1 shard, 0 replica.
Update default template:
curl -X PUT http://localhost:9200/_template/default -H 'Content-Type: application/json' -d '{"index_patterns": ["*"],"order": -1,"settings": {"number_of_shards": "1","number_of_replicas": "0"}}'
#!/bin/bash | |
#Step 1 | |
#Generate server keystore and client keystore | |
keytool -keystore kafka.server.keystore.jks -alias localhost -validity 365 -genkey | |
keytool -keystore kafka.client.keystore.jks -alias localhost -validity 365 -genkey | |
#Step 2 | |
#Create CA | |
openssl req -new -x509 -keyout ca-key -out ca-cert -days 365 | |
#Add generated CA to the trust store | |
keytool -keystore kafka.server.truststore.jks -alias CARoot -import -file ca-cert |
1 shard, 0 replica.
Update default template:
curl -X PUT http://localhost:9200/_template/default -H 'Content-Type: application/json' -d '{"index_patterns": ["*"],"order": -1,"settings": {"number_of_shards": "1","number_of_replicas": "0"}}'
#!/bin/bash | |
set -ex | |
UBUNTU_VERSION="14.04" | |
mkdirs(){ | |
#lxc delete hadoop-master --force | |
#lxc delete hadoop-slave-1 --force | |
#lxc delete hadoop-slave-2 --force | |
rm -rf /tmp/* |
$ sudo sysctl net.bridge.bridge-nf-call-iptables=1 | |
$ sudo sysctl net.bridge.bridge-nf-call-ip6tables=1 |
This article proved to be a decent starting point, but I was particularly interested in allowing password-based logins to OpenVPN using a username/password backed by FreeIPA (opposed to client certificates) as the identity provider.
ipa-client-install --mkhomedir
kinit
ipa service-add openvpn/`hostname`
First let's update everything I am running all commands as sudo but you run with the level you want
sudo apt-get update -y && sudo apt-get upgrade -y
Now let's install Ruby
{ | |
"defaultProfile": "{7d04ce37-c00f-43ac-ba47-992cb1393215}", | |
"initialRows": 30, | |
"initialCols": 120, | |
"alwaysShowTabs": true, | |
"showTerminalTitleInTitlebar": true, | |
"experimental_showTabsInTitlebar": true, | |
"requestedTheme": "dark", | |
"profiles": [ | |
{ |
@version:3.2 | |
# =============================================================================================== | |
# Configuration file for syslog-ng, customized for remote logging | |
# =============================================================================================== | |
# Options | |
# Note about $HOST / HOST | |
# Description: The name of the source host where the message originates from. | |
# If the message traverses several hosts and the chain_hostnames() option is on, the first host in the chain is used. | |
# If the keep_hostname() option is disabled (keep_hostname(no)), the value of the $HOST macro will be the DNS hostname of the host that sent the message to syslog-ng OSE (that is, the DNS hostname of the last hop). In this case the $HOST and $HOST_FROM macros will have the same value. |