I hereby claim:
- I am koenighotze on github.
- I am koenighotze (https://keybase.io/koenighotze) on keybase.
- I have a public key whose fingerprint is 1510 007A 7168 BB97 8C1A D04F F374 030E 538F 74DC
To claim this, I am signing this object:
#!/usr/bin/env bash | |
# when a command fails, bash exits instead of continuing with the rest of the script | |
set -o errexit | |
# make the script fail, when accessing an unset variable | |
set -o nounset | |
# pipeline command is treated as failed, even if one command in the pipeline fails | |
set -o pipefail | |
# enable debug mode, by running your script as TRACE=1 | |
if [[ "${TRACE-0}" == "1" ]]; then set -o xtrace; fi |
#!/usr/bin/env bash | |
for ns in $(kubectl get ns -o=jsonpath='{.items[*].metadata.name}' | sort); do | |
echo Namespace: $ns | |
kubectl get vs \ | |
-n $ns ${ns}-master \ | |
-o=jsonpath='{" Destination: "}{.spec.http[*].route[*].destination.host}{"\n Regex mapping:\n "}{range .spec.http[*].match[*]}{.uri.regex}{"\n "}{end}{"\n"}{"\n Prefix mapping:\n "}{range .spec.http[*].match[*]}{.uri.prefix}{"\n "}{end}' 2>/dev/null \ | |
|| echo "No istio virtual services" | |
echo | |
echo |
function kube_context() { | |
# could have used $?, but it was easier with a string compare | |
local ctx=$(kubectl config current-context 2>&1) | |
if [ "${ctx}" != "error: current-context is not set" ]; then | |
echo -n "<${ctx}> " | |
fi | |
} | |
function parse_git_branch() { | |
git branch --no-color 2> /dev/null | sed -e '/^[^*]/d' -e "s/* \(.*\)/\1/" |
#!/usr/bin/env bash | |
type wget >/dev/null 2>&1 || { echo >&2 "I require wget but it's not installed."; exit 1; } | |
type mdless >/dev/null 2>&1 || { echo >&2 "I require mdless but it's not installed."; exit 1; } | |
TOOL=${1:?Usage: hack.sh <toolname> [--refresh]} | |
REFRESH=${2:-no} | |
RAW_MD_URL="https://raw.github.com/hazeorid/devhints.io/gh-pages/${TOOL}.md" |
provider "aws" { | |
region = "eu-west-1" | |
} | |
resource "aws_instance" "stage1" { | |
instance_type = "t2.micro" | |
ami = "ami-a8d2d7ce" | |
vpc_security_group_ids = ["${aws_security_group.stage1-sec-group.id}"] |
provider "aws" { | |
region = "eu-west-1" | |
} | |
resource "aws_instance" "stage1" { | |
instance_type = "t2.micro" | |
ami = "ami-a8d2d7ce" | |
vpc_security_group_ids = ["${aws_security_group.stage1-sec-group.id}"] |
provider "aws" { | |
region = "eu-west-1" | |
} | |
resource "aws_instance" "stage1" { | |
instance_type = "t2.micro" | |
ami = "ami-a8d2d7ce" | |
tags { | |
Name = "stage1" |
provider "aws" { | |
region = "eu-west-1" | |
} | |
resource "aws_instance" "simple" { | |
instance_type = "t2.micro" | |
ami = "ami-a8d2d7ce" | |
} |
provider "aws" { | |
region = "eu-west-1" | |
} |
I hereby claim:
To claim this, I am signing this object: