Skip to content

Instantly share code, notes, and snippets.

View joshmyers's full-sized avatar

Josh Myers joshmyers

View GitHub Profile
@joshmyers
joshmyers / asdffsadfdf
Created September 20, 2022 14:12
sdfsdadfsa
foobarbadgers
@joshmyers
joshmyers / foobarbadgers
Created September 20, 2022 14:08
foobar
foobarbadgers
@joshmyers
joshmyers / test
Created September 20, 2022 14:05
badgers

Keybase proof

I hereby claim:

  • I am joshmyers on github.
  • I am josh_myers (https://keybase.io/josh_myers) on keybase.
  • I have a public key ASDdcKoBgOL9XJ-e3PwoO99sP-UISN5coWmhm7w8qVqW-wo

To claim this, I am signing this object:

~/go/src/github.com/hashicorp/terraform(branch:master) » make
==> Checking that code complies with gofmt requirements...
/Users/joshmyers/go/bin/stringer
go generate $(go list ./... | grep -v /vendor/)
TF_ACC= go test $(go list ./... | grep -v /vendor/) -timeout=30s -parallel=4
ok github.com/hashicorp/terraform 0.025s
ok github.com/hashicorp/terraform/builtin/bins/provider-atlas 0.020s
ok github.com/hashicorp/terraform/builtin/bins/provider-aws 0.036s
ok github.com/hashicorp/terraform/builtin/bins/provider-azure 0.020s
? github.com/hashicorp/terraform/builtin/bins/provider-azurerm [no test files]
input {
udp {
port => 5544
type => syslog
}
}
filter {
grok {
type => "syslog"
$ tail -f /var/log/logstash/logstash.log
{:timestamp=>"2013-11-21T12:32:29.944000+0000", :message=>"Failed to index an event, will retry", :exception=>org.elasticsearch.discovery.MasterNotDiscoveredException: waited for [1m], :event=>{"@source"=>"tcp://10.36.188.219:48933/", "@tags"=>[], "@fields"=>{"syslog_pri"=>["86"], "syslog_program"=>["CRON"], "received_at"=>["2013-11-21T12:27:01.392Z"], "received_from"=>["10.36.188.219"], "syslog_severity_code"=>6, "syslog_facility_code"=>10, "syslog_facility"=>"security/authorization", "syslog_severity"=>"informational"}, "@timestamp"=>"2013-11-21T12:27:01.000Z", "@source_host"=>"devlogstash", "@source_path"=>"/", "@message"=>" pam_unix(cron:session): session opened for user root by (uid=0)", "@type"=>"syslog"}, :level=>:warn}
$ tail -f elasticsearch.log
[2013-11-21 12:33:51,418][INFO ][node ] [devlogstash] version[0.90.5], pid[23612], build[c8714e8/2013-09-17T12:50:20Z]
[2013-11-21 12:33:51,419][INFO ][node ] [devlogstash] in
{:timestamp=>"2013-11-20T16:36:11.316000+0000", :message=>"Failed to index an event, will retry", :exception=>org.elasticsearch.discovery.MasterNotDiscoveredException: waited for [1m], :event=>{"@source"=>"tcp://10.36.188.219:50906/", "@tags"=>[], "@fields"=>{"syslog_pri"=>["86"], "syslog_program"=>["CRON"], "received_at"=>["2013-11-20T15:36:01.786Z"], "received_from"=>["10.36.188.219"], "syslog_severity_code"=>6, "syslog_facility_code"=>10, "syslog_facility"=>"security/authorization", "syslog_severity"=>"informational"}, "@timestamp"=>"2013-11-20T15:36:01.000Z", "@source_host"=>"devlogstash", "@source_path"=>"/", "@message"=>" pam_unix(cron:session): session closed for user root", "@type"=>"syslog"}, :level=>:warn}