Skip to content

Instantly share code, notes, and snippets.

View lvnilesh's full-sized avatar
💭
🏆 Vibranium Status Level

LV Nilesh lvnilesh

💭
🏆 Vibranium Status Level
View GitHub Profile
@lvnilesh
lvnilesh / Dockerfile
Created January 6, 2023 23:53 — forked from 22phuber/Dockerfile
Ghost Dockerfile how to add the AWS S3 storage adapter
# Docker multistage build ghost blog with AWS S3 storage adapter
# Configure ghost-storage-adapter-s3
# => https://www.npmjs.com/package/ghost-storage-adapter-s3
# stage
FROM ghost:3.17-alpine as ghost-storage-adapter-s3
WORKDIR $GHOST_INSTALL/current
RUN yarn add "ghost-storage-adapter-s3@2.8.0"
# build
version: '3'
services:
bitwarden:
container_name: bitwarden
hostname: bitwarden
image: vaultwarden/server:1.26.0
restart: always
volumes:
- /etc/localtime:/etc/localtime:ro
@lvnilesh
lvnilesh / Running TensorFlow on Apple Silicon.md
Created December 5, 2022 18:13 — forked from svpino/instructions.md
Installing TensorFlow on Apple Silicon
@lvnilesh
lvnilesh / setup-nut-and-netdata-on-ubuntu.md
Last active September 15, 2022 03:48 — forked from Jiab77/setup-nut-and-netdata-on-ubuntu.md
Setup nut and netdata on Ubuntu

Setup nut and netdata on Ubuntu

In this document, I will explain how to setup nut (Network UPS Tools) on Ubuntu 18.04 and 20.04.

It is basically the next chapter of my previous gist, Upgrade nut on Ubuntu 18.04.

I'll only document USB connected UPS and not the other supported connection modes.

Install required dependencies

@lvnilesh
lvnilesh / README.md
Created June 14, 2022 03:23 — forked from mikoim/README.md
WireGuard example configuration for VPN

Server

iptables -A FORWARD -i wg0 -o YOUR_INTERFACE -s 10.200.200.0/24 -j ACCEPT
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -t nat -A POSTROUTING -o YOUR_INTERFACE -s 10.200.200.0/24 -j MASQUERADE

systemd-networkd

see vpn.netdev and vpn.network.

@lvnilesh
lvnilesh / WireGuard-site-to-site.md
Created May 18, 2022 05:38 — forked from insdavm/WireGuard-site-to-site.md
Accessing a subnet that is behind a WireGuard client using a site-to-site setup

WireGuard Site-to-Site

Accessing a subnet that is behind a WireGuard client using a site-to-site setup

Problem Summary

We want to access a local subnet remotely, but it is behind a NAT firewall and we can't setup port forwarding. Outgoing connections work, but all incoming connections get DROPPED by the ISP's routing policy.

Solution Summary

@lvnilesh
lvnilesh / setup_clightning.md
Created May 8, 2022 04:30 — forked from Stadicus/setup_clightning.md
Setup c-lightning on Digital Ocean

E-Commerce c-lightning node on Digital Ocean

Prerequisites

  • based on small Digital Ocean VPS (1CPU / 1GB RAM) with Ubuntu 16.04
  • SSH keys are recommended, but not described here
  • (sub) domain name necessary for SSL certificate

UFW & basic stuff

Login as "root"

@lvnilesh
lvnilesh / README.md
Created March 27, 2022 05:03 — forked from MarMed/README.md
Routing plex traffic through an SSH tunnel

Routing plex traffic through an SSH tunnel

This guide creates a reverse SSH tunnel to route all Plex server traffic through it.

Step 2 is done on the tunnel, all other steps are done on the plex server.

1. Setup SSH keys (if you already have key based authenthication setup skip to step 2)

On plex server:

@lvnilesh
lvnilesh / test-claim.yaml
Last active March 21, 2022 03:46
test-claim.yaml
apiVersion: v1
kind: PersistentVolume
metadata:
name: test
spec:
capacity:
storage: 10Gi
storageClassName: cg-storageclass
accessModes:
- ReadWriteMany