Without https or the www
Forced redirect to https://www
lunix@boran] -> curl -I http://nokogiri.org/
HTTP/1.1 301 Moved Permanently
Server: GitHub.com
Content-Type: text/html
Without https or the www
Forced redirect to https://www
lunix@boran] -> curl -I http://nokogiri.org/
HTTP/1.1 301 Moved Permanently
Server: GitHub.com
Content-Type: text/html
#cloud-config | |
repo_update: true | |
repo_upgrade: all | |
package_upgrade: true | |
bootcmd: | |
- test -z "$(blkid /dev/nvme0n1)" && mkfs -t ext4 -L scratch /dev/nvme0n1 | |
mounts: |
Audience: anyone in the BOSH ecosystem, whether you work on something open-source or proprietary
"BOSH Links" is a feature which simplifies how data is shared between BOSH-deployed jobs that need to collaborate with one another (e.g. a web server and its backing database). Like many BOSH things, the whole "BOSH Links" thing can seem counter-intuitive at first, and it may not be clear why things are the way they are. This note hopes to show some of the powerful benefits of BOSH Links, and provide examples and explanations that make things more intuitive.
$ sudo apt-get install xclip -y
$ echo "alias pbcopy='xclip -selection clipboard'" >> ~/.bash_alias
$ echo "alias pbpaste='xclip -selection clipboard -o'" >> ~/.bash_alias
The following two commands lets you rdp into a Windows insatnce that is on a private network via a linux jump host.
Run this command and then you have 30 seconds to establish an rdp session.
ssh -i private.key [email protected] -fL 3389:172.12.1.10:3389 sleep 30
This will rdp into the private Windows instance at the other end of the ssh tunnel.
The following is a simple guide to using a custom domain when deploying to Pivtoal Web Services (PWS or PDUBS)
You will make use of a wildcard dns CNAME for your own domain that points to a cfapps.io
URL.
You will need a permananent cfapps.io
URL that becomes the basis for your wildcard CNAME entry.
NEVER REMOVE THIS AS THE WILDCARD DNS WILL FAIL
After that any appname/route will work without any dns entries needed.
These scripts and config files are expected to be used as a cloudconfig and will install Openvpn server from the default Ubuntu 16.04 repository.
It is setup with certificates to prevent MITM attacks however uses username/password for client authentication.
The following is a generic client config.
client
I hereby claim:
To claim this, I am signing this object:
sudo cryptsetup luksOpen /dev/sda5 luks_container |