- Create ZFS pool
sudo zpool create -f zroot /dev/sdaX
- Create ZFS dataset
sudo zfs create -o mountpoint=/var/lib/docker zroot/docker
- Edit
/etc/defaults/docker
sudo zpool create -f zroot /dev/sdaX
sudo zfs create -o mountpoint=/var/lib/docker zroot/docker
/etc/defaults/docker
#!/bin/bash | |
# server-jre-8u5-linux-x64.tar.gz | |
DEBIAN_FRONTEND=noninteractive | |
UCF_FORCE_CONFFNEW=true | |
export UCF_FORCE_CONFFNEW DEBIAN_FRONTEND | |
apt-get update | |
apt-get -y -o Dpkg::Options::="--force-confdef" -o Dpkg::Options::="--force-confnew" dist-upgrade |
I've been thinking for a while about a strongly typed binary CM system based on Golang (Rust would work as well).
The model depends on something that compiles to a single binary and compiles very fast. Typically golang fits this bill. I've not played with Rust just yet but if it compiles fast, it would work as well.
The workflow goes something like this:
package main | |
// This is a basic example of running an nsqd instance embedded. It creates | |
// and runs an nsqd with all of the default options, and then produces | |
// and consumes a single message. You are probably better off running a | |
// standalone instance, but embedding it can simplify deployment and is | |
// useful in testing. | |
// See https://github.com/nsqio/nsq/blob/master/nsqd/options.go and | |
// https://github.com/nsqio/nsq/blob/master/apps/nsqd/nsqd.go for |
##Install AWS CLI Tools##
cd ~/.aws
edit or create new file named config
paste the following contents inside.
Save the file as "config"
#!/bin/sh | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3.tar.gz | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-001 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-002 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-003 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-004 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-005 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-006 | |
wget http://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-007 |
:sources: | |
- http://<%= node['gem_file']['host'] %>:<%= node['gem_file']['port'] %>/ |
# Get root: | |
sudo su | |
# Install prerequisites: | |
apt-get install build-essential pkg-config checkinstall git avahi-daemon libavahi-client-dev libcrack2-dev libwrap0-dev autotools-dev automake libtool libdb-dev libacl1-dev libdb5.1-dev db-util db5.1-util libgcrypt11 libgcrypt11-dev | |
# Build libevent from source: | |
cd /usr/local/src |
#A script to post back to Slack via the webhooks API
##why this exists?
Slack's own hubot adapter needs the hubot installation to be accessible via web. This can be problematic in some cases, as a security risk.
This hack let's you run your Hubot behind a firewall, and connect to Slack via the IRC gateway.
To respond, Hubot uses the incoming webhooks end-point of Slack.
{ | |
"title": "System Resources", | |
"services": { | |
"query": { | |
"list": { | |
"0": { | |
"query": "collectd_type:\"load\"", | |
"alias": "Load", | |
"color": "#70DBED", | |
"id": 0, |