Link from where most of this info came from
Here is a simple tutorial to use Letsencrypt SSL Certs with Subsonic. This is on a Debian Server
Link from where most of this info came from
Here is a simple tutorial to use Letsencrypt SSL Certs with Subsonic. This is on a Debian Server
SELECT name,organization,orgid,associateid FROM client JOIN client_key WHERE client.client_ident = client_key.client_ident INTO OUTFILE '/tmp/clients.csv' FIELDS TERMINATED BY ',' ENCLOSED BY '"' LINES TERMINATED BY '\n'; |
<?php | |
/** | |
* The base configurations of the WordPress. | |
* | |
* This file has the following configurations: MySQL settings, Table Prefix, | |
* Secret Keys, WordPress Language, and ABSPATH. You can find more information | |
* by visiting {@link http://codex.wordpress.org/Editing_wp-config.php Editing | |
* wp-config.php} Codex page. You can get the MySQL settings from your web host. | |
* | |
* This file is used by the wp-config.php creation script during the |
# Source it on .bash_profile | |
# run with "encrypt a.file" or "decrypt a.file.aes-128-cbc" | |
# You can adjust encryption cipher (say aes-256-cbc) to your needs | |
function encrypt() { | |
if [ $# -eq 0 ]; then | |
echo "Provide a filename to encrypt" | |
exit 1 | |
fi | |
# SHA256 the given file | |
openssl dgst -sha256 "$1" > "$1.sha256" |
# Has XFF header with a value | |
acl has-xff req_header X-Forwarded-For ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[([0-9a-f]+)?:([0-9a-f:]+)?:([0-9a-f]+|0-9\.]+)?\])) | |
# default logformat | |
logformat squid %ts.%03tu %6tr %>a %Ss/%03>Hs %<st %rm %ru %[un %Sh/%<a %mt | |
# default logformat using XFF instead of client IP address | |
logformat squid-xff %ts.%03tu %6tr %{X-Forwarded-For}>h %Ss/%03>Hs %<st %rm %ru %[un %Sh/%<a %mt |
# Get number of running containers of a service | |
aws --profile saml --output json ecs describe-services --cluster DIT-DMZ --service adp-e-bot-kafka | jq '.services[]|.desiredCount' | |
# Get a list of all task definitions | |
aws --profile saml --output text ecs list-task-definition-families | |
# Get the JSONs of a task definition | |
aws --profile saml --output json ecs describe-task-definition --task-def DIT-adp-e-bot | jq '.taskDefinition|if .networkMode then {family: .family, volumes: .volumes, containerDefinitions: .containerDefinitions, networkMode: .networkMode} else {family: .family, volumes: .volumes, containerDefinitions: .containerDefinitions} end' | |
# Get all task definition and save each as a JSON |
# Log the X-Forwarded-For client IP address or the real client ip address if the X-Forwarded-For header does not exist. | |
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined | |
LogFormat "%{X-Forwarded-For}i %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" proxy | |
SetEnvIf X-Forwarded-For "^.*\..*\..*\..*" forwarded | |
CustomLog "logs/access_log" combined env=!forwarded | |
CustomLog "logs/access_log" proxy env=forwarded |
*/15 * * * * alvaro /usr/bin/curl -q https://USERNAME:[email protected]/nic/update?hostname=TUNNELID -o /dev/null |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>regulya.local</string> | |
<key>Program</key> | |
<string>/Users/regulya/bin/boot-up-actions.sh</string> | |
<key>RunAtLoad</key> | |
<true/> |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<!-- copy to /Library/LaunchDaemons/extra.loopback.alias.plist --> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>Loopback Alias</string> | |
<key>ProgramArguments</key> | |
<array> | |
<string>/sbin/ifconfig</string> |