I hereby claim:
- I am mvanholsteijn on github.
- I am mvanholsteijn (https://keybase.io/mvanholsteijn) on keybase.
- I have a public key ASC8m3WQn3rAaN6rL70h8G5tzhZXjiRrNBqS3heiR9KVego
To claim this, I am signing this object:
| #!/bin/bash | |
| # | |
| # Installs and Configures the AWS cloudwatch agent, and sets the default log group name and region | |
| # | |
| # | |
| # You need to add the following policy statement to the machine's IAM role. | |
| # | |
| # { | |
| # "Effect": "Allow", | |
| # "Action": [ |
| #!/bin/bash | |
| DOMAIN=${1:-mvanholsteijn.eu.auth0.com} | |
| KONG_API=http://localhost:8001 | |
| PUBLIC_KEY=$(curl -sS https://${DOMAIN}/pem | openssl x509 -pubkey -noout) | |
| [[ -z $PUBLIC_KEY ]] && echo "ERROR: could not retrieve public key of $PUBLIC_KEY" && exit 1 | |
| # add user | |
| curl -sS -i -X POST $KONG_API/consumers --data username=$DOMAIN |
| AUTH0_DOMAIN=mvanholsteijn.eu.auth0.com | |
| curl -sS https://$AUTH0_DOMAIN/pem | \ | |
| openssl x509 -pubkey -noout |
| AUTH0_DOMAIN=mvanholsteijn.eu.auth0.com | |
| curl -sS https://$AUTH0_DOMAIN/pem | \ | |
| openssl x509 -pubkey -noout | \ | |
| tr -d '\r' | \ | |
| tr '\n' '|' | \ | |
| sed -e 's/|/\\n/g' | \ | |
| sed -e 's/^/"/' -e 's/$/"/' |
| #!/usr/bin/env python | |
| # | |
| # reports errors on the last stack operations | |
| # | |
| import sys | |
| import boto3 | |
| def report_errors(stackname): | |
| cfn = boto3.client('cloudformation') |
| #!/usr/bin/env python | |
| # | |
| # copy all SSM parameter store parameters to disk | |
| # | |
| import os, sys, argparse, boto3 | |
| parser = argparse.ArgumentParser(description='copy all parameter values to local') | |
| parser.add_argument("--path", dest="path", required=True, | |
| help="to copy the keys from", metavar="STRING") | |
| parser.add_argument("--directory", dest="directory", required=True, |
| #!/bin/bash | |
| aws route53 list-resource-record-sets \ | |
| --hosted-zone ${SOURCE_HOSTED_ZONE_ID} \ | |
| --query '{Changes: ResourceRecordSets[?Type != `NS` && Type != `SOA`].{"Action": `UPSERT`, "ResourceRecordSet": @ }}' > changeset.json | |
| aws route53 change-resource-record-sets \ | |
| --hosted-zone ${TARGET_HOSTED_ZONE_ID} \ | |
| --change-batch "$(<changeset.json)" | |
| #!/bin/bash | |
| gcloud compute instances delete-access-config $INSTANCE --access-config-name external-nat |
I hereby claim:
To claim this, I am signing this object:
| AWSTemplateFormatVersion: '2010-09-09' | |
| Description: AWS Backup daily CloudFormation configuration | |
| Resources: | |
| BackupPlan: | |
| Type: AWS::Backup::BackupPlan | |
| Properties: | |
| BackupPlan: | |
| BackupPlanName: default | |
| BackupPlanRule: | |
| - RuleName: daily-backups |