I hereby claim:
- I am stumpr on github.
- I am rstump (https://keybase.io/rstump) on keybase.
- I have a public key ASCiNmhMHXwRBxXLmd2xlg5YlXNx6WqqlSjfUkt_Zm-Uego
To claim this, I am signing this object:
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "RestrictSensitiveDataReadActions", | |
"Action": [ | |
"cloudformation:GetTemplate", | |
"dynamodb:GetItem", | |
"dynamodb:BatchGetItem", | |
"dynamodb:Query", |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Action": [ | |
"account:ListRegions", | |
"application-autoscaling:Describe*", | |
"autoscaling:Describe*", | |
"cloudformation:DescribeStackEvents", | |
"cloudformation:DescribeStackResource", |
def doHttpRequest(self, verb, url, headers=None, data=None): | |
options = {} | |
if headers: | |
options["headers"] = headers | |
if data: | |
options["data"] = data | |
try: | |
r = self.http._request(verb.lower(), url, options) | |
r.raise_for_status() |
#!/usr/bin/env python | |
import boto3 | |
import pprint | |
import argparse | |
import csv | |
from multiprocessing import Process | |
from botocore.exceptions import ProfileNotFound, ClientError |
#!/usr/bin/env python | |
import boto3, argparse, sys, time | |
parser = argparse.ArgumentParser(description="Remove default VPC in specified account and region") | |
parser.add_argument('--account', | |
type=str ) | |
parser.add_argument('--region', | |
type=str ) | |
parser.add_argument('--role', |
-- Default VPCs | |
SELECT * | |
FROM "stormreports"."ec2_vpcs" | |
WHERE isDefault = true | |
AND date = date_format(current_date, '%Y-%m-%d') | |
-- VPCs with no ENIs attached (possibly unused) | |
WITH e AS | |
(SELECT vpcid, |
aws ec2 register-image --ena-support --sriov-net-support simple --virtualization-type hvm --name ami-base-centos --block-device-mappings '[{"DeviceName":"/dev/sda1","Ebs":{"SnapshotId":"snap-05168016823a3fc9f"}}]' --root-device-name /dev/sda1 --architecture x86_64 --profile rdc-com-production | |
aws ec2 create-tags --tags Key=OS,Value=CentOS Key=Application,Value=base --resources ami-423a593d --profile rdc-com-production |
provider "aws" { | |
profile = "${var.profile}" | |
region = "${var.region}" | |
assume_role { | |
role_arn = "arn:aws:iam::${var.account_id}:role/${var.assume_role}" | |
} | |
} | |
resource "aws_s3_bucket" "tf_state_storage" { |
I hereby claim:
To claim this, I am signing this object:
IFS=$'\n' read -rd '' -a array <<< "$(aws ec2 describe-instances | jq -c .Reservations[])" | |
n=0; for i in "${array[@]}"; do n=$((n+1)); cbc create $n -V "${i}"; done |