I hereby claim:
- I am lesmono on github.
- I am lesmono (https://keybase.io/lesmono) on keybase.
- I have a public key ASAZTk-g2W-KbhS9CuYy8mumoM040uJesfbC2_8700EjIgo
To claim this, I am signing this object:
/* | |
1. Install k6 https://grafana.com/docs/k6/latest/set-up/ | |
2. Setup test machine (can handle up to 64510 vus): | |
- Update sysctl to handle more vus | |
echo "net.ipv4.ip_local_port_range = 1024 65535" >> /etc/sysctl.conf | |
echo "net.ipv4.tcp_tw_reuse=1" >> /etc/sysctl.conf | |
echo "net.ipv4.tcp_timestamps=1" >> /etc/sysctl.conf | |
echo "kernel.pid_max=999999" >> /etc/sysctl.conf | |
echo "kernel.thread-max=999999" >> /etc/sysctl.conf | |
echo "vm.max_map_count=99999" >> /etc/sysctl.conf |
connector.class=io.debezium.connector.mysql.MySqlConnector | |
tasks.max=1 | |
database.history.kafka.topic=dbhistory.debezium-poc.mysql | |
database.history.producer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
database.history.consumer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
database.history.consumer.security.protocol=SASL_SSL | |
database.history.producer.security.protocol=SASL_SSL | |
database.history.consumer.sasl.mechanism=AWS_MSK_IAM | |
database.history.producer.sasl.mechanism=AWS_MSK_IAM | |
database.history.consumer.sasl.jaas.config=software.amazon.msk.auth.iam.IAMLoginModule required; |
connector.class=io.debezium.connector.mysql.MySqlConnector | |
value.converter.schemaAutoRegistrationEnabled=true | |
tasks.max=1 | |
database.history.consumer.sasl.jaas.config=software.amazon.msk.auth.iam.IAMLoginModule required; | |
database.history.kafka.topic=dbhistory.debezium-poc.mysql | |
key.converter.region=us-east-1 | |
database.history.producer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
database.history.consumer.sasl.client.callback.handler.class=software.amazon.msk.auth.iam.IAMClientCallbackHandler | |
database.history.consumer.security.protocol=SASL_SSL | |
internal.key.converter.schemas.enable=false |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
cert_name="generic_cert" | |
haproxy_cert_dir="/etc/haproxy/certs" | |
email="<your_email>" | |
domains="" | |
for domain in "$@" | |
do | |
domains+="-d $domain " |
#Update cloudwatch event rate to execute lambda function | |
aws events put-rule --name <rule-name-from-previous-step> --schedule-expression "rate(15 minutes)" --state ENABLED --description "Invoke Pricing Calculator Lambda function every 15 minutes" |
# Ansible EC2 external inventory script settings | |
# | |
[ec2] | |
# to talk to a private eucalyptus instance uncomment these lines | |
# and edit edit eucalyptus_host to be the host name of your cloud controller | |
#eucalyptus = True | |
#eucalyptus_host = clc.cloud.domain.org |
#!/usr/bin/env python | |
''' | |
EC2 external inventory script | |
================================= | |
Generates inventory that Ansible can understand by making API request to | |
AWS EC2 using the Boto library. | |
NOTE: This script assumes Ansible is being executed where the environment |
<?php | |
/* | |
|-------------------------------------------------------------------------- | |
| Detect Active Route | |
|-------------------------------------------------------------------------- | |
| | |
| Compare given route with current route and return output if they match. | |
| Very useful for navigation, marking if the link is active. | |
| |
#!/bin/bash | |
for pid in $(ps -ef | awk '/some search/ {print $2}'); do kill -9 $pid; done |