Skip to content

Instantly share code, notes, and snippets.

View alzabo's full-sized avatar
🥲
🫃

Ryan White alzabo

🥲
🫃
View GitHub Profile
#!/bin/sh
#Default values
export ARTIFACTORY_HOME=/var/opt/jfrog/artifactory
export ARTIFACTORY_USER=artifactory
#export JAVA_HOME=/opt/java/1.8.0
#export START_LOCAL_REPLICATOR=true
#export START_LOCAL_MDS=true
#export START_LOCAL_ROUTER=true

Description

Type of Change

  • 🐛 Bug fix (non-breaking change which fixes an issue)
  • 💡 New feature (non-breaking change which adds functionality)
  • :broken-heart: Breaking change (fix or feature that would cause existing functionality to change)

Checklist

# frozen_string_literal: true
require 'octokit'
require 'faraday'
ORG_FILTER = ARGV[0] || /GSI.*/
HOOK_URL = ENV['JIRA_WEBHOOK_URL']
ACCESS_TOKEN = ENV['GITHUB_ACCESS_TOKEN']
TEAM_NAME = 'AUTO: Service Account Read Access'
# HACK: This is a pretty crappy thing to do in a system that needs to be
# reliable, but older Rubies don't have this method and the vault gem calls
# it on strings.
# lol copy paste from stack overflow
module DisgustingHack
def b
self.dup.force_encoding("ASCII-8BIT")
end
end
#!/usr/bin/ruby -w
require 'optparse'
require 'augeas'
class Replica
def initialize(host, password=nil, target=nil, port=nil)
@target = target
@password = password
@host = host
@port = port
rule:
SecRule REQUEST_URI "inc86.php" "id:3333330,pass,log,auditlog"
--cf14f926-A--
[28/Oct/2014:09:06:22 --0700] VE@@wMCR7wUAAC1VmWIAAAJE 146.185.239.51 57328 216.194.169.106 80
--cf14f926-B--
POST /wp-content/plugins/ultimate-tinymce/addons/shortcodes/js/.inc86.php HTTP/1.1
ensu
-----
monitoring not only an ops problem. devs need to be on board, looped in
poor monitoring coverage
rather than making a large change, iteratively integrate sensu, gradually replacing nagios
exploring what success looks like; observations on whether or not it was better than the status quo
@alzabo
alzabo / xmlrpc-brute-defense.conf
Last active August 29, 2015 14:07
IP-Based WP/xmlrpc brute force ModSecurity rules
# These rules are designed to be effective versus /non distributed/ brute
# force attacks.
#
# A more aggressive version of this rule set may be used to combat more
# widely-distributed attacks.
#
# See http://alzabo.io/modsecurity/2014/09/15/wordpress-xml-rpc-brute-force.html
# for additional information
#
# SecDataDir is probably better configured as something other than
Notice: /Stage[main]/Mysql::Server::Config/File[/etc/my.cnf]/content:
--- /etc/my.cnf 2014-10-09 19:24:17.000000000 -0700
+++ /tmp/puppet-file20141009-7211-nekr4i-0 2014-10-09 19:33:45.000000000 -0700
@@ -1,63 +1,66 @@
# FILE MANAGED BY PUPPET
[client]
-port=3306
-socket="/var/lib/mysql/mysql.sock"
+port = 3306
+socket = /var/lib/mysql/mysql.sock
puppet & docker
===============
puppetconflovesdocker docker book?
dockerfiles well-treated as similar to shell scripts; imperative
inheritance
puppet apply for masterless
r10k, etc. as well