To install, place datadog.py
in your callback plugins directory. If you don't yet have one, run:
mkdir -p plugins/callback
Then place the following in your ansible.cfg
file:
[defaults]
callback_plugins = ./plugins/callback
- action: ec2_facts | |
- apt: pkg=lvm2 state=present | |
- apt: pkg=mdadm state=present | |
- pip: name=boto state=latest | |
- ec2_vol: instance="{{ hostvars[inventory_hostname]['ansible_ec2_instance-id'] }}" | |
volume_size=20 | |
device_name="{{ item }}" |
packer build packer.json 2>&1 | sudo tee output.txt | |
tail -2 output.txt | head -2 | awk 'match($0, /ami-.*/) { print substr($0, RSTART, RLENGTH) }' > sudo ami.txt |
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>Launch Daily Standup Hangout</string> | |
<key>ProgramArguments</key> | |
<array> | |
<string>/usr/bin/osascript</string> | |
<string>/Users/brettb/launchStandupHangout.scpt</string> |
ZSH_THEME_GIT_PROMPT_PREFIX="%{$reset_color%}%{$fg[cyan]%}[" | |
ZSH_THEME_GIT_PROMPT_SUFFIX="]%{$reset_color%}" | |
ZSH_THEME_GIT_PROMPT_DIRTY="%{$fg[red]%}*%{$reset_color%}" | |
ZSH_THEME_GIT_PROMPT_CLEAN="" | |
#Customized git status, oh-my-zsh currently does not allow render dirty status before branch | |
git_custom_status() { | |
local cb=$(current_branch) | |
if [ -n "$cb" ]; then | |
echo "$(parse_git_dirty)$ZSH_THEME_GIT_PROMPT_PREFIX$(current_branch)$ZSH_THEME_GIT_PROMPT_SUFFIX" |
## This is a sample configuration file. See the nxlog reference manual about the | |
## configuration options. It should be installed locally and is also available | |
## online at http://nxlog.org/nxlog-docs/en/nxlog-reference-manual.html | |
## Please set the ROOT to the folder your nxlog was installed into, | |
## otherwise it will not start. | |
#define ROOT C:\Program Files\nxlog | |
define ROOT C:\Program Files (x86)\nxlog |
#!/bin/bash | |
# | |
# This starts and stops SiriProxy | |
# | |
### BEGIN INIT INFO | |
# Provides: siriproxy | |
# Required-Start: $all | |
# Required-Stop: | |
# Short-Description: SiriProxy | |
# Description: SiriProxy Server |
tell application "Safari" to activate | |
tell application "Safari" | |
tell window 1 | |
set current tab to (make new tab with properties {URL:"http://hangout.google.com"}) | |
end tell | |
delay 5 | |
tell application "System Events" | |
-- navigate to "Name this hangout" | |
repeat 10 times | |
keystroke tab |
VMware ESXi includes a built in VNC server that can be used to access a VMs console for manipulation via automated tools (e.g., veewee) or by users on platforms where the vSphere Client is not supported. In ESXi 5.x, the built-in firewall does not allow VNC traffic to be received by the VNC server, even when an individual VM is configured to support this configuration. To complete this activity, the firewall has to be modified to allow the appropriate ports.
The below script can be run via the ESXi command line to setup the firewall rules necessary to run VNC. A few items to note:
/etc/rc.local
(ESXi 5.0) or `/etc/rc.local