Inspired By: grafana/loki#333
- docker-compose.yml
version: "3"
networks:
loki:
#!/usr/bin/bash | |
# pre-requisites: | |
# apt install python3-pip awscli | |
# pip3 install certbot certbot-dns-route53 awscli | |
# mkdir .certbot/{config,work,logs} | |
# IAM policy attached to EC2 instance with: | |
# - route53:ListHostedZones | |
# - route53:GetChange | |
# - route53:ChangeResourceRecordSets |
#!/bin/bash | |
# | |
# Mush mosh and SSM sessions together. | |
# | |
# Run mosh-server on an EC2 instance as part of an AWS Session Manager SSH | |
# session, and feed the output into mosh-client locally. This is helpful | |
# if you have an EC2 instance which: | |
# | |
# * Is publicly addressable | |
# * Has a predictable Name tag but a shifting IP |
Title: | |
Incident date: | |
Owner: | |
Peer-review committee: | |
Tags: | |
Summary: | |
Supporting data: | |
Customer Impact: | |
Incident Response Analysis: | |
Post-Incident Analysis: |
deb http://deb.debian.org/debian buster main contrib non-free | |
deb-src http://deb.debian.org/debian buster main contrib non-free | |
deb http://deb.debian.org/debian buster-updates main contrib non-free | |
deb-src http://deb.debian.org/debian buster-updates main contrib non-free | |
deb http://security.debian.org/debian-security/ buster/updates main contrib non-free | |
deb-src http://security.debian.org/debian-security/ buster/updates main contrib non-free |
#!/usr/bin/env bash | |
# Define colors | |
RED='\033[91m' | |
RED_solid='\033[101m' | |
GREEN='\033[92m' | |
GREEN_solid='\033[42m' | |
CYAN='\033[96m' | |
NC='\033[0m' | |
BLUE_solid='\e[44m' |
Inspired By: grafana/loki#333
version: "3"
networks:
loki:
https://rancher.com/docs/k3s/latest/en/installation/kube-dashboard/
Deploying the Kubernetes Dashboard
GITHUB_URL=https://github.com/kubernetes/dashboard/releases
VERSION_KUBE_DASHBOARD=$(curl -w '%{url_effective}' -I -L -s -S ${GITHUB_URL}/latest -o /dev/null | sed -e 's|.*/||')
kubectl create -f https://raw.githubusercontent.com/kubernetes/dashboard/${VERSION_KUBE_DASHBOARD}/aio/deploy/recommended.yaml
:global ipCurrent "$ipCurrent"; | |
{ | |
# Change to your settings | |
# ----------------------- | |
:local wanInterface "eth1"; | |
:local slackHookUrl "https://hooks.slack.com/services/YOUR/APP/SECRET"; | |
# ----------------------- | |
:local ipNew [/ip address get [find interface=$wanInterface] address]; |
Source: Technet Script Center
Example:
.\getInstalledAppsFromRegistry.ps1
$apps = Get-InstalledAppsFromRegistry
$apps | where {$_.DisplayName -like "*Firefox*"}
#!/usr/bin/env bash | |
set -eu | |
# set -o pipefile | |
docker_version=${REPO_TAG} | |
docker_image=${REPO_IMAGE} | |
# docker_creds=$(aws ecr get-authorization-token --output json |jq -r '.authorizationData[].authorizationToken' |base64 -d) | |
docker_creds="AWS:$(aws ecr get-login-password)" |