Contents
- This type of thing should not even be necessary here, but out of scope.
#!/usr/bin/env bash | |
set -Eeuo pipefail | |
trap cleanup SIGINT SIGTERM ERR EXIT | |
script_dir=$(cd "$(dirname "${BASH_SOURCE[0]}")" &>/dev/null && pwd -P) | |
usage() { | |
cat <<EOF | |
Usage: $(basename "${BASH_SOURCE[0]}") [-h] [-v] [-f] -p param_value arg1 [arg2...] |
#!/bin/sh | |
# | |
# Utility script to rsync and then open a shell or execute commands on a remote host. | |
# Tailored a little bit for Lucene/Solr | |
# @author David Smiley | |
# https://gist.github.com/dsmiley/daff3c978fe234b48a69a01b54ea9914 | |
set -uex | |
REMOTEHOST=buildbox | |
REMOTEPATH="builds$PWD" |
This tutorial shows how to setup Solr under Kubernetes on your local mac. The plan is as follows:
This is a collection of the things I believe about software development. I have worked for years building backend and data processing systems, so read the below within that context.
Agree? Disagree? Feel free to let me know at @JanStette. See also my blog at www.janvsmachine.net.
Keep it simple, stupid. You ain't gonna need it.
import org.apache.calcite.adapter.jdbc.JdbcSchema; | |
import org.apache.calcite.jdbc.CalciteConnection; | |
import org.apache.calcite.runtime.Hook; | |
import org.apache.calcite.schema.Schema; | |
import org.apache.calcite.schema.SchemaPlus; | |
import org.apache.commons.dbcp2.BasicDataSource; | |
import com.google.common.collect.ArrayListMultimap; | |
import com.google.common.collect.Multimap; |
default['sshd']['sshd_config']['AuthenticationMethods'] = 'publickey,keyboard-interactive:pam' | |
default['sshd']['sshd_config']['ChallengeResponseAuthentication'] = 'yes' | |
default['sshd']['sshd_config']['PasswordAuthentication'] = 'no' |
version: '2' | |
services: | |
zoo-1: | |
image: zookeeper:3.4.13 | |
restart: always | |
ports: | |
- "2181:2181" | |
environment: | |
ZOO_MY_ID: 1 | |
ZOO_PORT: 2181 |
This is a quick guide of the commands we use to sign someone's GPG key in a virtual key signing party.
Note: The steps cover only the technical aspects of signing someone's key. Before signing someone's key, you must verify their identity. This is usually done by showing government-issued ID and confirming the key's fingerprint
The commands will work for both GPG and GPG2.
I use Julian's key for the examples. His key id is 2AD3FAE3
. You should substitute with the appropriate key id when running the commands.
gpg --list-keys
.library(reticulate) | |
pa <- import("pyarrow", convert = FALSE) | |
# Create a list of pyarrow arrays | |
# this is our data, each array will become a column, but isn't quite one yet | |
# notice it doesn't even have a column name. they are kind of like vectors | |
data <- list( | |
pa$array(list(1,2,3,4)), | |
pa$array(list("foo", "bar", "baz", "hi")), | |
pa$array(list(TRUE, TRUE, FALSE, TRUE)) |