View autorun.sh
1 2 3 4 5 6 7 8 9
#!/bin/sh
 
set -e
 
IMAGE="$1"
 
VOLUME_PATH="${VOLUME_PATH:-$(pwd)/volumes}"
 
NAME="$(echo "${IMAGE}" | awk -F: '{print $1}' | awk -F/ '{print $NF}')"
View gist:71fb91e6390d3928d8e2
1 2 3 4 5 6 7 8 9 10
[hekad]
maxprocs = 2
 
[statsd_input]
type = "StatsdInput"
stat_accum_name = "stat_accumulator"
address = ":8125"
 
[stat_accumulator]
type = "StatAccumInput"
View core.toml
1 2 3 4 5 6 7 8 9 10
[hekad]
base_dir = "/tmp"
 
[StellarCoreMetricsInput]
type = "HttpInput"
url = "http://localhost:8000/metrics"
ticker_interval = 1
 
[StellarCoreMetricsFilter]
type = "SandboxFilter"
View recover.rb
1 2 3 4 5 6 7 8 9 10
require 'pathname'
require 'uri'
require 'fileutils'
 
# Expects a dir arg of exported photos and a .log which contains /var/log/system.log Photo messages generated during the export
 
dir = Pathname.new(ARGV[0])
log = Pathname.new(dir.basename.to_s + '.log')
 
recovered_dir = dir + 'recovered'
View tunnels.sh
1 2 3 4 5 6 7 8 9 10
#!/usr/bin/env bash
# Usage: sub tunnels [start|stop|restart|status|edit]
# Summary: Manage shared and user-specified SSH tunnels into your infrastructure
# Help: Manage shared and user-specified SSH tunnels into your infrastructure.
#
# Expects ssh to be configured for proxying. Run `sub check` to check your
# environment.
#
# This will attempt to use autossh if it's available.
#
View metrics.json
1 2 3 4 5 6 7 8 9 10
{
"ts":"2015-03-03T04:06:46+0000",
"uname":"somehost.somedomain.com",
"metrics":{
"bucket.batch.add":{
"type":"timer",
"count":105,
"event_type":"calls",
"rate_unit":"s",
"mean_rate":0.509101,
View gist:5f8fd1680646a41045af
1 2 3 4 5 6 7 8 9
### Keybase proof
 
I hereby claim:
 
* I am matschaffer on github.
* I am matschaffer (https://keybase.io/matschaffer) on keybase.
* I have a public key whose fingerprint is 0F41 2290 38C3 B9C3 9C6E 0F1E 71EA CD00 4C06 389F
 
To claim this, I am signing this object:
View bluegreen.tf
1 2 3 4 5 6 7 8 9
provider "aws" {
access_key = "${var.access_key}"
secret_key = "${var.secret_key}"
region = "us-east-1"
}
 
resource "aws_elb" "experiments-main" {
name = "experiments-main"
availability_zones = ["us-east-1c", "us-east-1d"]
View gist:79c8f59b352e4b382f23
1 2 3 4 5 6 7 8 9 10
root@vagrant:~# hhvm hello.hh
 
Fatal error: /root/hello.hh appears to be a Hack file, but you do not appear to be running the Hack typechecker. See the documentation at http://docs.hhvm.com/manual/en/install.hack.bootstrapping.php for information on getting it running. You can also set Hack.Lang.LookForTypechecker=0 to disable this check (not recommended).
root@vagrant:~# mv hello.hh hello.^C
root@vagrant:~# vi ..hhconfig^C
root@vagrant:~# vi .hhconfig
root@vagrant:~# touch .hhconfig
root@vagrant:~# hh_client
Server launched for /root
Spawned hh_server (child pid=22984)
View Vagrantfile
1 2 3 4 5 6 7 8 9 10
Vagrant.configure(2) do |config|
config.vm.box = 'ubuntu/trusty64'
 
config.vm.provider 'virtualbox' do |v|
v.memory = 4096
v.cpus = 8
end
 
config.vm.network 'private_network', ip: '192.168.33.10'
config.vm.hostname = 'build.vagrant.stellar-ops.com'
Something went wrong with that request. Please try again.