This guide describes how to bootstrap new Production Core OS Cluster as High Availability Service in a 15 minutes with using etcd2, Fleet, Flannel, Confd, Nginx Balancer and Docker.
| using System; | |
| using System.Collections.Generic; | |
| using System.IO; | |
| using System.Linq; | |
| using System.Security.Cryptography; | |
| using Newtonsoft.Json; | |
| namespace ConsoleApp6 | |
| { | |
| public class Program |
| # Syntax highlighting for Golang with nano editor | |
| wget -O /usr/share/nano/go.nanorc http://go-lang.cat-v.org/text-editors/nano/go.nanorc | |
| # Golang for nano editor | |
| echo '## Go'$'\n''include "/usr/share/nano/go.nanorc"' >> /etc/nanorc |
By: @BTroncone
Also check out my lesson @ngrx/store in 10 minutes on egghead.io!
Update: Non-middleware examples have been updated to ngrx/store v2. More coming soon!
Table of Contents
| # install haproxy | |
| yum install -y haproxy | |
| # config haproxy for rabbitmq | |
| cat > /etc/haproxy/haproxy.cfg << "EOF" | |
| global | |
| log 127.0.0.1 local0 notice | |
| maxconn 10000 | |
| user haproxy |
A complete list of RxJS 5 operators with easy to understand explanations and runnable examples.
| package main | |
| import ( | |
| "fmt" | |
| "time" | |
| ) | |
| const ( | |
| GraphSize = 8 | |
| RecursionDepth = 5 |
Upsource is a tool that brings Jetbrains IDE's code insights to code reviews. Upsource's integration with Jetbrains IDEs and GitHub are some of the most attractive features for us at VideoBlocks since we're heavy users of them both. We currently have over 50 private repos and use IntelliJ, PHPStorm and WebStorm to build our core products. All of our infrastructure is hosted on AWS now, so I decided to get this up and running there for quick evaluation.
This step is straight forward and there are already some good resources for setting up an EC2 instance. I won't go into detail here, but I chose an Ubuntu AMI at a size of M3.large (which is the minimum instance size Jetbrains recommends). We're configuring our security group with the standard HTTP ports (80 and 443) and exposing the standard SSH port 22.
| # load dynamic modules | |
| load_module /etc/nginx/modules/ngx_http_geoip_module.so; | |
| user nginx; | |
| worker_processes auto; | |
| error_log /var/log/nginx/error.log info; | |
| pid /var/run/nginx.pid; | |
| events { worker_connections 1024; } | |
| http { |
Currently, there is an explosion of tools that aim to manage secrets for automated, cloud native infrastructure management. Daniel Somerfield did some work classifying the various approaches, but (as far as I know) no one has made a recent effort to summarize the various tools.
This is an attempt to give a quick overview of what can be found out there. The list is alphabetical. There will be tools that are missing, and some of the facts might be wrong--I welcome your corrections. For the purpose, I can be reached via @maxvt on Twitter, or just leave me a comment here.
There is a companion feature matrix of various tools. Comments are welcome in the same manner.