I hereby claim:
- I am stumpr on github.
- I am rstump (https://keybase.io/rstump) on keybase.
- I have a public key ASCiNmhMHXwRBxXLmd2xlg5YlXNx6WqqlSjfUkt_Zm-Uego
To claim this, I am signing this object:
| { | |
| "Version": "2012-10-17", | |
| "Statement": [ | |
| { | |
| "Sid": "RestrictSensitiveDataReadActions", | |
| "Action": [ | |
| "cloudformation:GetTemplate", | |
| "dynamodb:GetItem", | |
| "dynamodb:BatchGetItem", | |
| "dynamodb:Query", |
| { | |
| "Version": "2012-10-17", | |
| "Statement": [ | |
| { | |
| "Action": [ | |
| "account:ListRegions", | |
| "application-autoscaling:Describe*", | |
| "autoscaling:Describe*", | |
| "cloudformation:DescribeStackEvents", | |
| "cloudformation:DescribeStackResource", |
| def doHttpRequest(self, verb, url, headers=None, data=None): | |
| options = {} | |
| if headers: | |
| options["headers"] = headers | |
| if data: | |
| options["data"] = data | |
| try: | |
| r = self.http._request(verb.lower(), url, options) | |
| r.raise_for_status() |
| #!/usr/bin/env python | |
| import boto3 | |
| import pprint | |
| import argparse | |
| import csv | |
| from multiprocessing import Process | |
| from botocore.exceptions import ProfileNotFound, ClientError |
| #!/usr/bin/env python | |
| import boto3, argparse, sys, time | |
| parser = argparse.ArgumentParser(description="Remove default VPC in specified account and region") | |
| parser.add_argument('--account', | |
| type=str ) | |
| parser.add_argument('--region', | |
| type=str ) | |
| parser.add_argument('--role', |
| -- Default VPCs | |
| SELECT * | |
| FROM "stormreports"."ec2_vpcs" | |
| WHERE isDefault = true | |
| AND date = date_format(current_date, '%Y-%m-%d') | |
| -- VPCs with no ENIs attached (possibly unused) | |
| WITH e AS | |
| (SELECT vpcid, |
| aws ec2 register-image --ena-support --sriov-net-support simple --virtualization-type hvm --name ami-base-centos --block-device-mappings '[{"DeviceName":"/dev/sda1","Ebs":{"SnapshotId":"snap-05168016823a3fc9f"}}]' --root-device-name /dev/sda1 --architecture x86_64 --profile rdc-com-production | |
| aws ec2 create-tags --tags Key=OS,Value=CentOS Key=Application,Value=base --resources ami-423a593d --profile rdc-com-production |
| provider "aws" { | |
| profile = "${var.profile}" | |
| region = "${var.region}" | |
| assume_role { | |
| role_arn = "arn:aws:iam::${var.account_id}:role/${var.assume_role}" | |
| } | |
| } | |
| resource "aws_s3_bucket" "tf_state_storage" { |
I hereby claim:
To claim this, I am signing this object:
| IFS=$'\n' read -rd '' -a array <<< "$(aws ec2 describe-instances | jq -c .Reservations[])" | |
| n=0; for i in "${array[@]}"; do n=$((n+1)); cbc create $n -V "${i}"; done |