In a terminal start a server.
$ python -m SimpleHTTPServer 8000
In another terminal set up the cgroups freezer.
#!/bin/bash | |
echo 'at=lxd-config msg="Init LXD"' | |
cat <<EOF | sudo lxd init --preseed | |
config: | |
core.https_address: '[::]:8443' | |
core.trust_password: password | |
networks: | |
- config: | |
ipv4.address: auto |
default['sshd']['sshd_config']['AuthenticationMethods'] = 'publickey,keyboard-interactive:pam' | |
default['sshd']['sshd_config']['ChallengeResponseAuthentication'] = 'yes' | |
default['sshd']['sshd_config']['PasswordAuthentication'] = 'no' |
In a terminal start a server.
$ python -m SimpleHTTPServer 8000
In another terminal set up the cgroups freezer.
#!/bin/bash | |
plan () { | |
terraform plan \ | |
-out=plan.output \ | |
-target=module.useast1.aws_eip.nateip[3] | |
} | |
apply () { | |
terraform apply plan.output |
Currently, there is an explosion of tools that aim to manage secrets for automated, cloud native infrastructure management. Daniel Somerfield did some work classifying the various approaches, but (as far as I know) no one has made a recent effort to summarize the various tools.
This is an attempt to give a quick overview of what can be found out there. The list is alphabetical. There will be tools that are missing, and some of the facts might be wrong--I welcome your corrections. For the purpose, I can be reached via @maxvt on Twitter, or just leave me a comment here.
There is a companion feature matrix of various tools. Comments are welcome in the same manner.
# JDK version: Find the pacakge version with: | |
# $ yum --showduplicates list java-1.8.0-openjdk | expand | |
# Loaded plugins: priorities, update-motd, upgrade-helper | |
# Available Packages | |
# java-1.8.0-openjdk.x86_64 1:1.8.0.71-2.b15.8.amzn1 amzn-main | |
# java-1.8.0-openjdk.x86_64 1:1.8.0.77-0.b03.9.amzn1 amzn-updates | |
# java-1.8.0-openjdk.x86_64 1:1.8.0.91-0.b14.10.amzn1 amzn-updates | |
# java-1.8.0-openjdk.x86_64 1:1.8.0.101-3.b13.24.amzn1 amzn-updates | |
# | |
# Example install: yum install <pacakge>-<version_info>.<architecture_info> |
package main | |
import ( | |
"fmt" | |
"io" | |
"os" | |
) | |
var path = "/Users/novalagung/Documents/temp/test.txt" |
{ | |
"ignition": { "version": "2.0.0" }, | |
"systemd": { | |
"units": [ | |
{ | |
"name": "auto-update-kmods.service", | |
"enable": true, | |
"contents": "[Unit]\nDescription=Install custom kernel modules\nAfter=lib-modules.mount network-online.target\nRequires=lib-modules.mount network-online.target\nConditionPathExists=!/opt/modules/%v\nConditionPathExistsGlob=/lib/modules/auto-update-kmods.d/*.sh\n\n[Service]\nType=oneshot\nExecStart=/bin/bash -ex /lib/modules/auto-update-kmods.sh\n\n[Install]\nWantedBy=multi-user.target\n" | |
}, | |
{ |
#!/bin/bash | |
#By installing the Amazon Inspector Agent, you agree that your use is | |
# subject to the terms of your existing AWS Customer Agreement or other | |
# agreement with Amazon Web Services, Inc. or its affiliates governing your | |
# use of AWS services. You may not install and use the | |
# Amazon Inspector Agent unless you have an account in good standing with AWS. | |
# Copyright 2016 Amazon Web Services, Inc. or its affiliates. All Rights Reserved. | |
# Licensed under the terms of your existing AWS Customer Agreement |