Automatically Provision Vagrant Virtual Machines as Salt Slaves

Create a new, fully configured virtual computer in less than a minute. Keep configuration in version control. Manage trough configuration management system.

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Provision Multiple Virtual Puppet Slaves with Vagrant

For testing, it’s convenient to provision many virtual slave computers to your master. This Vagrant file installs two virtual computers and automatically configures them as slaves to a puppetmaster in a predefined IP address. Advanced stuff warning: Using this sample … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Shebang Puppet – #!/usr/bin/env pup – Script to run short standalone Puppet scripts

Write and run single file Puppet scripts.

Posted in Uncategorized | Tagged , , | Leave a comment

Tero’s C++ Scripting – cppt

Table of Contents Tero’s C++ Scripting – cppt Features C++ as a Scripting Language Download and Install Writing Your First Script Future Contribute Testing Packagers Wanted Links and Syndication Syndicate Feedback Tero’s C++ Scripting – cppt Tero’s C++ Scripting lets … Continue reading

Posted in Old Site | Tagged , , , , | 1 Comment

source_code_of_tero_s_c_scripting

Moved to View the source code of Tero’s C++ Scripting.

Posted in Old Site | Tagged , , , | Leave a comment

Moved: Tero’s C++ Scripting – cppt

Moved: Tero’s C++ Scripting – cppt Tero’s C++ Scripting cppt is here

Posted in Old Site | Tagged , , , | Leave a comment

Un – uncompress many archive formats

Un – uncompress many archive formats #!/bin/bash # echo “un – extract archive in a new directory. Usage: un <archivefile>” # (c) 198x-2005 Tero.Karvinen atSign iki.fi GNU General Public Licence # 2006-01-24 Published on the web page, removed some unneeded … Continue reading

Posted in Old Site | Tagged , , , | Leave a comment

Control Many Computers with SSH

Control Many Computers with SSH Once you have automated login to target computers with ssh public key authentication, it is easy to run the same command on all of them. Consider three computers, 172.28.1.219, 172.28.2.9, 172.28.2.14, each with account tero … Continue reading

Posted in Old Site | Tagged , , , , | Leave a comment