I hereby claim:
- I am johntheodore on github.
- I am johntheodore (https://keybase.io/johntheodore) on keybase.
- I have a public key ASAsn6VwkHlCmBJJcAluyLZ4FSOBUSYEIJiK7wO_x584AQo
To claim this, I am signing this object:
| <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"> | |
| <html lang="en"> | |
| <head> | |
| <style></style> | |
| <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> | |
| <title>.</title> | |
| </head> | |
| <body> | |
| <table cellspacing="0" cellpadding="0" border="0"><tr><td><table style="width: 100%;" cellspacing="0" cellpadding="0" border="0"><tr><td style="line-height:0;" height="20" width="20"> </td><td style="line-height:0;" height="20"> </td><td style="line-height:0;" height="20" width="20"> </td></tr><tr><td style="line-height:0;" width="20"> </td><td> | |
| <p class="redalert" style="color: #f00; font-weight: bold; font-size: 28px;"> |
| ######################## account: core-services-dev - region: us-east-1 - policy: snapshots_delete_on_expiresat_tag.yml ######################## | |
| 2017-05-03 16:00:56,328: custodian.policy:INFO Running policy ebs-snapshots-delete-on-expiresat-tag resource: ebs-snapshot region:us-east-1 c7n:0.8.23.2 | |
| 2017-05-03 16:00:57,272: custodian.output:ERROR Error while executing policy | |
| Traceback (most recent call last): | |
| File "/Users/johntheodore/code/cloud-custodian/lib/python2.7/site-packages/c7n/policy.py", line 213, in run | |
| resources = self.policy.resource_manager.resources() | |
| File "/Users/johntheodore/code/cloud-custodian/lib/python2.7/site-packages/c7n/query.py", line 292, in resources | |
| return self.filter_resources(resources) | |
| File "/Users/johntheodore/code/cloud-custodian/lib/python2.7/site-packages/c7n/manager.py", line 86, in filter_resources | |
| resources = f.process(resources, event) |
| In [17]: foo = """ | |
| ...: {% set custodian_tables = { 'ebs': { 'headers': { 'VolumeId': '', 'CreateTime': { 'display_name': 'CreationTime' }, 'State': '', 'Tags': '' } } } %} | |
| ...: {% macro get_header_name(header, resource, custodian_tables) -%} | |
| ...: {% if 'display_name' in custodian_tables[resource]['headers'][header] %} | |
| ...: {{ custodian_tables[resource]['headers'][header]['display_name'] }} | |
| ...: {% else %} | |
| ...: {{ header }} | |
| ...: {% endif %} | |
| ...: {%- endmacro %} | |
| ...: {% macro create_table_header(table_headers, resource, custodian_tables) -%} |
| In [5]: foo = """ | |
| ...: {% macro get_header_name(header, resource, custodian_tables) -%} | |
| ...: {% if 'display_name' in custodian_tables[resource]['headers'][header] %} | |
| ...: {{ custodian_tables[resource]['headers'][header]['display_name'] }} | |
| ...: {% else %} | |
| ...: {{ header }} | |
| ...: {% endif %} | |
| ...: {%- endmacro %} | |
| ...: {% set custodian_tables = { 'ebs': { 'headers': { 'VolumeId': '', 'CreateTime': { 'display_name': 'CreationTime' }, 'State': '', 'Tags': '' } } } %} | |
| ...: {% set resource = 'ebs' %} |
| {% set custodian_tables = { 'ebs': { 'headers': { 'VolumeId': '', 'CreateTime': { 'display_name': 'CreationTime' }, 'State': '', 'Tags': '' } } } %} | |
| {% macro get_header_name(header, resource, custodian_tables) -%} | |
| {% if 'display_name' in custodian_tables[resource]['headers'][header] %} | |
| {{ custodian_tables[resource]['headers'][header]['display_name'] }} | |
| {% endif %} | |
| {{ header }} | |
| {%- endmacro %} | |
| {% macro create_table_header(table_headers, resource, custodian_tables) -%} |
| ✗ cat dry_run/ebs-mark-unattached-deletion/resources.json | |
| [ | |
| { | |
| "AvailabilityZone": "us-east-2a", | |
| "Attachments": [], | |
| "Tags": [ | |
| { | |
| "Value": "john_theodore@gmail.com", | |
| "Key": "OwnerEmail" | |
| } |
| policies: | |
| - name: ebs-mark-unattached-deletion-recent | |
| resource: ebs | |
| comments: | | |
| Mark any unattached EBS volumes for deletion in 3 days | |
| if the volume was created in the last 3 days. | |
| Volumes set to not delete on instance termination do have | |
| valid use cases as data drives, but 99% of the time they | |
| appear to be just garbage creation. |
I hereby claim:
To claim this, I am signing this object:
| kubernetes: | |
| # If you want to deploy containers to Kubernetes, | |
| # set enabled and provide primary credentials for deploying. | |
| # Enabling kubernetes is dependent on dockerRegistry being enabled. | |
| enabled: true #${SPINNAKER_KUBERNETES_ENABLED:false} | |
| primaryCredentials: | |
| # These credentials use authentication information at ~/.kube/config | |
| # by default. | |
| name: symcpe-kube-aws | |
| dockerRegistryAccount: ${providers.dockerRegistry.primaryCredentials.name} |
| GLUU.root@gluu:/opt# cat /etc/apache2/sites-enabled/https_gluu.conf | |
| <VirtualHost 100.73.151.78:80> | |
| ServerName gluu.example.com | |
| Redirect / https://gluu.example.com/ | |
| DocumentRoot "/var/www/html/" | |
| </VirtualHost> | |
| <VirtualHost 100.73.151.78:443> | |
| DocumentRoot "/var/www/html/" | |
| ServerName gluu.example.com:443 |