4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 42 / 217
Newer►
  • Note: lol

    When using programs that use GNU Parallel to process data for publication please cite:

    O. Tange (2011): GNU Parallel - The Command-Line Power Tool,
    ;login: The USENIX Magazine, February 2011:42-47.

    This helps funding further development; and it won't cost you a cent.
    Or you can get GNU Parallel without this requirement by paying 10000 EUR.

    To silence this citation notice run 'parallel --bibtex' once or use '--no-notice'.

    June 29, 2017 at 2:16:28 PM GMT+2 - permalink - archive.org - https://links.infomee.fr/?OqiirQ
    lol parallel
  • Note: rsync parallel

    find -L . -type f | parallel -j 30 rsync -a {} /DESTINATION_EFS_FILESYSTEM

    June 29, 2017 at 2:13:25 PM GMT+2 - permalink - archive.org - https://links.infomee.fr/?bSM2yw
    parallel rsync
  • firewall - How to Unban an IP properly with Fail2Ban - Server Fault

    fail2ban-client status

    June 28, 2017 at 1:51:12 PM GMT+2 - permalink - archive.org - https://serverfault.com/questions/285256/how-to-unban-an-ip-properly-with-fail2ban
    fail2ban
  • thumbnail
    List remote Git branches and the last commit date for each branch. Sort by most recent commit date.

    for branch in git branch -r | grep -v HEAD;do echo -e git show --format="%ci %cr" $branch | head -n 1 \t$branch; done | sort -r

    June 27, 2017 at 4:41:12 PM GMT+2 - permalink - archive.org - https://gist.github.com/jasonrudolph/1810768
    git
  • User-guided caching in Docker for Mac - Docker Blog

    Mieux vaut être sous GNU/Linux

    June 27, 2017 at 11:14:13 AM GMT+2 - permalink - archive.org - https://blog.docker.com/2017/05/user-guided-caching-in-docker-for-mac/
    docker
  • Amazon Glacier Direct Upload vs Glacier Upload via Amazon S3

    So you can put your data into glacier with 2 differents ways:
    1) directly to glacier via API
    2) Store them to s3 then with a management policy, it'll go to Glacier

    Warning : Huge cost when you download from glacier and when you delete before 3 months

    June 27, 2017 at 11:01:12 AM GMT+2 - permalink - archive.org - https://www.cloudberrylab.com/blog/compare-amazon-glacier-direct-upload-and-glacier-upload-through-amazon-s3/
    aws glacier s3
  • Creating a Redis (cluster mode enabled) Cluster with Replicas from Scratch - Amazon ElastiCache
    June 20, 2017 at 11:31:28 AM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/Replication.CreatingReplGroup.NoExistingCluster.Cluster.html
    aws redis
  • Creating a Redis (cluster mode disabled) Cluster with Replicas from Scratch - Amazon ElastiCache
    June 20, 2017 at 11:31:18 AM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/Replication.CreatingReplGroup.NoExistingCluster.Classic.html
    aws redis
  • Replication: Redis (cluster mode disabled) vs. Redis (cluster mode enabled) - Amazon ElastiCache
    June 20, 2017 at 9:59:57 AM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/Replication.Redis-RedisCluster.html
    aws redis
  • Replication: Multi-AZ with Automatic Failover (Redis) - Amazon ElastiCache
    June 19, 2017 at 5:05:58 PM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AmazonElastiCache/latest/UserGuide/AutoFailover.html
    aws redis
  • Using CloudFormer to Create AWS CloudFormation Templates from Existing AWS Resources - AWS CloudFormation

    CloudFormer to create AWS CloudFormation templates from existing AWS resources

    June 19, 2017 at 3:52:44 PM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-using-cloudformer.html
    cloudformation
  • Note: Poor guy monitoring with tmux

    tmux <3

    while true; do python monitor_beanstalk.py; bg_color=$([ $? == 0 ] && echo "green" || echo "red"); tmux set-window-option -t${TMUX_PANE} window-status-bg $bg_color; sleep 30; clear; done

    June 16, 2017 at 11:36:55 AM GMT+2 - permalink - archive.org - https://links.infomee.fr/?OlX-xw
    monitoring tmux
  • Note: some draft about monitoring beanstalk applications health with boto3 python script
    import pprint
    p = pprint.PrettyPrinter(indent=4)
    p.pprint(x)

    or

    import pprint
    pprint.pformat(x)


    import logging
    import pprint
    logging.info(pprint.pformat(dict))



     $ cat monitor_beanstalk.py
    #!/bin/python

    import boto3
    import pprint
    pp = pprint.PrettyPrinter(indent=4)


    #List all env and status and instances health

    client = boto3.client('elasticbeanstalk')


    envs = client.describe_environments()['Environments']

    #pp.pprint(envs)


    for env in envs:
        print 'ApplicationName: {} EnvironmentName: {} Health: {} HealthStatus: {} Status: {}'.format(env['ApplicationName'].ljust(30),env['EnvironmentName'].ljust(30),env['Health'].ljust(10),env.get('HealthStatus', 'N/A').ljust(10),env['Status'].ljust(10))
        if (env['Health'] != 'Green') or (env.get('HealthStatus', 'N/A') != 'Ok' and env.get('HealthStatus', 'N/A') != 'N/A'):
            print '\nProblem'
            details = client.describe_environment_health(EnvironmentName=env['EnvironmentName'],AttributeNames=['All'])
            #pp.pprint(details)
            print details['Causes']
            print details['InstancesHealth']
            print '\n'
    June 15, 2017 at 11:12:05 AM GMT+2 * - permalink - archive.org - https://links.infomee.fr/?eFFzMg
    aws beanstalk boto pprint python
  • Note: EFS size by api

    aws efs describe-file-systems| jq '.FileSystems|.[]|[.Name, .SizeInBytes.Timestamp, .SizeInBytes.Value]' -c

    Retourne une ligne par EFS
    Sur chaque ligne, un array avec :
    [0] = nom de l'efs
    [1] = timestamp du moment où la taille a été calculée
    [2] = la taille en bytes

    Pour avoir la taille en GB :

    aws efs describe-file-systems| jq '.FileSystems|.[]|[.Name, .SizeInBytes.Timestamp, .SizeInBytes.Value / 1024 /1024 / 1024]' -c

    aws efs describe-file-systems| jq '.FileSystems|.[]|[.Name, .SizeInBytes.Value / 1024 /1024 / 1024]' -c

    June 13, 2017 at 11:56:27 AM GMT+2 * - permalink - archive.org - https://links.infomee.fr/?MzuW2A
    aws efs size
  • Note: s3 bucket size by api

    aws s3api list-objects --bucket BUCKET_NAME --output json --query "[sum(Contents[].Size), length(Contents[])]"

    Retourne la taille en bytes et le nombre d'objets

    Avec un ficheir qui contient le nom des bucket :

    for BUCKET_NAME in $(cat s3list); do echo -n "$BUCKET_NAME " ; region=$(aws s3api get-bucket-location --bucket $BUCKET_NAME|jq '.LocationConstraint' -r); aws s3api list-objects --region $region --bucket $BUCKET_NAME --output json --query "sum(Contents[].Size)"; done

    June 13, 2017 at 11:55:28 AM GMT+2 * - permalink - archive.org - https://links.infomee.fr/?pbKktw
    s3 size
  • network - Why does mounting an nfs share from linux require the use of a privileged port? - Ask Different

    Il faut utiliser l'option noresvport de mount pour que mount n'utilise pas des ports sources inférieur à 1024

    Why do you have to? Tradition, mostly. Once upon a time, restricting NFS to privileged ports (<1023) was considered a security measure. Back when people were using mainframe computers, this made sure that the NFS software on the client side was part of the OS/approved by the administrator, since a program can only use a privileged port if it's run by the root user. Today, this makes no sense because anyone can own a computer and have root access, so this doesn't mean anything in terms of security.

    By default, many NFS servers don't allow non-privileged source ports. Some NFS clients (such as Ubuntu's), default to using a privileged source port unless otherwise specified, which is why your Linux client works without issue. Clearly, the OS X client doesn't do this. I don't know if that was an Apple design choice or something inherited from BSD. I know that Solaris also defaults to a non-privileged port.

    The two ways of avoiding this problem are, telling the OS X client to use a privileged port, as you discovered, or configuring your NFS server to allow non-privileged ports (look it up in your server's documentation).

    How do you get OS X to use a privileged port using a GUI? As far as I know, you can't on versions > 10.6. One used to be able to mount NFS shares in Disk Utility and type in extra options, but that was removed. (details) It was never a simple button or anything. NFS is hardly something most of the "non-techy" crowd need, so I guess it wasn't a priority and there are reasons routinely using privileged ports isn't a great idea.

    I haven't tried it, but http://www.bresink.com/osx/NFSManager.html seems to allow configuration of OS X's NFS features without the command line.

    June 12, 2017 at 4:38:44 PM GMT+2 * - permalink - archive.org - https://apple.stackexchange.com/questions/142697/why-does-mounting-an-nfs-share-from-linux-require-the-use-of-a-privileged-port
    mount nfs
  • Example 2: Bucket Owner Granting Cross-Account Bucket Permissions - Amazon Simple Storage Service
    Donc pour autoriser un compte externe, on va créer une bucket policy sur notre bucket pour autoriser "arn:aws:iam::account_id:root" ou plus précis sur l'user arn:aws:iam::account_id:user/foobar ou le role

    C'est le compte en face qui va décider qui a le droit de venir sur notre bucket avec des user policy standard (quand on est dans le contexte du compte en face, c'est comme si le bucket nous appartenait)

    Exemple bucket policy à mettre sur le BUCKET de l'account A pour autoriser l'account xxx en RW


    {
        "Version": "2012-10-17",
        "Statement": [





            {
                "Sid": "Allow account_xx on aws account xxx RW",
                "Effect": "Allow",
                "Principal": {
                    "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                },
                "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                "Resource": "arn:aws:s3:::BUCKET"
            },
            {
                "Sid": "Allow account_xx on aws account xxx RW",
                "Effect": "Allow",
                "Principal": {
                    "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                },
                "Action": [
                    "s3:*"
                ],
                "Resource": "arn:aws:s3:::BUCKET/*"
            }




        ]
    }

    Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
    June 12, 2017 at 8:48:42 AM GMT+2 * - permalink - archive.org - http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example2.html
    aws cross iam policy s3
  • thumbnail
    Copy between S3 buckets w/ different accounts · GitHub
    June 8, 2017 at 5:29:42 PM GMT+2 - permalink - archive.org - https://gist.github.com/ushu/7217693
    aws s3
  • The Challenges of EFS

    one more

    June 8, 2017 at 4:54:01 PM GMT+2 - permalink - archive.org - https://convox.com/blog/challenges-of-efs/
    aws efs
  • wordpress - Degrading Performance of AWS EFS - Stack Overflow

    why EFS sucks

    June 8, 2017 at 4:44:50 PM GMT+2 - permalink - archive.org - https://stackoverflow.com/questions/41673284/degrading-performance-of-aws-efs
    aws efs
Links per page: 20 50 100
◄Older
page 42 / 217
Newer►
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation