I hereby claim:
- I am mgoodness on github.
- I am mgoodness (https://keybase.io/mgoodness) on keybase.
- I have a public key ASDT8fGpKWmps-o_HhjIM5NNTlPN3CQFs48vZEHFhOa5eQo
To claim this, I am signing this object:
| #!/usr/bin/python | |
| import os | |
| import smtplib | |
| import time | |
| from email.mime.text import MIMEText | |
| access_dbs = [ | |
| {'location':'/srv/data/apps/Access/Data/Jobtrack/JobTrackData.mdb', |
| #!/bin/bash | |
| # *** Accepts two optional arguments | |
| # -tDATE: today's date (ISO-8601, yyyy-mm-dd) | |
| # -yDATE: yesterday's date (ISO-8601, yyyy-mm-dd) | |
| # | |
| # Use these if a nightly backup is missed. | |
| # "Yesterday's date" should be the date of the last successful backup. | |
| # Otherwise --link-dest will fail and rsync will do a full copy | |
| # instead of a diff. |
| #!/usr/bin/env python | |
| # Reflects the requests from HTTP GET methods | |
| # Written by Nathan Hamiel (2010), modified by Michael Goodness (2015) | |
| from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler | |
| from argparse import ArgumentParser | |
| from urlparse import urlparse | |
| import daemon | |
| import socket |
| [Unit] | |
| Description=Mount EBS volume at /var/lib/etcd2 | |
| Requires=format-etcd-ebs.service | |
| After=format-etcd-ebs.service | |
| Before=etcd2.service | |
| [Mount] | |
| DirectoryMode=0777 | |
| Type=ext4 | |
| What=/dev/xvdb |
| [Unit] | |
| Description=Format EBS volume if needed | |
| Before=etcd2.service | |
| [Service] | |
| ExecStart=/bin/bash -c \ | |
| '(/usr/sbin/blkid -t TYPE=ext4 | grep /dev/xvdb) || \ | |
| (/usr/sbin/wipefs -fa /dev/xvdb && /usr/sbin/mkfs.ext4 /dev/xvdb)' | |
| RemainAfterExit=yes | |
| Type=oneshot |
| function asp { | |
| if [[ -z "$1" ]]; then | |
| if [[ -z "$AWS_DEFAULT_PROFILE" ]]; then | |
| echo "No profile set" | |
| else | |
| asp "$AWS_DEFAULT_PROFILE" | |
| echo "$AWS_DEFAULT_PROFILE" | |
| fi | |
| else | |
| if ! fgrep -q "[profile $1]" ~/.aws/config; then |
| [default] | |
| aws_access_key_id = <ACCESS_KEY> | |
| aws_secret_access_key = <SECRET_KEY> | |
| [prod] | |
| role_arn = arn:aws:iam::<ACCOUNT_NUMBER>:role/<PROD_ROLE_NAME> | |
| source_profile = default | |
| [stage] | |
| role_arn = arn:aws:iam::<ACCOUNT_NUMBER>:role/<STAGE_ROLE_NAME> |
| [profile default] | |
| output = json | |
| region = us-east-1 | |
| [profile prod] | |
| output = json | |
| region = us-east-1 | |
| [profile stage] | |
| output = json |
I hereby claim:
To claim this, I am signing this object:
service.beta.kubernetes.io/aws-load-balancer-access-log-emit-interval (in minutes)service.beta.kubernetes.io/aws-load-balancer-access-log-enabled (true|false)service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-nameservice.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefixservice.beta.kubernetes.io/aws-load-balancer-additional-resource-tags (comma-separated list of key=value)service.beta.kubernetes.io/aws-load-balancer-backend-protocol (http|https|ssl|tcp)service.beta.kubernetes.io/aws-load-balancer-connection-draining-enabled (true|false)