Skip to content

Instantly share code, notes, and snippets.

View bluemutedwisdom's full-sized avatar

masta.K of MUTE bluemutedwisdom

  • blue.mut{8}ed.wisdom / Mute Fantasies
  • Boom, Belgium
  • 19:06 (UTC +01:00)
View GitHub Profile
@bluemutedwisdom
bluemutedwisdom / esxi.hackion.com
Created June 14, 2019 09:44
Nginx HTTPS with Basic Auth reverse proxy for VMware ESXi 6.5 fixed VMRC /screen
server {
listen 80;
server_name esxi.hackion.com;
return 301 https://$server_name$request_uri;
}
server {
listen 443 ssl;
server_name esxi.hackion.com;
@bluemutedwisdom
bluemutedwisdom / apache-icinga-kerberos.conf
Created June 4, 2019 11:15 — forked from lazyfrosch/apache-icinga-kerberos.conf
Apache Auth for Icinga Against Kerberos and 2 AD domains
#LogLevel authnz_ldap:debug auth_kerb:debug authz_core:debug
<AuthzProviderAlias ldap-group de.example.com CN=Icinga_Prod,OU=Global-Groups,DC=de,DC=example,DC=com>
AuthLDAPBindDN "CN=icingaldap,OU=Global-Users,DC=de,DC=example,DC=com"
AuthLDAPBindPassword "xxx"
AuthLDAPURL "ldap://de.example.com:3268/DC=de,DC=example,DC=com?sAMAccountName?sub?(objectClass=user)"
</AuthzProviderAlias>
<AuthzProviderAlias ldap-group example.com CN=Icinga_Prod,OU=Global-Groups,DC=de,DC=example,DC=com>
AuthLDAPBindDN "CN=icingaldap,OU=Global-Users,DC=de,DC=example,DC=com"
@bluemutedwisdom
bluemutedwisdom / apache-icinga-kerberos.conf
Created June 4, 2019 11:15 — forked from lazyfrosch/apache-icinga-kerberos.conf
Apache Auth for Icinga Against Kerberos and 2 AD domains
#LogLevel authnz_ldap:debug auth_kerb:debug authz_core:debug
<AuthzProviderAlias ldap-group de.example.com CN=Icinga_Prod,OU=Global-Groups,DC=de,DC=example,DC=com>
AuthLDAPBindDN "CN=icingaldap,OU=Global-Users,DC=de,DC=example,DC=com"
AuthLDAPBindPassword "xxx"
AuthLDAPURL "ldap://de.example.com:3268/DC=de,DC=example,DC=com?sAMAccountName?sub?(objectClass=user)"
</AuthzProviderAlias>
<AuthzProviderAlias ldap-group example.com CN=Icinga_Prod,OU=Global-Groups,DC=de,DC=example,DC=com>
AuthLDAPBindDN "CN=icingaldap,OU=Global-Users,DC=de,DC=example,DC=com"
@bluemutedwisdom
bluemutedwisdom / icinga2_check_wmi_plus.conf
Created February 6, 2019 13:28 — forked from dayreiner/icinga2_check_wmi_plus.conf
An example check_wmi_plus configuration for Icinga2. Check_wmi_plus (http://www.edcint.co.nz/checkwmiplus/) is a clientless plugin for monitoring Windows systems via WMI with Nagios and other monitoring platforms.
object CheckCommand "check_wmi" {
import "plugin-check-command"
command = [ PluginDir + "/check_wmi_plus.pl" ]
arguments = {
"--inidir" = "$wmi_inidir$"
"-H" = "$host.name$"
"-A" = "$wmi_authfile_path$"
"-m" = "$check_mode$"
"-s" = "$wmi_submode$"
@bluemutedwisdom
bluemutedwisdom / check_mysql_slavestatus.sh
Created January 31, 2019 15:32 — forked from taka3110/check_mysql_slavestatus.sh
Script for checking MySQL Replication at Nagios.
#!/bin/sh
#
# File: check_mysql_slavestatus.sh
# Release Version: 0.1.1
# Created 2012/12/10
# License: MIT
# Author: Takayuki Saito <github:taka3110>
# How to use: "chmod + x" and please add on plugins directory.
#
########################

NTFS file system limitation

Problem description:

Under certain circumstances applications and utilities may fail with one (or more) of the following symptoms

  • Error 0x80070299
  • The requested operation could not be completed due to a file system limitation
  • Insufficient system resources exist to complete the requested service

This is an outdated draft that was used to review the content with FreeBSD contributors. For the latest revision, vist http://shawndebnath.com/articles/2016/03/27/freebsd-jails-with-vlan-howto.html.


FreeBSD Jails with VLAN HOWTO

This article discusses how to set up jails on a FreeBSD 11-CURRENT system utilizing VIMAGE (aka VNET) to provide a virtualized independent network stack for each jail with support for VLAN tagging.

Prerequisites

@bluemutedwisdom
bluemutedwisdom / sample_job.rb
Created June 20, 2018 14:10 — forked from pushmatrix/sample_job.rb
Sample Dashing Job
# :first_in sets how long it takes before the job is first run. In this case, it is run immediately
SCHEDULER.every '1m', :first_in => 0 do |job|
send_event('karma', { current: rand(1000) })
end

Keybase proof

I hereby claim:

  • I am andrewwippler on github.
  • I am andrewwippler (https://keybase.io/andrewwippler) on keybase.
  • I have a public key whose fingerprint is 6496 C632 CB28 4AD7 281C CA27 0CF1 04EB FB3E 1D75

To claim this, I am signing this object:

@bluemutedwisdom
bluemutedwisdom / Centos_6_or_7.sh
Created June 5, 2018 12:56 — forked from andrewwippler/Centos_6_or_7.sh
Join Centos 6 to Domian
#!/bin/bash
NETBIOS="$1"
FQDN="$2"
USER="$3"
#install files
sudo yum -y install authconfig krb5-workstation pam_krb5 samba-winbind oddjob-mkhomedir nscd
#create auth settings
authconfig --enablecachecreds --enablewinbind --enablewinbindauth --smbsecurity=ads --smbworkgroup=$NETBIOS --smbrealm=$FQDN --enablewinbindusedefaultdomain --winbindtemplatehomedir=/home/$NETBIOS/%U --winbindtemplateshell=/bin/bash --enablekrb5 --krb5realm=$FQDN --enablekrb5kdcdns --enablekrb5realmdns --enablelocauthorize --enablemkhomedir --enablepamaccess --updateall