Knowledge is Power!
Enable SSM on eks nodes
k8s_terraform_metrics/templates/ssm.tf at main · ashwiniag/k8s_terraform_metricsTerraform + K8s + Vicoriametrics + Kube-state-metrics + Prometheus operator - ashwiniag/k8s_terraform_metricsGitHubashwiniag
Knowledge is Power!
k8s_terraform_metrics/templates/ssm.tf at main · ashwiniag/k8s_terraform_metricsTerraform + K8s + Vicoriametrics + Kube-state-metrics + Prometheus operator - ashwiniag/k8s_terraform_metricsGitHubashwiniag
Knowledge is Power!
Most basic setup to have when working with terraform is - Where to store terraform statefile and avoid all hassles! Some issues you run into: * Access to tfstate: Needs access to same terraform statefile across the team to work with infra setup. Hence, statefiles are to be storedin shared location.
Knowledge is Power!
Knowledge can only be enhanced and is thoroughly understood when it is put in practice. Did you know everything in Linux is a file? Yes, including network connections, processes, everything! How does it all work? Navigating Linux directory structure helps understand what makes it so flexible and easier to access,
Knowledge is Power!
item=30 total=70 percent=$(awk "BEGIN { pc=100*${item}/${total}; i=int(pc); print (pc-i<0.5)?i:i+1 }") echo $percent 43 --- used = 30 total = 70 percentage=$(awk "BEGIN { pc=100*${used}/${total}; i=int(pc); print (pc-i<0.5)?i:i+
Knowledge is Power!
dumps from long thread Hey, I'm seeing a few fargate tasks going from pending --> running --> stopped during rolling-update. Any idea why this'd happen? Ashwini 10 days ago I'm assuming it enters running state after all the criteria like ALB health
Knowledge is Power!
Goal: Setup SSO for atlassian bitbucket using crowd while fedarating users from external IdP. And end to end SSL termination. Let's break down the setup: 1. Integrate Crowd with Redhat SSO ( external IdP in my case ) 2. Integarte Crowd and bitbucket Crowd SSO provides authentication for all atlassian
Generally I like to maintain binaries. It could be downloaded or custom etc. Here is what I do * Actions mkdir ~/my_bin echo "export PATH=\$PATH:~/my_bin" >> ~/.bashrc source ~/.bashrc Note: It last till the terminal session when you execute "export PATH=$PATH:<
Knowledge is Power!
Adds ssh key to aws secrets manager using terraformAdds ssh key to aws secrets manager using terraform - main.tfGist262588213843476
Beyond the Beaten Path
We all do have our doubts about our capabilities... Being on slippery ground I realized two things - having a mentor is important and equally important is selling yourself to people out there and determining your worth. In the beginning it won't be easy and there are so
Beyond the Beaten Path
✳️ 🍕 🧁 🍧 ▪️ 🌼 🦋 🤯 🌮 🐰 💩 🍀 🌴 🐜🍟 🦧 🍁 🍒 🍸 🥂 🍬 🍹 🙀 😵 🥴 🧐 😖 🐣 👀 🐼 💭 🎀 🎈 🍦 🛡️ 🔘 🍨 ❓ 🇦 😁 ✴️ 💡 🤦♀️ 🤷🏻♀️ To be honest I have had my hard share of time to understand and accept that taking your own time to understand a topic is normal and good. one should not focus on learning fast rather one should learn to ask good questions!! Beacause thats how we deepen our understanding.
Knowledge is Power!
Simple setup to monitor my machine using node_exporter: Exposes my machine metrics at http://localhost:9100/metrics prometheus: A storage for metrics. It scrapes the metrics from endpoint /metrics at defined interval to get the current state of the metrics and stores values in prometheus tsdb grafana: Visual representation
Knowledge is Power!
Abstract:: * Add CloudWatchAgentServerPolicy policy to EC2 instance IAM role * Install CloudWatch Agent ( amazon linux 1 ): https://s3.amazonaws.com/amazoncloudwatch-agent/amazon_linux/amd64/latest/amazon-cloudwatch-agent.rpm * Create a file /opt/aws/amazon-cloudwatch-agent/bin/config.json and add custom metrics needed for monitoring. Example: { "metrics": { "metrics_collected"