[default]
aws_access_key_id = XXXXXXXXXXX
aws_secret_access_key = XXXXXXXXXXXXXXXXXXXXXXXXXXXX
[default]
import org.apache.hadoop.hbase.client.ConnectionFactory | |
import org.apache.hadoop.hbase.{HBaseConfiguration, TableName} | |
import org.apache.log4j.{BasicConfigurator, Logger} | |
object HbaseTest { | |
def main(args: Array[String]): Unit = { | |
BasicConfigurator.configure() | |
val logger = Logger.getLogger(getClass.getName) | |
logger.info("hey") | |
val config = HBaseConfiguration.create |
#!/bin/bash | |
# This script will extract the certificate and key from an .ovpn file | |
# into their own files, which makes it possible to use them to configure | |
# the VPN using Ubuntu's network manager | |
# Usage example: | |
# >> ovpnconvert username.dev.ovpn | |
# You can keep following these instructions here: |
import org.apache.spark.sql.execution.datasources.hbase.HBaseTableCatalog
import sqlContext.implicits._
val configuration = s"""{"hbase.zookeeper.quorum":"127.0.0.1","hbase.zookeeper.property.clientPort":"2181"}"""
val tableCatalog = s"""{
|"table":{"namespace":"$namespace", "name":"$tableName"},
|"rowkey":"key",
|"columns":{
keytool -list -v -keystore keystore.jks
Export from keytool's proprietary format (called "JKS") to standardized format PKCS #12:
keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.p12 -deststoretype PKCS12 -srcalias <jkskeyalias> -deststorepass <password> -destkeypass <password>