cat << EOF > patch.yaml
cluster:
proxy:
disabled: true
network:
cni:
name: none
This is done on devstack
environment.
Update: Please see Bishop Fox's rapid response post Log4j Vulnerability: Impact Analysis for latest updates about this vulnerability.
The Cosmos 🌌 team at Bishop Fox 🦊 is currently researching open-source projects that appear to use Log4j by default.
- Apache Druid
- Apache Dubbo
- Apache Flink
- Apache Flume
#! /usr/bin/env python3 | |
''' | |
Needs Requests (pip3 install requests) | |
Author: Marcello Salvati, Twitter: @byt3bl33d3r | |
License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License) | |
This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021. |
loki-install: | |
sh ./variables.sh | |
sh ./setup-loki-fluentbit.sh |
$Principal = New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent()) | |
# Add log color command to clipboard | |
Set-Clipboard -Value "log_color General FFD700FF; cl_showpos 1" | |
# Start CSGO | |
(New-Object -Com Shell.Application).Open("steam://rungameid/730") | |
Start-Sleep 10 |
#!/bin/bash | |
# requires curl and jq | |
# assumes usage of Gitlab API v4 | |
# hella hacky | |
url="https://git.example.net" | |
token="abcdefghijklmnop" | |
username="$1" | |
# output is always paginated - get total number of pages from http header |
Based on a tweet by @Tomwillfixit
Just a quick fun conversion to make it work as a Docker CLI plugin
- docker/cli#1534 CLI Plugins Design
- docker/cli#1564 Basic framework for writing and running CLI plugins
To use it (assuming you're running a beta of Docker 19.03):
This gist aims to facilitate the switching from bash
to zsh
as our defaut shell.
We will be using oh-my-zsh with the powerful theme: Powerlevel9k. You will find all the links below.
This process applies mainly for Arch Linux, but can be setup for any other distro (in theory :)).
I'm also using Gnome Terminal and pacaur as package manager.
--- | |
kind: ClusterRole | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
metadata: | |
name: traefik-ingress-controller | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- services |