Haproxy1.6 configuration file

        log /dev/log    local0
        log /dev/log    local1 notice
        chroot /var/lib/haproxy
        user haproxy
        group haproxy
        maxconn     6000
        tune.ssl.default-dh-param 2048
        log     global
        mode    http
        option  httplog
        option  dontlognull
        timeout connect 5000
        timeout client  50000
        timeout server  50000
listen stats
   mode http
   stats enable
   stats hide-version
   stats realm Haproxy\ Statistics
   stats uri /stats
   stats auth username:password
frontend http_yemaosheng
    bind *:80
    mode http
    default_backend web-nodes
frontend https_yemaosheng
     #cat yemaosheng.crt yemaosheng.key | tee yemaosheng.pem
     bind *:443 ssl crt /root/yemaosheng.pem
     mode http
     option httpclose
     option forwardfor
     reqadd X-Forwarded-Proto:\ https
     default_backend web-nodes
backend web-nodes
    mode http
    balance roundrobin
    option forwardfor
    server web-1 check
    server web-2 check

Export Azure network security groups using PowerShell

> Install-Module AzureRM
> Import-Module AzureR
  Import-Module : File C:\Program Files\WindowsPowerShell\Modules\AzureRM\4.2.1\AzureRM.psm1,...
The PowerShell should work with the RemoteSigned policy in any case.
> Get-ExecutionPolicy -List
> Get-ExecutionPolicy -Scope CurrentUser
> Set-ExecutionPolicy RemoteSigned
> Import-Module AzureRM
> Login-AzureRmAccount
> Get-AzureRmSubscription
  Name     : BizSpark
  Id       : 1e573f03-6685-xxxx-bcb0-xxx
  TenantId : 517c8f98-6209-xxxx-9aca-xxx
  State    : Enabled
  Name     : Microsoft Azure Sponsorship
  Id       : 61719d1b-1c44-xxxx-a985-xxx
  TenantId : 517c8f98-6209-xxxx-9aca-xxx
  State    : Enabled
> Select-AzureRmSubscription -SubscriptionId "61719d1b-1c44-xxxx-a985-xxx"
> Get-AzureRmNetworkSecurityGroup -Name NSG_NAME -ResourceGroupName ResourceGroupName | Get-AzureRmNetworkSecurityRuleConfig | Select * | > Export-Csv -NoTypeInformation -Path C:\NSGExport.csv