If you need to move a repo from one to another, use the following code To push to an existing folder To create a new repository Setting the git global setup Job done!
Author: realworldit
Transfer files using the RDP clipboard when it’s blocked.
Afternoon, Morning and Evening depending on when you are reading this. I’ve come across this one recently and thought I would post it. You know those situations where you need to copy a file from a machine, but can’t as it’s blocked in RDP, but you can still copy text through RDP. Well, you still […]
Hashicorp Vault AWS auth backend role Terraform example, then access secret from the userdata instance.
AWS auth role in Vault is specifically designed for applications running on Amazon Web Services (AWS) infrastructure. It leverages AWS IAM roles to authenticate and authorize applications to access secrets in Vault. The key components of the AWS auth role are:
In PowerShell on a Windows machine, Create event logs and detect errors in my code.
You can create custom event logs in PowerShell using the New-EventLog cmdlet, and then use the Write-EventLog cmdlet to write events to the log. Here’s an example: In this example, the New-EventLog cmdlet is used to create a new event log named “MyScriptLog” with a source of “MyScript”. The Write-EventLog cmdlet is then used to […]
Terraform Example of a Windows Instance using UserData
Here is an example Terraform code for launching a Windows instance that uses userdata to configure the instance:
Terraform Output Examples for AWS
In Terraform, an output is a way to display the values of resources or data sources that are created by your infrastructure code. There are several types of outputs that you can define in Terraform, and each serves a specific purpose. Here are the possible output types in Terraform and their explanations:
Joining machines to a domain without credentials
Need to join a machine to a domain, but don’t want to give out any credentials?
Accessing secrets from Hashicorp Vault
Access a secret from your Vault.
OpenSSL Commands
It can be useful to check a certificate and key before applying them to a server. The following commands verify the certificate, key and CSR (Certificate Signing Request). To check the certificate To check a key To check the CSR To check the md5 checksums match of the certificate, key and csr; the checksums can […]
Setting Up Pester Tests
Hey, how are you doing? Thought I would write about setting up Pester tests, and the structure I use. This comes about because when I need to start a new project and have some Pester tests running against the infrastructure I have a standard setup I use. So I decided to share it as it […]