I hereby claim:
- I am arpat on github.
- I am arpat (https://keybase.io/arpat) on keybase.
- I have a public key whose fingerprint is B9E2 1740 9133 7F51 E018 92AF AB6A AA11 2F5B B3C2
To claim this, I am signing this object:
#!/usr/bin/env bash | |
# | |
# finds chrome renderer processes and ups their OOM kill score on Linux | |
# | |
while read Line | |
do | |
while read -r MemUsed Pid | |
do | |
CmdLine=$(cat /proc/${Pid}/cmdline) |
#!/bin/bash | |
# | |
## CURL the kibana endpoint | |
## Use the kibana dev console to validate query json | |
curl -i --insecure --user User:Password -XPOST \ | |
--header "kbn-version: 5.6.0" \ | |
'https://kibana.yourdomain/api/console/proxy?path=_search&method=POST' \ | |
--data '{"query":{"match_all":{}}}' |
# List the ten latest ubuntu public images on AWS | |
# Output similar to: | |
# 2017-09-26T16:18:51.000Z ubuntu/images/hvm-ssd/ubuntu-zesty-17.04-amd64-server-20170922 hvm True ami-5cc00825 | |
# 2017-09-21T21:20:20.000Z ubuntu/images/hvm-ssd/ubuntu-xenial-16.04-amd64-server-20170919 hvm True ami-17d11e6e | |
# 2017-09-19T10:54:43.000Z ubuntu/images/hvm-ssd/ubuntu-trusty-14.04-amd64-server-20170918 hvm True ami-e872bf91 | |
# 2017-09-05T13:12:32.000Z ubuntu/images/hvm-ssd/ubuntu-trusty-14.04-amd64-server-20170831 hvm True ami-01589c78 | |
# ...etc | |
aws ec2 describe-images \ | |
--filters Name=name,Values=ubuntu/images/hvm-ssd/ubuntu* \ |
# Dockerfile snippet | |
RUN ( echo \ | |
"This is a multiline\n\ | |
file to be placed\n\ | |
somewhere but needs\n\ | |
to be visible inside\n\ | |
the Dockerfile" \ | |
> /tmp/this ) |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
## blame: [email protected] | |
## Make a 1G swapfile in CWD | |
SwapFile="~~SWAPFILE.$(date +%H%m%s%N | sha1sum | cut -c1-12)" | |
# fallocate -l 1G $SwapFile \ ## caused issue for f2fs | |
dd if=/dev/zero of="$SwapFile" bs=1024 count=1048576 \ | |
&& chmod 600 $SwapFile \ | |
&& mkswap $SwapFile \ |
#!/bin/sh | |
# Blame: [email protected] | |
# My version of github change git author script | |
# https://help.github.com/articles/changing-author-info/ | |
if [ $# -eq 0 ]; then | |
echo "Usage: OLD_EMAIL CORRECT_NAME CORRECT_EMAIL" | |
echo "...and run from the toplevel." | |
exit 1 | |
fi |
Backup and restore omnibus-gitlab configuration | |
It is recommended to keep a copy of /etc/gitlab, or at least of /etc/gitlab/gitlab-secrets.json, in a safe place. | |
All configuration for omnibus-gitlab is stored in /etc/gitlab. | |
# Example backup command for /etc/gitlab: | |
# Create a time-stamped .tar file in the current directory. | |
# The .tar file will be readable only to root. | |
##sudo sh -c 'umask 0077; tar -cf $(date "+etc-gitlab-%s.tar") -C / etc/gitlab' | |
Creating an application backup | |
To create a backup of your repositories and GitLab metadata, follow the backup create documentation: |
#https://storage.googleapis.com/kubernetes-release/release/v1.2.4/bin/linux/amd64/kubectl ## Get official kubernetes binary | |
#https://storage.googleapis.com/kubernetes-release/release/v1.2.4/bin/darwin/amd64/kubectl ## Get official kubernetes binary |
#!/bin/bash | |
# Quick way to find matching ssl pub/priv key pairs. | |
# usage: ./comp-ssl-certs.sh mycertfiles* | |
CertFiles="$1" | |
for Files in $(ls $CertFiles) | |
do | |
#echo "ALL FILES "$Files | |
for Type in x509 rsa | |
do | |
Mod=$(openssl $Type -noout -modulus -in $Files 2>/dev/null) \ |