Skip to content

Instantly share code, notes, and snippets.

View zimmertr's full-sized avatar

TJ Zimmerman zimmertr

  • Issaquah, Washington
View GitHub Profile
$> kubectl get clusterrole grafana-prometheus-scraper -oyaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: "2019-09-26T03:55:58Z"
name: grafana-prometheus-scraper
resourceVersion: "6968371"
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/grafana-prometheus-scraper
uid: 03e86193-703f-426f-b3b4-61430596bb3b
rules:
$> kubectl get clusterrolebindings.rbac.authorization.k8s.io grafana-prometheus-scraper -oyaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: "2019-09-26T03:55:58Z"
name: grafana-prometheus-scraper
resourceVersion: "6968375"
selfLink: /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/grafana-prometheus-scraper
uid: 5538e448-0979-4749-a302-e76f8aae9f4e
roleRef:
# Automatically generated OpenVPN client config file
# Generated on Sun Aug 25 10:23:40 2019 by openvpn-5f9b6fc8f6-9k8k6
# Default Cipher
cipher AES-256-CBC
# Note: this config file contains inline private keys
# and therefore should be kept confidential!
# Note: this configuration is user-locked to the username below
# OVPN_ACCESS_SERVER_USERNAME=tj
# Define the profile name of this particular configuration file
# Automatically generated OpenVPN client config file
# Generated on Sun Aug 25 10:23:40 2019 by openvpn-5f9b6fc8f6-9k8k6
# Default Cipher
cipher AES-256-CBC
# Note: this config file contains inline private keys
# and therefore should be kept confidential!
# Note: this configuration is user-locked to the username below
# OVPN_ACCESS_SERVER_USERNAME=tj
# Define the profile name of this particular configuration file
# Automatically generated OpenVPN client config file
# Generated on Sun Aug 25 10:23:40 2019 by openvpn-5f9b6fc8f6-9k8k6
# Default Cipher
cipher AES-256-CBC
# Note: this config file contains inline private keys
# and therefore should be kept confidential!
# Note: this configuration is user-locked to the username below
# OVPN_ACCESS_SERVER_USERNAME=tj
# Define the profile name of this particular configuration file
# Automatically generated OpenVPN client config file
# Generated on Sun Aug 25 10:23:40 2019 by openvpn-5f9b6fc8f6-9k8k6
# Default Cipher
cipher AES-256-CBC
# Note: this config file contains inline private keys
# and therefore should be kept confidential!
# Note: this configuration is user-locked to the username below
# OVPN_ACCESS_SERVER_USERNAME=tj
# Define the profile name of this particular configuration file
$> sudo openvpn --config 24.18.133.202.ovpn --auth-user-pass pass.txt
Sun Aug 25 11:46:55 2019 WARNING: file 'pass.txt' is group or others accessible
Sun Aug 25 11:46:55 2019 OpenVPN 2.4.7 [git:makepkg/2b8aec62d5db2c17+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
Sun Aug 25 11:46:55 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10
Sun Aug 25 11:46:55 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Sun Aug 25 11:46:55 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Aug 25 11:46:55 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Aug 25 11:46:55 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]24.18.133.202:1194
Sun Aug 25 11:46:55 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Aug 25 11:46:55 2019 UDP link local: (not bound)
$> sudo openvpn --config vpn.tjzimmerman.com.ovpn --auth-user-pass pass.txt
[sudo] password for tj:
Sun Aug 25 11:45:52 2019 WARNING: file 'pass.txt' is group or others accessible
Sun Aug 25 11:45:52 2019 OpenVPN 2.4.7 [git:makepkg/2b8aec62d5db2c17+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
Sun Aug 25 11:45:52 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10
Sun Aug 25 11:45:52 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Sun Aug 25 11:45:52 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Aug 25 11:45:52 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Aug 25 11:45:52 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]35.212.180.218:1194
Sun Aug 25 11:45:52 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
$> sudo openvpn --config 192.168.10.10.ovpn --auth-user-pass pass.txt
[sudo] password for tj:
Sun Aug 25 11:37:13 2019 WARNING: file 'pass.txt' is group or others accessible
Sun Aug 25 11:37:13 2019 OpenVPN 2.4.7 [git:makepkg/2b8aec62d5db2c17+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
Sun Aug 25 11:37:13 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10
Sun Aug 25 11:37:13 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Sun Aug 25 11:37:13 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Aug 25 11:37:13 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Aug 25 11:37:13 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.10.10:1194
Sun Aug 25 11:37:13 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
events {
worker_connections 1024;
}
stream {
server {
proxy_connect_timeout 300s;
proxy_timeout 300s;
listen 9443;
proxy_pass tjzimmerman.dev:9443;