Here’s the command to list what SSL and TLS protocols are active.
openssl ciphers -v | awk '{print $2}' | sort | uniq |
cloud engineer
Here’s the command to list what SSL and TLS protocols are active.
openssl ciphers -v | awk '{print $2}' | sort | uniq |
openssl ciphers -v | awk '{print $2}' | sort | uniq
Here’s the command to display VM OS licenses.
#!/bin/bash ts=$(date +%Y%m%d-%H%M%S) log="gcp-licenses-logs-$ts" >$log while read -r project; do echo "Project: $project" | tee -a $log gcloud compute instances list --project $project --format="table[no-heading](name,zone.basename())" > instances.list while read -r instance zone; do gcloud compute instances describe $instance \ --project $project \ --zone $zone \ --format="table[no-heading](name,zone.basename(),disks[0].licenses[0].basename())" | tee -a $log done < instances.list done < projectIds.txt |
#!/bin/bash ts=$(date +%Y%m%d-%H%M%S) log="gcp-licenses-logs-$ts" >$log while read -r project; do echo "Project: $project" | tee -a $log gcloud compute instances list --project $project --format="table[no-heading](name,zone.basename())" > instances.list while read -r instance zone; do gcloud compute instances describe $instance \ --project $project \ --zone $zone \ --format="table[no-heading](name,zone.basename(),disks[0].licenses[0].basename())" | tee -a $log done < instances.list done < projectIds.txt
How to install pint utility on SLES machines.
zypp in python-susepubliccloudinfo |
zypp in python-susepubliccloudinfo
Once installed, you can run
pint amazon servers –region='us-east-1' pint google servers –region='us-central1' pint microsoft servers –region='eastus' |
pint amazon servers –region='us-east-1' pint google servers –region='us-central1' pint microsoft servers –region='eastus'