I hereby claim:
- I am darylounet on github.
- I am d4ryl (https://keybase.io/d4ryl) on keybase.
- I have a public key whose fingerprint is 8B35 B5FE 88F6 7B9C 0D59 2157 B70D D0E4 1381 2E6E
To claim this, I am signing this object:
| AWSTemplateFormatVersion: 2010-09-09 | |
| Description: >- | |
| NAT HA: creates two NAT nodes in a new | |
| VPC in a hot/hot NAT configuration. After successfully launching this | |
| CloudFormation stack, you will have 4 subnets in 2 AZs (a pair of | |
| public/private subnets in each AZ), with NAT instances routing outbound | |
| traffic for their respective private subnets. The NAT instances will | |
| automatically monitor each other and fix outbound routing problems if the | |
| other instance is unavailable. | |
| Based on https://aws.amazon.com/fr/articles/high-availability-for-amazon-vpc-nat-instances-using-aws-cloudformation-templates/ |
| #!/bin/bash | |
| # @Author Cyril Aknine <[email protected]> | |
| # Sophos XG Let's Encrypt certificate update script | |
| # It uses huge workaround due to Sophos XG limitations : | |
| # - can't update a certificate when it's used by WAF | |
| # - can't update FirewallRule trough API to use another certificate | |
| # - can't SCP a file trough SSH | |
| # So ok it's ugly, but it's not the only one... | |
| SOPHOS_IP="192.168.0.254" |
| #!/usr/bin/php | |
| <?php | |
| /** | |
| * ELB Internal Route53 Updater | |
| * @author Cyril Aknine https://github.com/darylounet | |
| */ | |
| $vpcId = 'your-vpc-id'; | |
| $elbNetworkDescription = 'Your ELB network interface description (generated like "ELB your-elb-name")'; | |
| $route53InternalHostedZoneId = 'Your Route53 Internal hosted zone ID'; |
I hereby claim:
To claim this, I am signing this object: