Skip to content

Instantly share code, notes, and snippets.

View Kulasangar's full-sized avatar

Kulasangar Kulasangar

View GitHub Profile
variable "region" {
default = "us-east-1"
}
variable "AmiLinux" {
type = "map"
default = {
us-east-1 = "ami-b73b63a0" # Virginia
}
description = "have only added one region"
}
resource "aws_instance" "my-test-instance" {
ami = "${lookup(var.AmiLinux, var.region)}"
instance_type = "t2.micro"
iam_instance_profile = "${aws_iam_instance_profile.test_profile.name}"
tags {
Name = "test-instance"
}
}
resource "aws_iam_instance_profile" "test_profile" {
name = "test_profile"
roles = ["${aws_iam_role.ec2_s3_access_role.name}"]
}
resource "aws_iam_policy_attachment" "test-attach" {
name = "test-attachment"
roles = ["${aws_iam_role.ec2_s3_access_role.name}"]
policy_arn = "${aws_iam_policy.policy.arn}"
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": "*"
}
]
}
resource "aws_iam_policy" "policy" {
name = "test-policy"
description = "A test policy"
policy = "${file("policys3bucket.json")}"
}
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "ec2.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
resource "aws_iam_role" "ec2_s3_access_role" {
name = "s3-role"
assume_role_policy = "${file("assumerolepolicy.json")}"
}
#!/usr/bin/python
# -*- coding: utf-8 -*-
from pyspark import SparkContext
from pyspark.sql import SparkSession
from pyspark.sql.functions import *
from pyspark.sql.types import StringType
from pyspark import SQLContext
from itertools import islice
from pyspark.sql.functions import col