Skip to content

Instantly share code, notes, and snippets.

View larstobi's full-sized avatar

Lars Tobias Skjong-Børsting larstobi

  • Skylars AS
  • Oslo, Norway
View GitHub Profile
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
jobs:
zap_scan:
runs-on: ubuntu-latest
name: Scan the webapplication
FROM jasonrivers/nagios:latest
ENV NRDP_REPO=https://github.com/NagiosEnterprises/nrdp
ENV NRDP_VERSION=2.0.3
# install nrdp plugin for passive checks & external commands
RUN cd /tmp/ && \
wget ${NRDP_REPO}/archive/${NRDP_VERSION}.tar.gz && \
tar xvf ${NRDP_VERSION}.tar.gz && \
cd nrdp-${NRDP_VERSION} && \
autoreconf-2.69: Entering directory `.'
autoreconf-2.69: configure.ac: not using Gettext
autoreconf-2.69: running: aclocal --force -I config
autoreconf-2.69: configure.ac: tracing
autoreconf-2.69: configure.ac: AM_GNU_GETTEXT is used, but not AM_GNU_GETTEXT_VERSION
autoreconf-2.69: running: libtoolize --copy --force
libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'config'.
libtoolize: copying file 'config/ltmain.sh'
libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'config'.
libtoolize: copying file 'config/libtool.m4'
# Tutorial - IPv6 through CenturyLink via 6rd on UniFi Security Gateway
# Hello, everyone! I was able to get my UniFi Security Gateway 3P to work with IPv6 on CenturyLink gigabit fiber by using 6rd, after a lot of
# research and pulling my hair out in frustration. To save others in my situation from the same, I created a config.gateway.json file for you
# to use, as well as a tutorial for modifying the json file to suit your environment.
# Keep in mind that this assumes that:
# Your WAN interface is pppoe2
# Your LAN interface is eth1
# Your tunnel name is tun0
# (If the interface names change, you'll have to modify the JSON file itself accordingly.)
# First step is to go here: http://silmor.de/ipaddrcalc.html#ip46
@larstobi
larstobi / ipv6-6rd-enable.sh
Last active July 31, 2022 02:32
IPv6 Rapid Deployment for Altibox
#!/bin/vbash
# https://sosdg.org/edgerouter/6rd
# https://community.ubnt.com/t5/EdgeMAX/Edgerouter-Lite-on-Centurylink-1-Gbit-fiber/td-p/1124318/page/2
export SBIN="/opt/vyatta/sbin/my_"
export DESCRIPTION="Altibox IPv6 6rd tunnel"
export WAN_DEV="eth2"
export LAN_DEV="eth1"
export TUN_DEV="tun0"

Keybase proof

I hereby claim:

  • I am larstobi on github.
  • I am larstobi (https://keybase.io/larstobi) on keybase.
  • I have a public key whose fingerprint is E441 5D9F 5166 12F8 CC33 B68D 7977 0733 1BF3 549C

To claim this, I am signing this object:

$ terraform apply --input=false
cloudstack_vpc.prod: Creating...
cidr: "" => "10.3.0.0/16"
display_text: "" => "<computed>"
name: "" => "prod"
vpc_offering: "" => "Default VPC Offering"
zone: "" => "Digipost advanced"
cloudstack_vpc.default: Creating...
cidr: "" => "10.0.0.0/16"
display_text: "" => "test-vpc"
name: "" => "test-vpc"
vpc_offering: "" => "Default VPC Offering"
zone: "" => "Digipost advanced"
cloudstack_vpc.default: Creation complete
cloudstack_network.subnet-2: Creating...
cidr: "" => "10.0.20.0/24"
display_text: "" => "subnet-2"
provider "cloudstack_instance" {
service_offering = "${var.default_service_offering}"
network = "${var.default_network}"
template = "${var.default_template}"
zone = "${var.default_zone}"
expunge = true
connection {
key_file = "${var.connection_ssh_key_file}"
}
resource "cloudstack_instance" "app" {
count = "2"
# name = "${var.resource_prefix}-app-${count.index}"
name = "app"
service_offering = "${var.default_service_offering}"
network = "${var.default_network}"
template = "${var.default_template}"
zone = "${var.default_zone}"
expunge = true