I hereby claim:
- I am lesmono on github.
- I am lesmono (https://keybase.io/lesmono) on keybase.
- I have a public key ASAZTk-g2W-KbhS9CuYy8mumoM040uJesfbC2_8700EjIgo
To claim this, I am signing this object:
| /* | |
| 1. Install k6 https://grafana.com/docs/k6/latest/set-up/ | |
| 2. Setup test machine (can handle up to 64510 vus): | |
| - Update sysctl to handle more vus | |
| echo "net.ipv4.ip_local_port_range = 1024 65535" >> /etc/sysctl.conf | |
| echo "net.ipv4.tcp_tw_reuse=1" >> /etc/sysctl.conf | |
| echo "net.ipv4.tcp_timestamps=1" >> /etc/sysctl.conf | |
| echo "kernel.pid_max=999999" >> /etc/sysctl.conf | |
| echo "kernel.thread-max=999999" >> /etc/sysctl.conf | |
| echo "vm.max_map_count=99999" >> /etc/sysctl.conf |
| connector.class=io.debezium.connector.mysql.MySqlConnector | |
| tasks.max=1 | |
| database.history.kafka.topic=dbhistory.debezium-poc.mysql | |
| database.history.producer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
| database.history.consumer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
| database.history.consumer.security.protocol=SASL_SSL | |
| database.history.producer.security.protocol=SASL_SSL | |
| database.history.consumer.sasl.mechanism=AWS_MSK_IAM | |
| database.history.producer.sasl.mechanism=AWS_MSK_IAM | |
| database.history.consumer.sasl.jaas.config=software.amazon.msk.auth.iam.IAMLoginModule required; |
| connector.class=io.debezium.connector.mysql.MySqlConnector | |
| value.converter.schemaAutoRegistrationEnabled=true | |
| tasks.max=1 | |
| database.history.consumer.sasl.jaas.config=software.amazon.msk.auth.iam.IAMLoginModule required; | |
| database.history.kafka.topic=dbhistory.debezium-poc.mysql | |
| key.converter.region=us-east-1 | |
| database.history.producer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
| database.history.consumer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
| database.history.consumer.security.protocol=SASL_SSL | |
| internal.key.converter.schemas.enable=false |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| cert_name="generic_cert" | |
| haproxy_cert_dir="/etc/haproxy/certs" | |
| email="<your_email>" | |
| domains="" | |
| for domain in "$@" | |
| do | |
| domains+="-d $domain " |
| #Update cloudwatch event rate to execute lambda function | |
| aws events put-rule --name <rule-name-from-previous-step> --schedule-expression "rate(15 minutes)" --state ENABLED --description "Invoke Pricing Calculator Lambda function every 15 minutes" |
| # Ansible EC2 external inventory script settings | |
| # | |
| [ec2] | |
| # to talk to a private eucalyptus instance uncomment these lines | |
| # and edit edit eucalyptus_host to be the host name of your cloud controller | |
| #eucalyptus = True | |
| #eucalyptus_host = clc.cloud.domain.org |
| #!/usr/bin/env python | |
| ''' | |
| EC2 external inventory script | |
| ================================= | |
| Generates inventory that Ansible can understand by making API request to | |
| AWS EC2 using the Boto library. | |
| NOTE: This script assumes Ansible is being executed where the environment |
| <?php | |
| /* | |
| |-------------------------------------------------------------------------- | |
| | Detect Active Route | |
| |-------------------------------------------------------------------------- | |
| | | |
| | Compare given route with current route and return output if they match. | |
| | Very useful for navigation, marking if the link is active. | |
| | |
| #!/bin/bash | |
| for pid in $(ps -ef | awk '/some search/ {print $2}'); do kill -9 $pid; done |