Keybase proof
I hereby claim:
- I am thapakazi on github.
- I am thapakazi (https://keybase.io/thapakazi) on keybase.
- I have a public key whose fingerprint is D960 A6D6 BEC6 E198 1393 BFAB 00F2 8320 44FF 5DE8
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Magic words:
psql -U postgres
Some interesting flags (to see all, use -h
or --help
depending on your psql version):
-E
: will describe the underlaying queries of the \
commands (cool for learning!)-l
: psql will list all databases and then exit (useful if the user you connect with doesn't has a default database, like at AWS RDS)kubectl -n kube-system set env daemonset aws-node ENABLE_POD_ENI=true
resource "tls_private_key" "ca" { | |
algorithm = "RSA" | |
} | |
resource "tls_self_signed_cert" "ca" { | |
key_algorithm = "RSA" | |
private_key_pem = "${tls_private_key.ca.private_key_pem}" | |
subject { | |
common_name = "${var.domain}" |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "VisualEditor0", | |
"Effect": "Allow", | |
"Action": [ | |
"iam:CreatePolicy", | |
"iam:CreateRole", | |
"iam:AttachRolePolicy" |
install: | |
ln -s $PWD/librespeed-cli.service ~/.config/systemd/user/librespeed-cli.service | |
systemctl --user enable librespeed-cli.service | |
systemctl --user start librespeed-cli.service | |
re-install: | |
systemctl --user daemon-reload | |
systemctl --user restart librespeed-cli.service |
xps | |
description: Notebook | |
product: XPS 15 7590 (0905) | |
vendor: Dell Inc. | |
serial: 2K14DB3 | |
width: 64 bits | |
capabilities: smbios-3.2.0 dmi-3.2.0 smp vsyscall32 | |
configuration: boot=normal chassis=notebook family=XPS sku=0905 uuid=44454C4C-4B00-1031-8034-B2C04F444233 | |
*-core | |
description: Motherboard |
variable date {} | |
variable url {} | |
meetup "terraform_tidbits" { | |
date = var.date | |
url = var.url | |
title = "Terraform Practical Tit-Bits" | |
description = "In this session we will explore some of the common practical tit-bits of using terraform. If you are having difficulties collaborating with your friends/co-workers due to hassles of state file management, dealing with 10s of secrets/variables, managing different infra environments; well, this session is just for you." | |
} |
#create config map
curl -sL https://git.io/Jt80f > /tmp/site.conf
kubectl create cm nginx-config --from-file=/tmp/site.conf -o yaml --dry-run=client
#lets see it in action, will ya ?
kubectl create cm nginx-config --from-file=/tmp/site.conf
kubectl apply -f https://git.io/Jt8uz