Skip to content

Instantly share code, notes, and snippets.

View karthikeayan's full-sized avatar
🎯
Focusing

Karthikeyan karthikeayan

🎯
Focusing
View GitHub Profile
resource "aws_iam_role" "firehose_role" {
name = "firehose_es_delivery_role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
pipeline {
agent any
stages {
stage('Checkout') {
steps {
checkout scm
}
}
[2019-07-04 10:22:20,956] {__init__.py:540} DEBUG - Loaded DAG <DAG: video_content_status_sync>
[2019-07-04 10:22:20,958] {__init__.py:402} DEBUG - Importing /home/ubuntu/my_project/dags/task_update_user_loc.py
[2019-07-04 10:22:20,959] {__init__.py:402} DEBUG - Importing /home/ubuntu/my_project/dags/dags_register.py
Scheduling KPI metric task
Environment : development
Config file path : /home/ubuntu/my_project/config/development.json
Hotels count : 331
KPI calculation scheduling
Scheduled feedback collection
Registered dimension table data check task
apiVersion: v1
kind: ConfigMap
metadata:
name: aws-auth
namespace: kube-system
data:
mapRoles: |
- rolearn: my-arn
username: system:node:{{EC2PrivateDNSName}}
groups:
global:
scrape_interval: 1m
scrape_timeout: 10s
evaluation_interval: 1m
alerting:
alertmanagers:
- kubernetes_sd_configs:
- role: pod
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
tls_config:
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: kube2iam
namespace: kube-system
---
apiVersion: v1
items:
- apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: extensions/v1beta1
kind: DaemonSet
metadata:
name: kube2iam
labels:
app: kube2iam
namespace: kube-system
spec:
updateStrategy:
type: RollingUpdate
annotations: {}
awsRegion: us-east-2
awsRole: <role_name> #arn not required, just a role name
awsAccessKeyId:
awsSecretAccessKey:
logGroupName: <log_group_name_in_cloudwatch>
rbac:
## If true, create and use RBAC resources
policies:
- name: high-risk-security-groups-remediate
resource: security-group
description: |
Remove any rule from a security group that allows 0.0.0.0/0 or ::/0 (IPv6) ingress
and notify the user who added the violating rule.
mode:
type: cloudtrail
role: arn:aws:iam::<account_number>:role/<role_name>
events:
---
kind: Deployment
apiVersion: extensions/v1beta1
metadata:
name: kafka-broker0
spec:
template:
metadata:
labels:
app: kafka