The following commands assume the system is CentOS/RedHat Linux and ProFTPD configuration is same or similar to CentOS package version: 1.3.3g; release: 1.el6.
yum install proftpd
cd ~/
wget https://gist.github.com/raw/4296200/proftpd.conf.patch
#!/usr/bin/env python | |
# $ cat ipsec_conf.tmpl | |
# {# | |
# | |
# cgw_in_addr: customer_gateway tunnel_inside_address ip_address | |
# cgw_in_cidr: customer_gateway tunnel_inside_address network_cidr | |
# vgw_in_addr: vpn_gateway tunnel_inside_address ip_address | |
# vgw_in_cidr: vpn_gateway tunnel_inside_address network_cidr | |
# cgw_out_addr: customer_gateway tunnel_outside_address |
import sys | |
import markdown | |
import yaml | |
import os | |
from jinja2 import Environment, FileSystemLoader | |
with open(sys.argv[2], 'r') as f: | |
content = yaml.safe_load(f.read()) | |
for k in content: |
global | |
maxconn 300 | |
log 192.168.0.40 local0 debug | |
stats socket /tmp/haproxy.socket level admin | |
gid 80 | |
nbproc 1 | |
chroot /var/empty | |
daemon | |
# | |
# Example configuration for HAProxy 1.5-dev19 for using SNI |
global | |
chroot /var/lib/haproxy | |
crt-base /etc/pki/tls/certs | |
daemon | |
group haproxy | |
log 127.0.0.1 local0 | |
maxconn 2000 | |
pidfile /var/run/haproxy.pid | |
stats socket /var/lib/haproxy/stats | |
tune.ssl.default-dh-param 2048 |
#!/bin/bash | |
# Homebrew requires Xcode CLI tools to be installed. OS X provides stubs for CLI tools | |
# that trigger the CLI tools installer when called. So we call `git` to start the installation. | |
git | |
echo "Press any key when Xcode CLI tools installation is complete..." | |
read | |
# Install Homebrew | |
/usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" |
# HOWTO: Installing Vault On AWS with S3 backend | |
This is a HOWTO on installing [Vault](https://www.vaultproject.io/https://github.com/hashicorp/vault) on AWS with S3. | |
Components used: | |
* [Vault](https://www.vaultproject.io/https://github.com/hashicorp/vault) | |
* [AWS S3](https://aws.amazon.com/s3/) | |
* [AWS IAM](https://aws.amazon.com/iam/) | |
* [AWS EC2](https://aws.amazon.com/ec2/) | |
* [OpenSSL](https://www.openssl.org/) |
# HOWTO: Installing Vault On AWS with S3 backend | |
This is a HOWTO on installing [Vault](https://www.vaultproject.io/https://github.com/hashicorp/vault) on AWS with S3. | |
Components used: | |
* [Vault](https://www.vaultproject.io/https://github.com/hashicorp/vault) | |
* [AWS S3](https://aws.amazon.com/s3/) | |
* [AWS IAM](https://aws.amazon.com/iam/) | |
* [AWS EC2](https://aws.amazon.com/ec2/) | |
* [OpenSSL](https://www.openssl.org/) |
# | |
# This config file is a combination of ideas from: | |
# http://www.37signals.com/svn/posts/1073-nuts-bolts-haproxy | |
# http://www.igvita.com/2008/05/13/load-balancing-qos-with-haproxy/ | |
# http://wiki.railsmachine.com/HAProxy | |
# http://elwoodicious.com/2008/07/15/nginx-haproxy-thin-fastcgi-php5-load-balanced-rails-with-php-support/ | |
# http://upstream-berlin.com/2008/01/09/using-haproxy-with-multiple-backends-aka-content-switching/ | |
# http://wiki.railsmachine.com/HAProxy | |
# http://gist.github.com/raw/25482/d39fb332edf977602c183194a1cf5e9a0b5264f9 | |
# |
# This is an example of the Stack Exchange Tier 1 HAProxy config | |
# The only things that have been changed from what we are running are: | |
# 1. User names have been removed | |
# 2. All Passwords have been remove | |
# 3. IPs have been changed to use the example/documentation ranges | |
# 4. Rate limit numbers have been changed to randome numbers, don't read into them | |
userlist stats-auth | |
group admin users $admin_user | |
user $admin_user insecure-password $some_password |