I hereby claim:
- I am zycon on github.
- I am tibin (https://keybase.io/tibin) on keybase.
- I have a public key whose fingerprint is D4AC F4BC 2229 F36C 9A3F 8686 9681 D4B5 817D A2CB
To claim this, I am signing this object:
apiVersion: v1 | |
kind: PersistentVolumeClaim | |
metadata: | |
name: pv-claim-nfs | |
namespace: default | |
spec: | |
storageClassName: "nfs-storageclass" | |
accessModes: | |
- ReadWriteOnce | |
resources: |
apiVersion: v1 | |
kind: ReplicationController | |
metadata: | |
name: nfs-server | |
namespace: default | |
spec: | |
replicas: 1 | |
selector: | |
role: nfs-server | |
template: |
apiVersion: v1 | |
kind: PersistentVolume | |
metadata: | |
name: nfs-storage-logs | |
namespace: default | |
spec: | |
capacity: | |
storage: 50Gi | |
accessModes: | |
- ReadWriteMany |
I hereby claim:
To claim this, I am signing this object:
Sometime it would be hard to configure proxy in smartphone for insepcting the packets. And some apps might not respect it too, the quick solution which came into my mind is to configure an openvpn server in laptop and then forward the http packets to burp in the host machine Steps
iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 80 -j REDIRECT --to-port 8080
iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 443 -j REDIRECT --to-port 8080
you may need to root your android and push the burp root certificates to the trusted system ca's to intercept the app traffic
$listener = [System.Net.Sockets.TcpListener]6655 | |
$listener.Start(); | |
$listener.Stop(); |
### FILTER PODS | |
kubectl delete pods --field-selector=status.phase=Pending | |
### GET IMAGES | |
kubectl get pods -o jsonpath="{.items[*].spec.containers[*].image}" |tr -s '[[:space:]]' '\n' |sort |uniq -c | |
### Delete pods not running | |
kubectl get pods | grep -v Running | awk '{print $1}' | xargs kubectl delete pod |
run.sh > /dev/null 2>&1& |
##Creating user | |
CREATE USER read_u PASSWORD 'any-password'; | |
##Creating role | |
create role client_readonly; | |
###Select the database that you need to grant the access then execute the queries | |
##Select public table too if neccessary | |
GRANT USAGE ON SCHEMA client_schema TO client_readonly; | |
GRANT SELECT ON ALL TABLES IN SCHEMA client_schema TO client_readonly; | |
##Making sure the future created tables in the schema have this rule enabled |
screen - To create a screen | |
screen -x [screen id] - Connect / Attach to a specific running screen. | |
Ctrl + D - while in a screen to Terminate / Stop a screen from running. | |
Ctrl + A, Then press D - while in a screen to detach from screen without disturbing it. | |
killall screen - Detach or terminate all screens. |