Skip to content

Instantly share code, notes, and snippets.

```
2017/10/31 23:38:05 [INFO] Terraform version: 0.10.8 44110772d9ffd0ec3589943c6d4c93c24a5fff06
2017/10/31 23:38:05 [INFO] Go runtime version: go1.9
2017/10/31 23:38:05 [INFO] CLI args: []string{"/usr/local/bin/terraform", "plan"}
2017/10/31 23:38:05 [DEBUG] Attempting to open CLI config file: /home/ubuntu/.terraformrc
2017/10/31 23:38:05 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2017/10/31 23:38:05 [DEBUG] CLI config is &main.Config{Providers:map[string]string{}, Provisioners:map[string]string{}, DisableCheckpoint:false, DisableCheckpointSignature:false, PluginCacheDir:"", Credentials:map[string]map[string]interface {}(nil), CredentialsHelpers:map[string]*main.ConfigCredentialsHelper(nil)}
2017/10/31 23:38:05 [INFO] CLI command args: []string{"plan"}
2017/10/31 23:38:05 [TRACE] Preserving existing state lineage "3db41f92-0343-4d1d-b5e4-bb00f77e64a5"
2017/10/31 23:38:05 [TRACE] Preserving existing state lineage "3db41f92-0343-4d1d-b5e4-bb00f77e64a5"
@gk-deploy
gk-deploy / iam-terraform-create-policy.tf
Created October 20, 2017 21:50 — forked from arsdehnel/iam-terraform-create-policy.tf
AWS IAM policies for running Terraform from an EC2 instance.
resource "aws_iam_policy" "terraform_create_policy" {
name = "terraform_create_policy"
path = "/"
policy = "${data.aws_iam_policy_document.terraform_create_policy.json}"
}
data "aws_iam_policy_document" "terraform_create_policy" {
statement {
sid = "1"
actions = [

Linux distros: Ubuntu Server → Debian. (CentOS for educational purposes only.) Maybe Arch (or Gentoo) in the future.

Basic Path: Linux, Command-line & Shell scripting, Python programming, Security, Networking (Cisco, HP, Juniper), Virtualization, and High Availability. See IT Certification Roadmap.pdf for more info.

Programming Path: JS, Python, PHP, Ruby, C, C++, Go, Java, Swift, Rust, Scala, C#.

Certifications:

SysAdmin

@gk-deploy
gk-deploy / README.md
Created September 28, 2017 14:39 — forked from miku/README.md
git --track vs --set-upstream vs --set-upstream-to

README

Short excursion into git --track, --set-upstream and --set-upstream-to.

All examples use the aliases co for checkout and br for branch.

Setup:

$ git clone [email protected]:AKSW/OntoWiki.git

Launch AWS instance for Worker Node

## System and Softwares
  - System: Ubuntu 16.04
  - Software: Java 8 (default-jre)
  No need to install Jenkins on worker node because … 
  read AWS jenkins nodes to fill this out. 

Security Group for Worker Node

  • allow ssh from your private network
  • allow ssh from Jenkins Master (security Group)
@gk-deploy
gk-deploy / vpn.md
Created August 13, 2017 04:02 — forked from joepie91/vpn.md
Don't use VPN services.

Don't use VPN services.

No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.

Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.

Why not?

Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want - including logging.