Skip to content

Instantly share code, notes, and snippets.

FROM centos:6
MAINTAINER kubihie <kubihie@gmail.com>
RUN yum -y install sudo git vim && yum clean -y all
RUN sed -i "s/^Defaults.*requiretty/#&/g" /etc/sudoers
RUN curl -L https://toolbelt.treasuredata.com/sh/install-redhat-td-agent2.sh | sh
RUN td-agent-gem install bundler
RUN yum -y groupinstall 'Development Tools'
@kubihie
kubihie / cloud_watch
Last active August 29, 2015 14:20 — forked from yokota-shinsuke/cloud_watch
aws-sdk v2対応
#!/usr/bin/ruby
require 'rubygems'
require 'aws-sdk'
#require 'optparse'
require 'thor'
class Command < Thor
default_command :getopts
@kubihie
kubihie / serf
Last active August 29, 2015 14:19 — forked from zembutsu/serf
#!/bin/sh
#
# chkconfig: - 89 11
# description: serf daemon
# processname: serf
# config: /etc/serf.conf
# Default-Start:
# Default-Stop: 0 1 2 3 4 5 6
# Description: serf agent daemon
@kubihie
kubihie / tripwire-setup-keyfiles
Created November 6, 2014 17:09
tripwire-setup-keyfiles
# tripwire-setup-keyfiles
----------------------------------------------
The Tripwire site and local passphrases are used to sign a variety of
files, such as the configuration, policy, and database files.
Passphrases should be at least 8 characters in length and contain both
letters and numbers.
See the Tripwire manual for more information.
@kubihie
kubihie / tw.cfg
Created November 6, 2014 17:08
tw.cfg sample
ROOT =/usr/sbin
POLFILE =/etc/tripwire/tw.pol
DBFILE =/var/lib/tripwire/$(HOSTNAME).twd
REPORTFILE =/var/lib/tripwire/report/$(HOSTNAME)-$(DATE).twr
SITEKEYFILE =/etc/tripwire/site.key
LOCALKEYFILE =/etc/tripwire/$(HOSTNAME)-local.key
EDITOR =/bin/vi
LATEPROMPTING =true
LOOSEDIRECTORYCHECKING =true
MAILNOVIOLATIONS =true
@kubihie
kubihie / nkf.rb
Created November 2, 2014 15:16
Install nkf on AmazonLinux
remote_file "#{Chef::Config[:file_cache_path]}/nkf.rpm" do
source "http://mirror.centos.org/centos/6/os/x86_64/Packages/nkf-2.0.8b-6.2.el6.x86_64.rpm"
not_if "rpm -qa | grep -q nkf"
action :create
notifies :install, "rpm_package[nkf]", :imediately
end
rpm_package nkf do
source "#{Chef::Config[:file_cache_path]}/nkf.rpm" do
action :install
#!/bin/bash
#
USERDATAPATH='./userdata.txt'
TAGS='Key=[[Name]],Value=[[Value]]'
#request-spot-instances
REGION="ap-northeast-1"
SPOT_PRICE="0.0001"
#!/bin/bash
#Create launch configuration params
REGION='--region=ap-northeast-1'
LAUNCH_CONFIGURATION_NAME='--launch-configuration-name=[[Launch Configuration Name]]'
IMAGE_ID='--image-id=ami-35072834'
KEY_NAME='--key-name=[[Key Pair Name]]'
SECURITY_GROUPS='--security-groups=[[Security Group ID(sg-xxxxxxxx)]]'
USER_DATA='--user-data=file://userdata.txt'
INSTANCE_ID=''
#!/bin/bash
IMAGE_ID='--image-id=ami-35072834'
USER_DATA='--user-data=file://userdata.txt'
INSTANCE_TYPE='--instance-type=t2.micro'
COUNT='--count=1'
KEY_NAME='--key-name=[[Key Pair Name]]'
SECURITY_GROUP_IDS='--security-group-ids=[[Security Group ID(sg-xxxxxxxx)]]'
MONITORING='--monitoring=Enabled=[[true/false]]'
#!/bin/bash
IMAGE_ID='--image-id=ami-35072834'
USER_DATA='--user-data=file://userdata.txt'
INSTANCE_TYPE='--instance-type=t2.micro'
COUNT='--count=1'
KEY_NAME='--key-name=[[Key Pair Name]]'
SECURITY_GROUP_IDS='--security-group-ids=[[Security Group ID(sg-xxxxxxxx)]]'
MONITORING='--monitoring=Enabled=[[true/false]]'