(Find and download Oregon Trail Deluxe into a ~/Games directory)
brew install dosbox
dosboxmount c ~/Games
c:
cd Games| # Once you apply this and your containers come online, you need to exec into the web service and run `./manage.py createsuperuser`. | |
| # Change the postgresql password in this spec. | |
| # This spec assumes you want NodePort services and not LoadBalnancer services. | |
| # This spec assumes that you want to mount all your volumes under a hostPath of /data/paperless. | |
| # This spec assumes that you want all pods on a node called k8s-worker5. | |
| apiVersion: v1 | |
| kind: Namespace | |
| metadata: | |
| name: paperless | 
| apiVersion: batch/v1beta1 | |
| kind: CronJob | |
| metadata: | |
| name: restic-backup-synapse | |
| namespace: synapse | |
| spec: | |
| schedule: "0 4 * * *" | |
| concurrencyPolicy: Forbid | |
| successfulJobsHistoryLimit: 3 | |
| failedJobsHistoryLimit: 3 | 
(Find and download Oregon Trail Deluxe into a ~/Games directory)
brew install dosbox
dosboxmount c ~/Games
c:
cd Games| module example.com/mymodule | |
| require ( | |
| k8s.io/api v0.18.2 | |
| k8s.io/apimachinery v0.18.2 | |
| k8s.io/client-go v0.18.2 | |
| ) | 
| &http.Client{ | |
| Transport: &http.Transport{ | |
| TLSClientConfig: &tlsConfig, | |
| Proxy: http.ProxyFromEnvironment, | |
| Dial: (&net.Dialer{ | |
| Timeout: 30 * time.Second, | |
| KeepAlive: 30 * time.Second, | |
| }).Dial, | |
| TLSHandshakeTimeout: 10 * time.Second, | |
| ExpectContinueTimeout: 1 * time.Second, | 
| # Include a clusterrole for the kube-controllers component, | |
| # and bind it to the calico-kube-controllers serviceaccount. | |
| kind: ClusterRole | |
| apiVersion: rbac.authorization.k8s.io/v1 | |
| metadata: | |
| name: calico-kube-controllers | |
| rules: | |
| # Pods are monitored for changing labels. | |
| # The node controller monitors Kubernetes nodes. | |
| # Namespace and serviceaccount labels are used for policy. | 
| You can create the file with the following script. The script creates the necessary Google Cloud Platform (GCP) service account and gives it access to the registry. | |
| # create a GCP service account; format of account is email address | |
| SA_EMAIL=$(gcloud iam service-accounts --format='value(email)' create k8s-gcr-auth-ro) | |
| # create the json key file and associate it with the service account | |
| gcloud iam service-accounts keys create k8s-gcr-auth-ro.json --iam-account=$SA_EMAIL | |
| # get the project id | |
| PROJECT=$(gcloud config list core/project --format='value(core.project)') | |
| # add the IAM policy binding for the defined project and service account | |
| gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$SA_EMAIL --role roles/storage.objectViewer | 
| // https://stackoverflow.com/questions/14226803/javascript-wait-5-seconds-before-executing-next-line | |
| function wait(ms){ | |
| var start = new Date().getTime(); | |
| var end = start; | |
| while(end < start + ms) { | |
| end = new Date().getTime(); | |
| } | |
| } | 
| sysctl -w fs.file-max=12000500 | |
| sysctl -w fs.nr_open=20000500 | |
| ulimit -n 20000000 | |
| sysctl -w net.ipv4.tcp_mem='10000000 10000000 10000000' | |
| sysctl -w net.ipv4.tcp_rmem='1024 4096 16384' | |
| sysctl -w net.ipv4.tcp_wmem='1024 4096 16384' | |
| sysctl -w net.core.rmem_max=16384 | |
| sysctl -w net.core.wmem_max=16384 | 
I hereby claim:
To claim this, I am signing this object: