Skip to content

Instantly share code, notes, and snippets.

# install vagrant
macmini:vagrant tru$ VERS=1.9.1
macmini:vagrant tru$ curl https://releases.hashicorp.com/vagrant/${VERS}/vagrant_${VERS}.dmg > vagrant_${VERS}.dmg
macmini:vagrant tru$ curl https://releases.hashicorp.com/vagrant/${VERS}/vagrant_${VERS}_SHA256SUMS > vagrant_${VERS}_SHA256SUMS
macmini:vagrant tru$ grep vagrant_${VERS}.dmg vagrant_${VERS}_SHA256SUMS | shasum -a 256 -c && \
macmini:vagrant tru$ hdiutil mount vagrant_${VERS}.dmg && \
macmini:vagrant tru$ sudo installer -pkg /Volumes/Vagrant/Vagrant.pkg -target /
macmini:vagrant tru$ hdiutil unmount /Volumes/Vagrant
# installing VirtualBox
macmini:vagrant tru$ VERSVB=5.1.14
@nicksan2c
nicksan2c / aws-certification.md
Created April 15, 2017 11:12 — forked from miglen/aws-certification.md
AWS Certification guide and notes on how to prepare for the aws associate certification architect, sysops and developer exams


AWS Certification notes

Those are my personal notes on AWS Solution Architect certification preparation. Hope you find them usefull.

To pass AWS certification, you should have:

  • Sound knowledge about most of the AWS services ( EC2, VPC, RDS, Cloudfront, S3, Route53 etc,)
  • Hands on experience with AWS services.
@nicksan2c
nicksan2c / 2016-devops-conf-playlist.md
Created April 15, 2017 11:15 — forked from miglen/2016-devops-conf-playlist.md
2016 DevOps Conferences - Video playlists
@nicksan2c
nicksan2c / README.md
Created April 15, 2017 20:45 — forked from leonardofed/README.md
A curated list of AWS resources to prepare for the AWS Certifications


A curated list of AWS resources to prepare for the AWS Certifications

A curated list of awesome AWS resources you need to prepare for the all 5 AWS Certifications. This gist will include: open source repos, blogs & blogposts, ebooks, PDF, whitepapers, video courses, free lecture, slides, sample test and many other resources.

For more about AWS and AWS Certifications and updates to this Gist you should follow me @leonardofed


@nicksan2c
nicksan2c / props.conf
Created April 16, 2017 20:31 — forked from darylrobbins/props.conf
AWS Splunk Configuration
[source::.../var/log/messages]
sourcetype = linux_messages_syslog
[source::.../var/log/secure]
sourcetype = linux_secure
[source::.../var/log/dmesg]
sourcetype = dmesg
[source::.../var/log/cron]
@nicksan2c
nicksan2c / Vagrantfile
Created April 16, 2017 20:34
Install Splunk on Vagrant
# -*- mode: ruby -*-
# vi: set ft=ruby :
Vagrant.configure(2) do |config|
config.vm.box = "ubuntu/trusty64"
config.vm.network "forwarded_port", guest: 8000, host: 8000
config.vm.network "forwarded_port", guest: 8089, host: 8089
config.vm.provider "virtualbox" do |vb|
vb.memory = "2048"
end
@nicksan2c
nicksan2c / Dockerfile
Created April 16, 2017 20:35 — forked from bdenning/Dockerfile
Dockerfile for creating Splunk container
FROM docker.io/centos:latest
MAINTAINER Bowen Denning <[email protected]>
ENV PATH=$PATH:/opt/splunk/bin
RUN yum update -y
## Download and install Splunk
RUN curl https://download.splunk.com/products/splunk/releases/6.4.1/linux/splunk-6.4.1-debde650d26e-linux-2.6-x86_64.rpm -O && \
yum install -y splunk*.rpm && \
@nicksan2c
nicksan2c / gist:944e8081e00ec591dfac6e238af7b25e
Created April 16, 2017 20:36 — forked from dky/gist:9982144
List all non Splunk indexes
cd /opt/splunk/var/lib/splunk && for i in `ls -1 -d */| less |egrep -iv "summary|audit|authDb|blockSignature|defaultdb|hashDb|fishbucket|_internaldb|notable|notabledb|persistentstorage|session_*|appserver|historydb"`; do du -sh $i; done
@nicksan2c
nicksan2c / nullQueue Example
Created April 16, 2017 20:38 — forked from chrhuber/nullQueue Example
Splunk Summary Indexing Licence Usage
[debug_log_transform]
REGEX=DEBUG\s[
DEST_KEY = queue
FORMAT = nullQueue
Link https://answers.splunk.com/answers/11617/route-unwanted-logs-to-a-null-queue.html
@nicksan2c
nicksan2c / gist:645773057ba165a3576d0459ae1ba77d
Created April 16, 2017 20:49 — forked from waprin/gist:7aee67aefd7530d3587a
Verify Splunk Regex Matches Against Your Entire Log File
#!/usr/bin/env python
# usage ./verify_splunk_coverage.py <log_file>
# set these from splunk-apps/apps/<service-name>/default/props.conf
BREAK_ONLY_BEFORE_REGEX=r'^\d\d:\d\d:\d\d\s\[[^\]]+\]'
EXTRACT_REGEX=r'^\d?\d:\d\d:\d\d\s\[(?P<thread>[^\]]+)\]\s\[(?P<loglevel>\w+)\]\s\[(?P<class>[^\]]+)\]\s\[(?P<username>[^\]]*)\](?P<message>.*)$'
import re,sys
f = open(sys.argv[1])