This guide has moved to a GitHub repository to enable collaboration and community input via pull-requests.
https://github.com/alexellis/k8s-on-raspbian
Alex
This guide has moved to a GitHub repository to enable collaboration and community input via pull-requests.
https://github.com/alexellis/k8s-on-raspbian
Alex
| Pentaho BA 7.0 Install with PostgreSQL repo DB | |
| INSTALL POSTGRES | |
| https://wiki.postgresql.org/wiki/YUM_Installation | |
| 1) find | |
| /etc/yum.repos.d/CentOS-Base.repo | |
| vi /etc/yum.repos.d/CentOS-Base.repo | |
| remove | |
| add |
| import requests | |
| import time | |
| import json | |
| token = '' | |
| #Delete files older than this: | |
| ts_to = int(time.time()) - 30 * 24 * 60 * 60 | |
| def list_files(): |
| /** | |
| * Welcome to the Synthetics JavaScript IDE - API Edition | |
| * You can think of it like node.js lite. Everything you'd expect to find in a | |
| * node.js environment is also available here, with a few notable exceptions: | |
| * | |
| * Feel free to explore, or check out the full documentation | |
| * https://docs.newrelic.com/docs/synthetics/new-relic-synthetics/scripting-monitors/writing-api-tests | |
| * for details. | |
| */ |
An IAM user policy document to give minimal rights for deploying an Elastic Beanstalk application.
Where:
REGION: AWS region.ACCOUNT_ID: AWS account ID.APPLICATION_NAME: Desired target Elastic Beanstalk application name(space).IAM_INSTANCE_PROFILE_ROLE: The instance profile (IAM role) Elastic Beanstalk EC2 instaces will run under.| INTRO | |
| I get asked regularly for good resources on AWS security. This gist collects some of these resources (docs, blogs, talks, open source tools, etc.). Feel free to suggest and contribute. | |
| Short Link: http://tiny.cc/awssecurity | |
| Official AWS Security Resources | |
| * Security Blog - http://blogs.aws.amazon.com/security/ | |
| * Security Advisories - http://aws.amazon.com/security/security-bulletins/ | |
| * Security Whitepaper (AWS Security Processes/Practices) - http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf | |
| * Security Best Practices Whitepaper - http://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf |
| { | |
| "title": "Apache logs", | |
| "services": { | |
| "query": { | |
| "list": { | |
| "0": { | |
| "query": "*", | |
| "alias": "", | |
| "color": "#7EB26D", | |
| "id": 0, |
| Example -1 | |
| ===================== | |
| input { | |
| file { | |
| path => [ "/usr/local/var/log/suricata/eve.json", "/var/log/ulogd.json" ] | |
| codec => json | |
| type => "json-log" | |
| } | |
| } |
| # Syslog stuff | |
| COMPONENT ([\w._\/%-]+) | |
| COMPID postfix\/%{COMPONENT:component}(?:\[%{POSINT:pid}\])? | |
| POSTFIX %{SYSLOGTIMESTAMP:timestamp} %{SYSLOGHOST:hostname} %{COMPID}: %{QUEUEID:queueid}? | |
| # Milter | |
| HELO (?:\[%{IP:helo}\]|%{HOST:helo}|%{DATA:helo}) | |
| MILTERCONNECT %{QUEUEID:qid}: milter-reject: CONNECT from %{RELAY:relay}: %{GREEDYDATA:milter_reason}; proto=%{WORD:proto} | |
| MILTERUNKNOWN %{QUEUEID:qid}: milter-reject: UNKNOWN from %{RELAY:relay}: %{GREEDYDATA:milter_reason}; proto=%{WORD:proto} |
| input { | |
| stdin { } | |
| file { | |
| type => "postfix" | |
| path => ["/var/log/mail.*"] | |
| } | |
| } | |
| filter { | |
| if [type] == "postfix" { |