I hereby claim:
- I am ryancurrah on github.
- I am rcurrah (https://keybase.io/rcurrah) on keybase.
- I have a public key whose fingerprint is 24DC 44B2 89F9 A289 C6D5 81AB 0742 9ACA A803 887D
To claim this, I am signing this object:
| from os import listdir | |
| from os.path import isfile | |
| from argparse import ArgumentParser | |
| from common.sensu import Sensu | |
| from common.proc import Proc | |
| sensu = Sensu() | |
| def main(): |
| import ast | |
| from salt.config import minion_config, master_config | |
| from argparse import ArgumentParser | |
| from common.sensu import Sensu | |
| sensu = Sensu() | |
| def main(): | |
| """ |
| __author__ = 'ryan currah' | |
| import requests | |
| from argparse import ArgumentParser | |
| import csv | |
| import logging | |
| logging.basicConfig(filename=__file__.replace('.py', '.log'), | |
| format='%(asctime)s %(levelname)s: %(message)s', | |
| level=logging.DEBUG) |
| from subprocess import Popen, PIPE | |
| from argparse import ArgumentParser | |
| from pprint import pprint | |
| import logging | |
| import sys | |
| import salt.client | |
| import json | |
| logging.basicConfig(stream=sys.stdout, |
| $execute = $args[0] | |
| $argmuent = $args[1] | |
| $working_directory = $args[2] | |
| $task_name = $args[3] | |
| $description = $args[4] | |
| $get_task = Get-ScheduledTask $task_name -ErrorAction SilentlyContinue | |
| if ($get_task) { | |
| Write-Output "changed=no comment='Task name already exists, task not added.'" | |
| } |
| $Server = $args[0] | |
| $StartOfEpoch=New-Object DateTime(1900,1,1,0,0,0,[DateTimeKind]::Utc) | |
| [Byte[]]$NtpData = ,0 * 48 | |
| $NtpData[0] = 0x1B # NTP Request header in first byte | |
| $Socket = New-Object Net.Sockets.Socket([Net.Sockets.AddressFamily]::InterNetwork, | |
| [Net.Sockets.SocketType]::Dgram, | |
| [Net.Sockets.ProtocolType]::Udp) | |
| $Socket.Connect($Server,123) |
| # We want to "install" | |
| install | |
| cdrom | |
| # Set the language | |
| lang en_US.UTF-8 | |
| keyboard us |
| # -*- coding: utf-8 -*- | |
| ''' | |
| Returns state event data for state.sls and state.highstate execution only using a tcp socket, this method of | |
| returning data can be used for Splunk or ELK. | |
| Each event sent represents a single state executed. | |
| It is strongly recommended to use the ``event_return_whitelist`` so not all | |
| events call this returner, for example: |
| # -*- coding: utf-8 -*- | |
| ''' | |
| Execution module to work with HashiCorp's Vault | |
| :depends: - python-requests | |
| In order to use an this module, a profile must be created in the master | |
| configuration file: | |
| Token example: |
I hereby claim:
To claim this, I am signing this object: