View vault_intermediate_ca_setup.sh
#!/bin/bash -e | |
# Setup a Root CA in vault | |
# Generate and sign an Intermediate cert | |
# | |
# Requires: | |
# * A running vault server already initialzed and unsealed | |
# * Environment variable VAULT_TOKEN is set | |
# * vault cli (https://www.vaultproject.io) | |
# * httpie (https://github.com/jkbrzt/httpie) |
View SSLPoke.java
import javax.net.ssl.SSLSocket; | |
import javax.net.ssl.SSLSocketFactory; | |
import java.io.*; | |
/** Establish a SSL connection to a host and port, writes a byte and | |
* prints the response. See | |
* http://confluence.atlassian.com/display/JIRA/Connecting+to+SSL+services | |
*/ | |
public class SSLPoke { | |
public static void main(String[] args) { |
View hipchat.rb
#/usr/bin/env ruby | |
# Sends events to hipchat for wonderful chatty notifications | |
# | |
# This extension requires the hipchat gem | |
# | |
# The reason I wrote this instead of using the normal hipchat handler, is that with Flapjack | |
# all events are handled unless you do crazy filtering stuff. Also with a large number of events | |
# and checks the sensu server can get overloaded with forking stuff. So anyway, hipchat extension :) | |
# |
View hipchat-extension.rb
#!/usr/bin/env ruby | |
require 'rubygems' if RUBY_VERSION < '1.9.0' | |
require 'sensu-handler' | |
require 'hipchat' | |
require 'timeout' | |
require 'oj' | |
module Sensu::Extension | |
class Hipchat < Handler # Sub-class the appropriate extension type |
View dfhack_workflow.txt
# enable the plugin | |
workflow enable drybuckets auto-melt | |
# farming | |
workflow amount FOOD 120 30 | |
workflow amount DRINK 300 50 | |
workflow amount THREAD//GRASS_TAIL_PIG:THREAD 30 20 | |
workflow count LIQUID_MISC//POD_SWEET:EXTRACT 20 10 | |
# storage |
View gist:6253330
I pass these options to the varnishncsa daemon (this line is from my /etc/init.d/varnishncsa)... | |
DAEMON_OPTS="-a -F "\''%h "%{X-Forwarded-For}i" %u %t "%r" %s %b "%{Referer}i" "%{User-agent}i" %{Varnish:time_firstbyte}x %{Varnish:handling}x'\'" -c -w ${LOGFILE} -D -P $PIDFILE" | |
I parse that with the following grok pattern... | |
VARNISHNCSALOG %{IPORHOST:remoteip} %{QUOTEDSTRING:xforwardedfor} %{USER:auth} \[%{HTTPDATE:timestamp}\] "%{WORD:verb} %{NOTSPACE:request} HTTP/%{NUMBER:httpversion}" (?:%{NUMBER:status}|\(null\)) (?:%{NUMBER:bytes}|-) "(?:%{NOTSPACE:referrer}|-)" %{QUOTEDSTRING:agent} %{BASE10NUM:berespms} %{WORD:cache} |