Skip to content

Instantly share code, notes, and snippets.

View jrnt30's full-sized avatar

Justin Nauman jrnt30

View GitHub Profile
@jrnt30
jrnt30 / ec2tags.rb
Last active August 29, 2015 14:16 — forked from mlehner616/ec2tags.rb
require 'facter'
require 'json'
if Facter.value("ec2_instance_id") != nil
instance_id = Facter.value("ec2_instance_id")
region = Facter.value("ec2_placement_availability_zone")[0..-2]
tags = Facter::Util::Resolution.exec("aws ec2 describe-tags --region #{region} --filters \"Name=resource-id,Values=#{instance_id}\" --query 'Tags[*].{value:Value,key:Key}'")
parsed_tags = JSON.parse(tags)
parsed_tags.each do |tag|
@jrnt30
jrnt30 / Readme.md
Last active September 29, 2015 16:05
MySql with Otto Depdency
  • Created subfolder “mysql” for app dep mkdir mysql
  • Created “mysql/Appfile” w/ mysql-Appfile contents
  • cd mysql && otto compile
  • created "root" Appfile w/ root-Appfile content
  • otto compile && otto dev build in “root” folder
application {
name = "http_test"
type = "node"
}
@jrnt30
jrnt30 / Stopcallinghome.txt
Created December 15, 2015 19:49 — forked from CHEF-KOCH/Stopcallinghome.txt
Windows 10 seems to be an privacy nightmare, here is how you can stop the home calling function
Microsoft's Windows 10 has permission to spy on you
Well first of all "spying" is a bit misleading, it's written down in the eula/terms what can be collected, the major problem is that
this will be collected even on the first installation without getting any chance to change that.
Available Tools:
Destroy Windows 10 Spying
DoNotSpy10
@jrnt30
jrnt30 / Terraform-GH-3884.log
Created February 11, 2016 12:53
Log output of Terraform issue 3884 from providers/aws/us_east_1_prod
This file has been truncated, but you can view the full file.
2016/02/11 06:49:32 [INFO] Terraform version: 0.6.11
2016/02/11 06:49:32 [DEBUG] Detected home directory from env var: /Users/justinn
2016/02/11 06:49:32 [DEBUG] Discovered plugin: atlas = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-atlas
2016/02/11 06:49:32 [DEBUG] Discovered plugin: aws = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-aws
2016/02/11 06:49:32 [DEBUG] Discovered plugin: azure = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-azure
2016/02/11 06:49:32 [DEBUG] Discovered plugin: azurerm = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-azurerm
2016/02/11 06:49:32 [DEBUG] Discovered plugin: chef = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-chef
2016/02/11 06:49:32 [DEBUG] Discovered plugin: cloudflare = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-cloudflare
2016/02/11 06:49:32 [DEBUG] Discovered plugin: cloudstack = /usr/local/Cellar/terraform/0.6.11/bin/terraform-provider-cloudstack
2016/02/11 06:49:32 [DEBUG] Discovere
@jrnt30
jrnt30 / secret.rb
Created March 16, 2016 13:47 — forked from sethvargo/secret.rb
Example Chef extension to extract secrets from HashiCorp's Vault
# Please see the following blog post for more information:
#
# https://www.hashicorp.com/blog/using-hashicorp-vault-with-chef.html
#
resource_name :vault_secret
property :path, String, name_property: true
property :destination, String
@jrnt30
jrnt30 / Terraform-State-Ideas.md
Created May 17, 2016 01:55 — forked from apparentlymart/Terraform-State-Ideas.md
Terraform State Integrity Issues

Issues with Terraform State Management

The idea of "state" is the lynchpin of Terraform, and yet Terraform's workflow is fraught with gotchas that can lead to the loss or destruction of state. This doc is a set of notes about issues I've encountered, what caused them, and in many cases ideas about how to improve Terraform to avoid or reduce the chances of them.

Each of these scenarios has occured at least within my team. Each time one of these occurs it erodes people's confidence in Terraform, giving it a reputation for being fragile and unforgiving of errors. This this document is not written just to criticize but rather to identify ways in which the situation could be improved.

@jrnt30
jrnt30 / Log
Created May 18, 2016 14:38
GH 5396 tests
09:35 $ terraform --version
Terraform v0.6.16
✔ ~/Development/go/src/github.com/hashicorp/issues/5396
09:35 $ cat main.tf
variable "aws_region" { default = "us-east-1" }
variable "cidrs" { default = "10.1.0.0/16,10.2.0.0/16,10.3.0.0/16" }
provider "aws" {
region = "${var.aws_region}"

Keybase proof

I hereby claim:

  • I am jrnt30 on github.
  • I am jrnt30 (https://keybase.io/jrnt30) on keybase.
  • I have a public key whose fingerprint is 4B25 5AB4 7FBF 8F11 9B67 A1E9 C299 3AC5 C99B 431C

To claim this, I am signing this object: