This is an example of Envoy TCP Proxy from localhost:10000
to www.google.com:80
.
See also https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/listeners/tcp_proxy.
To run a proxy:
% docker run --rm getenvoy/envoy:stable --version
This is an example of Envoy TCP Proxy from localhost:10000
to www.google.com:80
.
See also https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/listeners/tcp_proxy.
To run a proxy:
% docker run --rm getenvoy/envoy:stable --version
package main | |
import ( | |
"fmt" | |
"time" | |
"github.com/tsenart/vegeta/lib" | |
) | |
func testRate(rate int, sla time.Duration) bool { |
- hosts: all | |
name: get group ips in one line | |
gather_facts: false | |
vars: | |
all_servers_ip: "{{groups['all'] | map('extract',hostvars,['ansible_ssh_host']) | join(',') }}" | |
tasks: | |
- debug: | |
msg: "{{all_servers_ip}}" |
$ genisoimage -output seed.iso -volid cidata -joliet -rock user-data meta-data |
stages: | |
- build | |
- push | |
- cleanup | |
build: | |
stage: build | |
variables: | |
REGISTRY_SERVER: foo.bar | |
IMAGE_NAME: vrutkovs-public/openshift-ansible-testing |
@Component | |
public class LogFilter extends OncePerRequestFilter { | |
private static Logger LOG = LoggerFactory.getLogger(LogFilter.class); | |
@Override | |
protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) | |
throws ServletException, IOException { | |
LOG.info(request.getRequestURI()); // log the request path. | |
} |
{"openapi":"3.0.1","info":{"title":"OpenAPI definition","version":"v0"},"servers":[{"url":"http://localhost:7013","description":"Generated server url"}],"paths":{"/api/v0/balances/msisdn/{msisdn}":{"get":{"tags":["balance-enquiry-controller"],"operationId":"enquire","parameters":[{"name":"msisdn","in":"path","required":true,"schema":{"type":"string"}},{"name":"productCode","in":"query","required":false,"schema":{"type":"string"}},{"name":"unitType","in":"query","required":true,"schema":{"type":"string"}},{"name":"accountCode","in":"query","required":false,"schema":{"type":"string"}}],"responses":{"200":{"description":"OK","content":{"*/*":{"schema":{"$ref":"#/components/schemas/ApiResponseListEnquiryAccountBalance"}}}}}}}},"components":{"schemas":{"ApiResponseListEnquiryAccountBalance":{"type":"object","properties":{"data":{"type":"array","items":{"$ref":"#/components/schemas/EnquiryAccountBalance"}},"success":{"type":"boolean"},"httpStatusCode":{"type":"integer","format":"int32"},"message":{"type":"string"}, |
This gist describes the configuration required for Spring reactive WebClient to make a call to an OAuth2 protected resource through OAuth2.0 Client Credentials Grant Type Flow.
Assumption is that the Authorization Server supports OpenId Connect 1.0 specifications.
#!/usr/bin/env python | |
import gitlab | |
from jira import JIRA | |
import urllib3 | |
## Disable urllib3 ssl checks warnings | |
urllib3.disable_warnings( urllib3.exceptions.InsecureRequestWarning ) | |
## GitLab config |
See this issue.
Docker best practise to Control and configure Docker with systemd.
Create daemon.json
file in /etc/docker
:
{"hosts": ["tcp://0.0.0.0:2375", "unix:///var/run/docker.sock"]}