Skip to content

Instantly share code, notes, and snippets.

@optionalg
optionalg / run_log_tail_commands.sh
Created August 20, 2017 01:48 — forked from rollbackpt/run_log_tail_commands.sh
Script to Run Multiple Tail Commands in Different Command Line Tabs
#!/bin/bash
# Blog Post: http://joaoperibeiro.com/command-line-script-to-launch-multiple-tabs/
# Array of commands to run in different tabs
commands=(
'tail -f /var/log/apache2/access.log'
'tail -f /var/log/apache2/error.log'
'tail -f /usr/local/var/postgres/server.log'
)
@optionalg
optionalg / newrelic-infra.config
Created August 19, 2017 22:01 — forked from jkras/newrelic-infra.config
New Relic Infrastructure Server Config file for AWS Elastic Beanstalk
files:
"/home/ec2-user/new_relic_servers_setup.sh":
mode: "000755"
owner: root
group: root
content: |
#!/usr/bin/env bash
printf "license_key: $NEW_RELIC_LICENSE_KEY" | sudo tee /etc/newrelic-infra.yml
printf "[newrelic-infra]\nname=New Relic Infrastructure\nbaseurl=http://download.newrelic.com/infrastructure_agent/linux/yum/el/6/x86_64\nenable=1\ngpgcheck=0" | sudo tee /etc/yum.repos.d/newrelic-infra.repo
yum -q makecache -y --disablerepo='*' --enablerepo='newrelic-infra'
@optionalg
optionalg / init.sh
Created August 18, 2017 18:03 — forked from charity/init.sh
terraform environment init.sh
#!/bin/bash
# Usage: ./init.sh once to initialize remote storage for this environment.
# Subsequent tf actions in this environment don't require re-initialization,
# unless you have completely cleared your .terraform cache.
#
# terraform plan -var-file=./production.tfvars
# terraform apply -var-file=./production.tfvars
tf_env="production"
@optionalg
optionalg / post-update
Created August 18, 2017 09:56 — forked from six0h/post-update
Git Post-Update hook that checks for changes to composer.lock, and fires a composer install if required.
#!/usr/bin/env python
#-*- coding: utf-8 -*-
"""A post-update Git hook to execute `composer install` when composer.json changes
:Author: Cody Halovich
:Company: HootSuite Media Inc.
"""
import subprocess
@optionalg
optionalg / sshfpgen.sh
Created August 18, 2017 04:13
Creates SSHFP records for all available keys
#!/bin/bash
# Creates SSHFP Records for all available keys
#
# Copyright (c) 2013, John W. O'Brien
#
# See the accompanying LICENSE file for usage
#
# IANA code points
# https://www.iana.org/assignments/dns-sshfp-rr-parameters/
@optionalg
optionalg / virt-backup.pl
Created August 18, 2017 04:12 — forked from trick77/virt-backup.pl
virt-backup.pl: fixed paths so live images will work again in Ubuntu 14.04
#!/usr/bin/perl -w
#
# 1. Install required dependencies:
# sudo apt-get install -y libxml-simple-perl pv libsys-virt-perl
# 2. Run it like this (assuming the LVM disk size is 20G):
# /virt-backup.pl --vm mykvm --state --snapsize=20G --backupdir /tmp --debug --compress
#
# AUTHOR
# Daniel Berteaud <daniel@firewall-services.com>
#
@optionalg
optionalg / README.md
Created August 17, 2017 19:59 — forked from oodavid/README.md
Deploy your site with git

Deploy your site with git

This gist assumes:

  • you have a local git repo
  • with an online remote repository (github / bitbucket etc)
  • and a cloud server (Rackspace cloud / Amazon EC2 etc)
    • your (PHP) scripts are served from /var/www/html/
    • your webpages are executed by apache
  • apache's home directory is /var/www/

Deploy your site with git securely

This gist assumes:

  • you have a local git repo
  • you have an online remote repository (github)
  • you have a server running Apache with git already installed

you should be able to do the same with Java, Perl, RoR, JSP etc. however you'll need to recreate the (rather simple) PHP script

@optionalg
optionalg / blocksync.py
Created August 16, 2017 11:07 — forked from rcoup/blocksync.py
Block device sync between remote hosts. Based off http://www.bouncybouncy.net/programs/blocksync.py
#!/usr/bin/env python
"""
Synchronise block devices over the network
Copyright 2006-2008 Justin Azoff <justin@bouncybouncy.net>
Copyright 2011 Robert Coup <robert@coup.net.nz>
License: GPL
Getting started:
@optionalg
optionalg / Ansible-Vault how-to.md
Created August 16, 2017 06:17 — forked from tristanfisher/Ansible-Vault how-to.md
A short tutorial on how to use Vault in your Ansible workflow. Ansible-vault allows you to more safely store sensitive information in a source code repository or on disk.

##Working with ansible-vault

I've been using a lot of Ansible lately and while almost everything has been great, finding a clean way to implement ansible-vault wasn't immediately apparent.

What I decided on was the following: put your secret information into a vars file, reference that vars file from your task, and encrypt the whole vars file using ansible-vault encrypt.

Let's use an example: You're writing an Ansible role and want to encrypt the spoiler for the movie Aliens.