I hereby claim:
- I am neilstuartcraig on github.
- I am neilcraig (https://keybase.io/neilcraig) on keybase.
- I have a public key whose fingerprint is EE2E 497F 287E AC9F 07F7 D387 FD97 7DDA E85E 0A1C
To claim this, I am signing this object:
#!/bin/sh | |
# | |
# nginx - this script starts and stops the nginx daemin | |
# | |
# chkconfig: - 85 15 | |
# description: Nginx iwe/IMAP/proxy server | |
# processname: nginx | |
# config: /etc/nginx/current/nginx.conf | |
# pidfile: /var/run/nginx.pid | |
# user: gtmdaemon |
I hereby claim:
To claim this, I am signing this object:
[ | |
{ "keys": ["super+u"], "command": "upper_case" }, | |
{ "keys": ["super+l"], "command": "lower_case" }, | |
{ "keys": ["ctrl+k"], "command": "run_macro_file", "args": {"file": "res://Packages/Default/Delete Line.sublime-macro"} }, | |
{ "keys": ["super+k"], "command": "run_macro_file", "args": {"file": "res://Packages/Default/Delete Line.sublime-macro"} }, | |
{ "keys": ["super+shift+down"], "command": "duplicate_line" }, | |
{ "keys": ["super+alt+c"], "command": "git_commit_all" }, | |
{ "keys": ["super+alt+p"], "command": "git_push_origin_master" }, | |
{ "keys": ["tab"], "command": "indent"}, |
index=* earliest_time=-24h host=* | eval h=lower(host) | stats distinct_count(h) |
index=* earliest_time=-24h host=* | eval h=lower(host) | stats values(h) |
server { | |
# Listen on port 80 for any IPv4 address on this server | |
# listen docs: http://wiki.nginx.org/HttpCoreModule#listen | |
listen 80; | |
# Listen on only the selected hostname... | |
server_name <HOSTNAME>; | |
# ...or use the catchall character if you want to handle multiple hostnames | |
# server_name _; |
ssl on; | |
ssl_certificate /path/to/certs/thedotproduct.org.pem; | |
ssl_certificate_key /path/to/certs/thedotproduct.org.key.unsigned; | |
# References used along with my own work: | |
# https://raymii.org/s/tutorials/Pass_the_SSL_Labs_Test_on_NGINX_(Mitigate_the_CRIME_and_BEAST_attack_-_Disable_SSLv2_-_Enable_PFS).html | |
# https://coderwall.com/p/ebl2qa | |
# http://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ | |
# http://code-bear.com/bearlog/2013/06/26/nginx-ssl-config-for-forward-secrecy/ | |
# https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule_-_Only_Support_Strong_Cryptographic_Ciphers |
check process newrelic with pidfile /var/run/nrsysmond.pid | |
start program "/etc/init.d/newrelic-sysmond start" | |
start program "/etc/init.d/newrelic-sysmond stop" | |
if 10 restarts within 10 cycles then timeout |
index="_internal" source="*metrics.log" per_host_thruput | chart sum(kb) by series | rename sum(kb) to KBLogged | eval MBLogged=round(KBLogged/1024,1) | fields series MBLogged | search MBLogged>3 | sort -MBLogged |
mail: { | |
transport: 'SMTP', | |
host: 'ssl://email-smtp.us-east-1.amazonaws.com', | |
options: { | |
port: 465, | |
service: 'SES', | |
auth: { | |
user: 'YOUR-SES-ACCESS-KEY-ID', | |
pass: 'YOUR-SES-SECRET-ACCESS-KEY' | |
} |