Skip to content

Instantly share code, notes, and snippets.

View statik's full-sized avatar
😎
happily working! I may be slow to respond

Elliot Murphy statik

😎
happily working! I may be slow to respond
View GitHub Profile
@statik
statik / README.md
Last active August 29, 2015 14:15 — forked from jfromaniello/README.md

This is a fork from the original CoreOS cloud formation template. It adds two EBS disks of 30G, mounted to /var/lib/docker.

This is intended to be used with an m3.large machine which comes with 30G of SSD.

The reason I add two of 30 and not one of 60 is because a BTRFS limitation.

You can use the "btrfs add" approach in the units to create a BTRFS raid.

{
"AWSTemplateFormatVersion": "2010-09-09",
"Description": "CoreOS on EC2: http://coreos.com/docs/running-coreos/cloud-providers/ec2/",
"Mappings" : {
"RegionMap" : {
"ap-northeast-1" : {
"AMI" : "ami-19fba518"
},
@statik
statik / gist:7d05a7fa0fb6543b1524
Last active August 29, 2015 14:09
coreOS slickle cloud-config
#cloud-config
coreos:
update:
reboot-strategy: best-effort
units:
- name: etcd.service
command: start
- name: fleet.service
command: start
hostname: slickle
@statik
statik / bootstrap.sh
Last active August 29, 2015 14:06 — forked from keo/bootstrap.sh
#!/bin/sh
# Setup encrypted disk image
# For Ubuntu 14.04 LTS
CRYPTFS_ROOT=/cryptfs
apt-get update
apt-get -y upgrade
apt-get -y install cryptsetup

Business Models

Advertising

Models Examples
Display ads Yahoo!
Search ads Google
@statik
statik / keybase.md
Created March 5, 2014 14:47
keybase.md

Keybase proof

I hereby claim:

  • I am statik on github.
  • I am statik (https://keybase.io/statik) on keybase.
  • I have a public key whose fingerprint is 6074 9C9C 2441 870D F8F5 CACF A194 1865 8E81 11D7

To claim this, I am signing this object:

Step 0:

Get Homebrew installed on your mac if you don't already have it

Step 1:

Install highlight. "brew install highlight". (This brings down Lua and Boost as well)

Step 2:

@statik
statik / ssl_check.feature
Created July 29, 2013 18:51
Checking SSL expiration dates with cucumber
Feature: SSL Renewal Checks
We have a large list of SSL certificates
So that none of those expire
We can run a check for those soon expiring
Scenario Outline: Check SSL certificate expiration
When I sslcheck <website>
Then the SSL certificate should have at least 30 days remaining
Examples:
| website |
{
"Statement": [
{
"Sid": "PackerSecurityGroupAccess",
"Action": [
"ec2:CreateSecurityGroup",
"ec2:DeleteSecurityGroup",
"ec2:DescribeSecurityGroups",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupIngress"