Skip to content

Instantly share code, notes, and snippets.

View slavirok's full-sized avatar

Rokas Slavinskas slavirok

  • Kaluza
  • London, United Kingdom
View GitHub Profile
kafkacat -b broker.aivencloud.com:17189 \
-X security.protocol=SSL -X ssl.key.location=/path_to/service.key \
-X ssl.certificate.location=/path_to/service.cert \
-X ssl.ca.location=/path_to/ca.pem -L \
-t test-test-topic -C -f '\nTimestamp: %T Partition: %p Offset: %o Headers: %h\n'
@slavirok
slavirok / benthos_eh_to_kafka_conf.yaml
Last active March 18, 2021 14:14
BenthOS AzureEventHub Source
input:
kafka:
addresses:
- ${EVENTHUB_BOOTSTRAP_SERVER}
topics: [${EVENTHUB_TOPIC}]
tls:
enabled: true
skip_cert_verify: true
root_cas_file: ""
client_certs: []
@slavirok
slavirok / docker_samples.txt
Last active November 28, 2018 12:16
docker_samples
docker stop $(docker ps -a -q)
docker rm $(docker ps -a -q)
---------------------------------------
version: '2'
services:
zookeeper:
image: confluentinc/cp-zookeeper:5.0.0
ports:
- "2181:2181"
apiVersion: apps/v1beta1
kind: Deployment
metadata:
name: ksql
labels:
app: ksql
spec:
replicas: 2
template:
metadata:
@slavirok
slavirok / k8s_secrets_configmaps.txt
Last active October 30, 2018 21:06
Imperative way to create secrets and config maps in Kubernetes
kubectl create secret generic ksql-certs \
--from-file=./certs/client.keystore.p12 \
--from-file=./certs/client.truststore.jks \
--from-file=./certs//schema_registry.truststore.jks
kubectl create secret generic ksql-secrets \
--from-literal=certpass=password \
--from-literal=schema_registry_credentials="avnadmin:pass"
kubectl create configmap ksql-config-map \
openssl pkcs12 -export -inkey service.key -in service.cert -out client.keystore.p12 -name service_key
keytool -import -file ca.pem -alias CA -keystore client.truststore.jks
keytool -import -file ./ca_schema_registry.cert -alias CA -keystore ./schema_registry.truststore.jks
@slavirok
slavirok / get_public_key.txt
Last active October 28, 2018 11:23
Download and extract public key from URL
openssl s_client -connect schemaregistry_url.aivencloud.com:17192 -showcerts < /dev/null 2>/dev/null |
awk '/BEGIN CERT/{s=1}; s{t=t "\n" $0};
/END CERT/ {last=t; t=""; s=0}; END{print last}' > ./ca_schema_registry.cert
### Keybase proof
I hereby claim:
* I am slavirok on github.
* I am rokas (https://keybase.io/rokas) on keybase.
* I have a public key ASAvDgEG3Bx1jvU1AxA7RCuF4-lwfhN9doY5jS5dPb40Xwo
To claim this, I am signing this object: