Side note: all available resource metrics are documented here:
These are used for isolating files on disk from both the host system as well as other running tasks.
| from contextlib import contextmanager | |
| import errno | |
| import json | |
| import os | |
| import shutil | |
| import sys | |
| import tempfile | |
| from notebook.notebookapp import main as notebook_main |
Side note: all available resource metrics are documented here:
These are used for isolating files on disk from both the host system as well as other running tasks.
| # Example linkerd.conf for aurora jobs | |
| admin: { port: '31218' } | |
| namers: | |
| - kind: io.l5d.serversets | |
| prefix: /zk/dal09 | |
| zkAddrs: | |
| - { host: zk1.dal09.prod.example.com, port: '2181'} | |
| - { host: zk2.dal09.prod.example.com, port: '2181'} |
I've been using a lot of Ansible lately and while almost everything has been great, finding a clean way to implement ansible-vault wasn't immediately apparent.
What I decided on was the following: put your secret information into a vars file, reference that vars file from your task, and encrypt the whole vars file using ansible-vault encrypt.
Let's use an example: You're writing an Ansible role and want to encrypt the spoiler for the movie Aliens.