jgavinray) on keybase.
  • I have a public key ASB4fVT7jjbDcSgRAT0ffF0MKcID4zVciptfIn0pUECWeAo

To claim this, I am signing this object:

@jgavinray
jgavinray / convert.sh
Created Jun 20, 2019
Script to rename files to be plex compatible
View convert.sh
#!/bin/bash
# Define show name
SHOW_NAME="Battlestar Galactica"
# Loop through all m4v files
for f in *.m4v
do
# Get episode number, fifth column - srip trailing underscore
EPISODE=$(echo $f | awk '{print $5;}' | sed 's/_//g')
@jgavinray
jgavinray / data_sanitation.sh
Last active Sep 15, 2019
Schneier Method (Data Sanitization Method)
View data_sanitation.sh
#!/bin/bash
# The purpose of this script is to wipe a file system or
# physical disk using the Schneier data sanitation method.
# A.K.A Schneier Method (Data Sanitization Method)
if [ -z "$1" ]
then
echo "No arguments supplied, please pass the path of the disk or "
echo "mount point you want sanitized."
exit 1