I hereby claim:
- I am mafonso on github.
- I am mafonso (https://keybase.io/mafonso) on keybase.
- I have a public key whose fingerprint is F54B 0FC9 3669 51F1 8E73 27FD 9838 2820 11FD 662C
To claim this, I am signing this object:
| #!/bin/bash | |
| # | |
| # this script will attempt to detect any ephemeral drives on an EC2 node and create a RAID-0 stripe | |
| # mounted at /mnt. It should be run early on the first boot of the system. | |
| # | |
| # Beware, This script is NOT fully idempotent. | |
| # | |
| METADATA_URL_BASE="http://169.254.169.254/2012-01-12" |
| for user in $(aws iam list-users --output text --no-cli-pager | awk '{print $NF}'); do | |
| aws iam list-access-keys --user $user --output text --no-cli-pager | |
| test $? -gt 128 && exit | |
| done |
| <?xml version="1.0"?> | |
| <cluster config_version="7" name="pgcluster"> | |
| <clusternodes> | |
| <clusternode name="10.39.30.11" votes="1" nodeid="1"> | |
| <fence/> | |
| </clusternode> | |
| <clusternode name="10.39.30.12" votes="1" nodeid="2"> | |
| <fence/> | |
| </clusternode> | |
| </clusternodes> |
| # Consul Services | |
| {{range services}} | |
| backend {{.Name}} | |
| balance roundrobin | |
| option redispatch | |
| option forwardfor | |
| {{range service .Name}} server {{.Name}} {{.Address}}:{{.Port}} | |
| {{end}} {{end}} | |
| #End Consul services |
| # Generate public key from private | |
| ssh-keygen -f id_rsa -y > id_rsa.pub |
| instance_profile=`curl http://169.254.169.254/latest/meta-data/iam/security-credentials/` | |
| aws_access_key_id=`curl http://169.254.169.254/latest/meta-data/iam/security-credentials/${instance_profile} | grep AccessKeyId | cut -d':' -f2 | sed 's/[^0-9A-Z]*//g'` | |
| aws_secret_access_key=`curl http://169.254.169.254/latest/meta-data/iam/security-credentials/${instance_profile} | grep SecretAccessKey | cut -d':' -f2 | sed 's/[^0-9A-Za-z/+=]*//g'` | |
| export AWS_ACCESS_KEY_ID=${aws_access_key_id} | |
| export AWS_SECRET_ACCESS_KEY=${aws_secret_access_key} |
I hereby claim:
To claim this, I am signing this object:
| 2016/12/06 14:31:58.477298 [INFO] consul-template v0.16.0 | |
| 2016/12/06 14:31:58.477321 [INFO] (runner) creating new runner (dry: false, once: false) | |
| 2016/12/06 14:31:58.477615 [DEBUG] (runner) final config (tokens suppressed): | |
| { | |
| "Path": "/usr/local/consul-template/config/nginx.hcl", | |
| "Consul": "172.17.0.1:8500", | |
| "Token": "", | |
| "ReloadSignal": 1, | |
| "DumpSignal": 3, |
| On Vault: | |
| $ vault auth-enable aws-ec2 | |
| Successfully enabled 'aws-ec2' at 'aws-ec2'! | |
| Error applying plan: | |
| 1 error(s) occurred: | |
| * module.postgres.aws_db_instance.instance: aws_db_instance.instance: diffs didn't match during apply. This is a bug with Terraform and should be reported as a GitHub Issue. | |
| Please include the following information in your report: | |
| Terraform Version: 0.9.2 | |
| Resource ID: aws_db_instance.instance |