The following commands assume the system is CentOS/RedHat Linux and ProFTPD configuration is same or similar to CentOS package version: 1.3.3g; release: 1.el6.
yum install proftpd
cd ~/
wget https://gist.github.com/raw/4296200/proftpd.conf.patch
#!/bin/bash | |
# Homebrew requires Xcode CLI tools to be installed. OS X provides stubs for CLI tools | |
# that trigger the CLI tools installer when called. So we call `git` to start the installation. | |
git | |
echo "Press any key when Xcode CLI tools installation is complete..." | |
read | |
# Install Homebrew | |
/usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" |
global | |
chroot /var/lib/haproxy | |
crt-base /etc/pki/tls/certs | |
daemon | |
group haproxy | |
log 127.0.0.1 local0 | |
maxconn 2000 | |
pidfile /var/run/haproxy.pid | |
stats socket /var/lib/haproxy/stats | |
tune.ssl.default-dh-param 2048 |
global | |
maxconn 300 | |
log 192.168.0.40 local0 debug | |
stats socket /tmp/haproxy.socket level admin | |
gid 80 | |
nbproc 1 | |
chroot /var/empty | |
daemon | |
# | |
# Example configuration for HAProxy 1.5-dev19 for using SNI |
import sys | |
import markdown | |
import yaml | |
import os | |
from jinja2 import Environment, FileSystemLoader | |
with open(sys.argv[2], 'r') as f: | |
content = yaml.safe_load(f.read()) | |
for k in content: |
#!/usr/bin/env python | |
# $ cat ipsec_conf.tmpl | |
# {# | |
# | |
# cgw_in_addr: customer_gateway tunnel_inside_address ip_address | |
# cgw_in_cidr: customer_gateway tunnel_inside_address network_cidr | |
# vgw_in_addr: vpn_gateway tunnel_inside_address ip_address | |
# vgw_in_cidr: vpn_gateway tunnel_inside_address network_cidr | |
# cgw_out_addr: customer_gateway tunnel_outside_address |
""" | |
The MIT License (MIT) | |
Copyright (c) 2011 Numan Sachwani | |
Permission is hereby granted, free of charge, to any person obtaining a copy of | |
this software and associated documentation files (the "Software"), to deal in | |
the Software without restriction, including without limitation the rights to | |
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies | |
of the Software, and to permit persons to whom the Software is furnished to do | |
so, subject to the following conditions: |
When running virtual machines under a Linux host system for testing web apps in various browsers (e.g. Internet Explorer), I found it rather tedious having to continually tweak the hosts file within each VM for the purpose of adding entries pointing back to the host machine's development web server address.
Instead the steps below will setup Dnsmasq on a Ubuntu 16.04LTS, 14.04LTS or 12.04LTS host machine for the purpose of serving both it's own DNS queries and that of virtual machine guests. Dnsmasq will parse the /etc/hosts
file on your host machine where we will keep a single set of DNS entires to our test web application(s).
Instructions for Ubuntu 14.04LTS (and more than likely others). Where keyfile.ppk
is the PPK file you have in hand.
$ sudo apt-get install putty-tools
# create public key as [id_rsa.pub]
$ puttygen keyfile.ppk -o id_rsa.pub -O public-openssh
# create private key as [id_rsa]
$ puttygen keyfile.ppk -o id_rsa -O private-openssh
Parameter | Value | AWS default |
---|---|---|
character_set_server | utf8 | |
collation_server | utf8_general_ci | |
default_storage_engine | InnoDB | InnoDB |
innodb_buffer_pool_size | {DBInstanceClassMemory*7/10} | {DBInstanceClassMemory*3/4} |
innodb_log_file_size | 134217728 | 134217728 |
max_allowed_packet | 4194304 |