I hereby claim:
- I am northox on github.
- I am northox (https://keybase.io/northox) on keybase.
- I have a public key whose fingerprint is 8A70 E815 92F5 262A EEB1 7BF1 1055 33C9 CF49 C615
To claim this, I am signing this object:
#!/bin/sh | |
v=63 | |
dotv=6.3 | |
url=ftp://openbsd.cs.toronto.edu/pub/OpenBSD/ | |
files='{man*tgz,comp*tgz,base*tgz,bsd*,INS*,SHA256.sig}' | |
vfiles='{man*tgz,comp*tgz,base*tgz,bsd*,INS*}' | |
mkdir $v | |
cd $v |
#!/bin/ksh | |
DIRPATH='/etc/bacula/bacula-dir.conf' | |
NOERROR='Backup missing for: ' | |
ERROR=$NOERROR | |
TODAY=`date "+%v" | sed 's/-20/-/'` | |
OKSTATUS=`echo 'status storage=FileStorage' | bconsole | grep ${TODAY} | grep OK` | |
CLIENTS=`grep '^Client {' -A1 $DIRPATH | grep Name | sed -E 's/ +Name = ([a-zA-Z]+)-fd/\1/'` | |
for c in $CLIENTS; do |
ikev2 "inet" passive ipcomp esp \ | |
from 0.0.0.0/0 to 10.0.1.0/24 \ | |
from 10.0.0.0/24 to 10.0.1.0/24 \ | |
local egress peer any \ | |
srcid egress \ | |
psk "strong-password" \ | |
config protected-subnet 0.0.0.0/0 \ | |
config address 10.0.1.0/24 \ | |
config name-server 10.0.0.1 \ | |
tag IKED |
#!/bin/sh | |
path=snapshots | |
url=ftp://openbsd.cs.toronto.edu/pub/OpenBSD/ | |
rel=`uname -r` | |
major=`echo $rel | sed 's/\..*//'` | |
minor=`echo $rel | sed 's/.*\.//'` | |
mkdir -p $path | |
cd $path |
#!/usr/bin/env python | |
# | |
# Single click backup of QubesOS - beacause, really, there's no need to protect | |
# the password in dom0. If it's ever accessed, it was already game over. | |
# | |
# Author: Danny Fullerton - Mantor Organization | |
# | |
# Usage | |
# - Mod commands accordingly, e.g. filesystem, path, drive | |
# - Create a file in dom0:~/.backup.pass containing your password. |
I hereby claim:
To claim this, I am signing this object:
At no point should the Nagios server be able to run arbitrary command on monitored systems (aka only non-logonable ids), i.e. no value can be dynamically pass between the client and the server. The SSH server (i.e. munin-client) must use the SSH key to define which command to execute.
Define per-command ssh keys - ssh-keygen
.
e.g. /home/nagios/dns
#!/bin/bash
echo `ssh -i /home/nagios/.ssh/bacula_rsa -q [email protected]`
#!/bin/sh | |
# @author: Danny Fullerton - Mantor Organization | |
error=0 | |
errormakesnap="" | |
errorstop="" | |
errorstart="" | |
expr $1 + 0 > /dev/null 2>&1 | |
if [ $? -ne 0 ]; then | |
echo "'Number of backup' argument is not integer value." |
$ ruby ruote_scheduler.rb | |
Submited at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012-10-23 22:09:42 -0400 | |
job.job_id: Rufus::Scheduler::EveryJob_4748540 at 2012 |