Skip to content

Instantly share code, notes, and snippets.

development:
adapter: postgresql
encoding: unicode
pool: 5
database: sample_app_rails_4_development
host: <%= ENV['SAMPLE_APP_RAILS_4_DB_HOST'] %>
port: <%= ENV['SAMPLE_APP_RAILS_4_DB_PORT'] %>
username: <%= ENV['SAMPLE_APP_RAILS_4_DB_USER'] %>
password: <%= ENV['SAMPLE_APP_RAILS_4_DB_PASSWORD'] %>
variable aws_access_key {}
variable aws_secret_key {}
variable ssh_key { default = "~/.ssh/id_rsa.pub" }
variable ssl_cert_file { default = "./cert.pem" }
variable ssl_key_file { default = "./key.pem" }
provider "aws" {
access_key = "${var.aws_access_key}"
secret_key = "${var.aws_secret_key}"
region = "us-west-1"
@ryane
ryane / terraform-aws-wait-healthy.sh
Last active November 7, 2019 03:12
Waits for AWS instances launched from Terraform to become healthy
aws ec2 wait instance-status-ok --instance-ids $(cat terraform.tfstate | jq '.modules[].resources[] | select(.type == "aws_instance") | .primary.attributes.id' | sed 's/\"//g' | tr '\n', ' '; echo '')

Keybase proof

I hereby claim:

  • I am ryane on github.
  • I am ryane (https://keybase.io/ryane) on keybase.
  • I have a public key whose fingerprint is E4F4 1EAB BF0F C785 06D8 62EF EF68 CF41 D42A 593D

To claim this, I am signing this object:

@ryane
ryane / k8s-deployment-demo-version.diff
Created June 12, 2016 14:46
Diff between the v1 and v2 k8s-deployment-demo replication controller manifests
diff --git a/demo-rc-v0.1.yml b/demo-rc-v0.2.yml
index 985c09f..f464cdf 100644
--- a/demo-rc-v0.1.yml
+++ b/demo-rc-v0.2.yml
@@ -2,25 +2,25 @@
apiVersion: v1
kind: ReplicationController
metadata:
- name: k8s-deployment-demo-controller-v1
+ name: k8s-deployment-demo-controller-v2
@ryane
ryane / k8s-deployment-demo-deployment-version.diff
Created June 14, 2016 13:05
Diff between the v1 and v2 k8s-deployment-demo deployment manifests
diff --git a/demo-deployment-v1.yml b/demo-deployment-v2.yml
index 2823271..13f58d3 100644
--- a/demo-deployment-v1.yml
+++ b/demo-deployment-v2.yml
@@ -12,15 +12,15 @@ spec:
metadata:
labels:
app: k8s-deployment-demo
- version: v0.1
+ version: v0.2
variable "region" {
default = "us-east-1"
}
variable "ssh_public_key" {
default = "~/.ssh/id_rsa.pub"
}
provider "aws" {
region = "${var.region}"
variable "image_url" {
default = "debian-cloud/debian-8"
}
resource "google_compute_disk" "seconddisk" {
name = "seconddisk"
type = "pd-standard"
zone = "us-west1-a"
size = "100"
}
aws_route53_zone.public: Refreshing state... (ID: ZPIIVVYPS22KD)
aws_route53_zone.public: Destroying...
2017/03/03 08:37:06 [INFO] Terraform version: 0.8.8
2017/03/03 08:37:06 [INFO] CLI args: []string{"/usr/local/Cellar/terraform/0.8.8/bin/terraform", "destroy", "-force"}
2017/03/03 08:37:06 [DEBUG] Detected home directory from env var: /Users/ryan
2017/03/03 08:37:06 [DEBUG] Detected home directory from env var: /Users/ryan
2017/03/03 08:37:06 [DEBUG] Attempting to open CLI config file: /Users/ryan/.terraformrc
2017/03/03 08:37:06 [INFO] Local triton provider configuration 'triton-terraform' overrides '/usr/local/Cellar/terraform/0.8.8/bin/terraform-TFSPACE-internal-plugin-TFSPACE-provider-TFSPACE-triton'
2017/03/03 08:37:06 [DEBUG] Detected home directory from env var: /Users/ryan
2017/03/03 08:37:06 [DEBUG] Checking resource noop: aws_route53_zone.public
@ryane
ryane / main-state.tf
Last active April 26, 2018 16:24
Code for Deploy Kubernetes in an Existing AWS VPC with Kops and Terraform post
resource "aws_s3_bucket" "state_store" {
bucket = "${var.name}-state"
acl = "private"
force_destroy = true
versioning {
enabled = true
}
...
}