(Find and download Oregon Trail Deluxe into a ~/Games directory)
brew install dosbox
dosbox
mount c ~/Games
c:
cd Games
# Once you apply this and your containers come online, you need to exec into the web service and run `./manage.py createsuperuser`. | |
# Change the postgresql password in this spec. | |
# This spec assumes you want NodePort services and not LoadBalnancer services. | |
# This spec assumes that you want to mount all your volumes under a hostPath of /data/paperless. | |
# This spec assumes that you want all pods on a node called k8s-worker5. | |
apiVersion: v1 | |
kind: Namespace | |
metadata: | |
name: paperless |
apiVersion: batch/v1beta1 | |
kind: CronJob | |
metadata: | |
name: restic-backup-synapse | |
namespace: synapse | |
spec: | |
schedule: "0 4 * * *" | |
concurrencyPolicy: Forbid | |
successfulJobsHistoryLimit: 3 | |
failedJobsHistoryLimit: 3 |
(Find and download Oregon Trail Deluxe into a ~/Games directory)
brew install dosbox
dosbox
mount c ~/Games
c:
cd Games
module example.com/mymodule | |
require ( | |
k8s.io/api v0.18.2 | |
k8s.io/apimachinery v0.18.2 | |
k8s.io/client-go v0.18.2 | |
) |
&http.Client{ | |
Transport: &http.Transport{ | |
TLSClientConfig: &tlsConfig, | |
Proxy: http.ProxyFromEnvironment, | |
Dial: (&net.Dialer{ | |
Timeout: 30 * time.Second, | |
KeepAlive: 30 * time.Second, | |
}).Dial, | |
TLSHandshakeTimeout: 10 * time.Second, | |
ExpectContinueTimeout: 1 * time.Second, |
# Include a clusterrole for the kube-controllers component, | |
# and bind it to the calico-kube-controllers serviceaccount. | |
kind: ClusterRole | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: calico-kube-controllers | |
rules: | |
# Pods are monitored for changing labels. | |
# The node controller monitors Kubernetes nodes. | |
# Namespace and serviceaccount labels are used for policy. |
You can create the file with the following script. The script creates the necessary Google Cloud Platform (GCP) service account and gives it access to the registry. | |
# create a GCP service account; format of account is email address | |
SA_EMAIL=$(gcloud iam service-accounts --format='value(email)' create k8s-gcr-auth-ro) | |
# create the json key file and associate it with the service account | |
gcloud iam service-accounts keys create k8s-gcr-auth-ro.json --iam-account=$SA_EMAIL | |
# get the project id | |
PROJECT=$(gcloud config list core/project --format='value(core.project)') | |
# add the IAM policy binding for the defined project and service account | |
gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$SA_EMAIL --role roles/storage.objectViewer |
// https://stackoverflow.com/questions/14226803/javascript-wait-5-seconds-before-executing-next-line | |
function wait(ms){ | |
var start = new Date().getTime(); | |
var end = start; | |
while(end < start + ms) { | |
end = new Date().getTime(); | |
} | |
} |
sysctl -w fs.file-max=12000500 | |
sysctl -w fs.nr_open=20000500 | |
ulimit -n 20000000 | |
sysctl -w net.ipv4.tcp_mem='10000000 10000000 10000000' | |
sysctl -w net.ipv4.tcp_rmem='1024 4096 16384' | |
sysctl -w net.ipv4.tcp_wmem='1024 4096 16384' | |
sysctl -w net.core.rmem_max=16384 | |
sysctl -w net.core.wmem_max=16384 |
I hereby claim:
To claim this, I am signing this object: