There are several ways to get the dynamic data from an ec2 instance. I have run into some instances (ha, pun intended ;) where I am working on the instance and would like to see the values of some of the dynamic instance data.
WTF Kali? Why all the hassle getting you running on AWS? Why can I not simply launch an ec2 instance with an official Kali AMI and be done with it? Rather, I need to find it in the AWS Marketplace, then subscribe to it even though there is no associated cost. And all this just to get the AMI for the region in which I want to run.
Starting with a RANT, ending in something working, but not quite there yet. Why is this so convoluted?
Starting with a RANT, ending in something working, but not quite there yet. Why is this so convoluted?
There are different ways in which you get and import someone’s public key. It can be sent to you as a text file or it could have been uploaded by someone to a public key server.
Here are a few ways to import another person’s public key. If you can verify the identity of that person, you can also sign their public key. When you do this, you are certifying the identity of that person, so please use caution.
It has been a while since I last setup my gpg keys. I am going through the process again so that I can solicit some of my friends and co-workers to sign my keys for me.
Because environments vary, I am going to skip how to install gpg, other than providing a link to some information that might be able to get you started.
I am assuming here that you already have gpg installed.
Hyundai and Kia automobiles – park them in your garage and they will burn down your house. Hyundai and Kia - Park Outside But… Park them outside and they will probably get stolen! Hyundai and Kia Cars Keep Getting Stolen - Hacked and Hyundai - Easily Stolen Cars
Pods fail… they get replaced Scaling up results in more, new, many pods Scaling down causes a decrease in the number of pods Rolling updates delete existing pods and create new pods This is why you should never try to connect directly to any pod
not everything here, but just some of the typical stuff you might use to parse logfiles (standard as well as customized) using python. also, perhaps, some of the regular expressions needed to parse as well.
A collection of knowledge in a single place. How to generate an IAM policy document in JSON format for use with resources that expect policy documents, such as aws_iam_policy.
Here is some basic information regarding AWS Instance Profiles. I am just putting it together all in one place…for me.
Amazon S3 now applies server-side encryption with Amazon S3 managed keys (SSE-S3) as the base level of encryption for every bucket in Amazon S3. Starting January 5, 2023, all new object uploads to Amazon S3 are automatically encrypted at no additional cost and with no impact on performance. The automatic encryption status for S3 bucket default encryption configuration and for new object uploads is available in AWS CloudTrail logs, S3 Inventory, S3 Storage Lens, the Amazon S3 console, and as an additional Amazon S3 API response header in the AWS Command Line Interface and AWS SDKs. For more information, see Default encryption FAQ.
How do you use webhooks? How do you create them? How do you troubleshoot them? Fortunately they are very straightforward to setup and use. Still, there may be a few questions that need to be answered.
Here are some observations, discoveries, and general imformation aobut Jenkins Node agents. I am keeping the information separate between the different clouds, nodes, etc. I will try to point out information that is shared and in common, but mostly this is to apologize in advance for repetiion and duplication between this an the other posts.
Webhook is an http “callback”. When some event occurs, in our case in Github, an event notification occurs alerting Jenkins of the change and most probably triggering a pipeline job.
This is a brief description of how to get docker installed and how to use it on Rocky Linux 9. This should work as well on Alma.
I’m assuming here that all software packages (except docker) are installed or, if the are not, that they can be easily installed.
This document will also go through the steps to insure that docker can be run without having root access or sudo access.
For reference and to make it easier to find, here are some links to reference guides as well as come tips, etc.
Using the timedatectl command is the preferred way to set your timezone. These are the steps to follow in order to change (or set) your timezone on a Debian Linux (bookworm) system
Markdown Cheatsheet Adam Pritchard edited this page
Terminator was originally developed by Chris Jones in 2007 as a simple, 300-ish line python script. Since then, it has become The Robot Future of Terminals. Originally inspired by projects like quadkonsole and gnome-multi-term and more recently by projects like Iterm2, and Tilix, It lets you combine and recombine terminals to suit the style you like. If you live at the command-line, or are logged into 10 different remote machines at once, you should definitely try out Terminator.
Autoscaling is critical for optimizing the performance and efficiency of your Kubernetes cluster. Usually, and typically, Cluster Autoscaler has been the solution most people choose to manage their clusters. However, you might want to consider AWS Karpenter when setting up and using your EKS clusters within an AWS environment. In some cases, Karpenter offers an even more powerful and flexible alternative to Cluster Autoscaler (CAS).
I was just chatting with a younger friend who isn’t really a power user on the command line or particularly fond of vi/vim. He was surprised by what you could actually do within the editor. I took a trip down memory lane and was explaining to him that VI would have had a windowing management system had it not been for the fact that Bill Joy didn’t back up his code - I think because, back then you had to switch back and forth between VAX/VMS and VAX/UNIX BSD if/when the DEC support guys came in to upgrade the VAX-11s…
Passwords that may be compromised because they were exposed to a recent breach… visual captcha… audible captcha… I think I am going back to mfa and using for my password Pa55w0rD! Seriously, I tried to access an older gmail account and having changed the password one too many times I just could not remember. My keychain was not loaded on this paricular machine but I was pretty sure I knew the password. Still, being challenged, and then having to prove that I am human and not a bot by solving a captcha just beat the crap out of me…
You’ll find this post in your _posts
directory. Go ahead and edit it and re-build the site to see your changes. You can rebuild the site in many different ways, but the most common way is to run jekyll serve
, which launches a web server and auto-regenerates your site when a file is updated.
Adding a TLS/SSL cert to your webpage running with NGINX on Amazon Linux 2023 should not be this convoluted, or perhaps should just be better documented? Some thoughts on what EC2 AMIs to run in your envivronment as well as the additional challenges deploying letsencrypt on NGINX in a new Amazon Linux 2023 image. I will attempt to list out the steps and any links that could help.
DRY == “Don’t Repeat Yourself” As a programmer, this makes sense. This is not a new concept. And, most programming languages support this basic idea all the while keeping it (relatively) easy and straight-forward to implement.
The book of knowledge (BofK) is my recent attempt at collecting links and information. I am thinking that this will be a “yellow pages” of sort – does anyone even remember yellow pages?
Basically, if you are a RedHat/Fedora/Centos/Rocky/etc Linux person, DO NOT run Amazon Linux 2023. It does not support EPEL.
A quickstart guide to help you bootstrap an Airflow standalone instance on your local machine.