Skip to content

Instantly share code, notes, and snippets.

### Keybase proof
I hereby claim:
* I am kavanista on github.
* I am kavanista (https://keybase.io/kavanista) on keybase.
* I have a public key whose fingerprint is 9432 C637 AE38 9E49 583F DE15 F7AE 2959 694A 38B9
To claim this, I am signing this object:
@kavanista
kavanista / gist:8289711
Last active January 2, 2016 10:28
Riak startup issues .
2014-01-06 20:49:11 =ERROR REPORT====
** System running to use fully qualified hostnames **
** Hostname localhost is illegal **
2014-01-06 20:49:11 =ERROR REPORT====
** System running to use fully qualified hostnames **
** Hostname localhost is illegal **
2014-01-06 20:49:11 =ERROR REPORT====
** System running to use fully qualified hostnames **
** Hostname localhost is illegal **
2014-01-06 20:49:11 =ERROR REPORT====

Installation commands:

$ wget http://redis.googlecode.com/files/redis-2.4.8.tar.gz
$ tar xvfz redis-2.4.8.tar.gz 
$ cd redis-2.4.8/
$ mkdir -p /opt/redis
$ make PREFIX=/opt/redis install
$ cp redis.conf /opt/redis/redis.conf
$ chown -R redis:redis /opt/redis
#!/bin/sh
# Warranty request script for Dell PCs
# Written by Adam Nielsen <adam.nielsen@uq.edu.au>
# This code is in the public domain, and is supplied with no warranty.
#
# This script uses Dell's web service to retrieve the most distant warranty expiration
# date for a given machine, as identified by its service tag. It requires curl and awk.
# It doesn't parse the WSDL or anything nice like that, it just sends a precomposed
# request to the server and extracts the relevant info from the response.
#!/bin/sh
# Warranty request script for Dell PCs
# Written by Adam Nielsen <adam.nielsen@uq.edu.au>
# This code is in the public domain, and is supplied with no warranty.
#
# This script uses Dell's web service to retrieve the most distant warranty expiration
# date for a given machine, as identified by its service tag. It requires curl and awk.
# It doesn't parse the WSDL or anything nice like that, it just sends a precomposed
# request to the server and extracts the relevant info from the response.
#!/usr/bin/python
# Daniel De Marco - ddm@didiemme.net - 2012-02-23
# suds from https://fedorahosted.org/suds/
import suds
import sys
def get_warr(svctag):
Yeah so, there is where the code happens. Ruby , NoSQL stuff, yeah , deadly.