Skip to content

Instantly share code, notes, and snippets.

View andreyev's full-sized avatar
💭
I may be slow to respond.

Andreyev Dias de Melo andreyev

💭
I may be slow to respond.
View GitHub Profile
worker_processes auto;
rtmp_auto_push on;
events {}
rtmp {
server {
listen 1935;
listen [::]:1935 ipv6only=on;
application live {
live on;
429147289
400651899
856483199
[
{
"targets": [
"prometheus.io"
],
"labels": {
"__meta_datacenter": "london",
"__meta_prometheus_job": "node"
}
}
@andreyev
andreyev / nc.rss
Last active September 3, 2021 14:11
<?xml version="1.0" encoding="UTF-8"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NerdCast Pirata</title><link>https://jovemnerd.com.br/feed-nerdcast/</link><description>O mundo vira piada no Jovem Nerd</description><image><url>https://jovemnerd.com.br/wp-content/themes/jovemnerd/assets/images/nc-feed.jpg</url><title>NerdCast</title><link>https://jovemnerd.com.br/feed-nerdcast/</link><width>1400</width><height>1400</height></image>
<item><pubDate>2021-08-30T06:00:30-03:00</pubDate><title>05 - E o Aranha, hein?</title><enclosure url="https://nerdcast.jovemnerd.com.br/ladobunker_05.mp3" type="audio/mpeg"/><description><![CDATA[<p>Trailer do Homem-Aranha, Cowboy Bebop, OnlyFans: O Retorno, Elden Ring e Matrix 4</p>
]]></description></item>
<item><pubDate>2021-08-28T10:50:30-03:00</pubDate><title>17 - BDSM – Bad Ass Modafoca</title><enclosure url="https://nerdcast.jovemnerd.com.br/mamicas_17.mp3" type="audio/mpeg"/><descript
@andreyev
andreyev / gist:256f25a288a6590215e98804ca8bee60
Created June 30, 2021 18:20
list and post all AWS tagged resources to prometheus pushgateway
cat <<EOF | curl --data-binary @- http://localhost:9091/metrics/job/inventory/cloud/aws
$(aws ec2 describe-regions --region us-east-1 | jq -r '.Regions[].RegionName' | sort | while read REGION; do
aws resourcegroupstaggingapi get-resources --region $REGION | jq --arg Region $REGION -r '.ResourceTagMappingList[].ResourceARN';
done | while read LINE; do echo 'resource_item{partition="'$(echo ${LINE//\//:} | cut -d ':' -f2)'",service="'$(echo ${LINE//\//:} | cut -d ':' -f3)'",region="'$(echo ${LINE//\//:} | cut -d ':' -f4)'",account_id="'$(echo ${LINE//\//:} | cut -d ':' -f5)'",resource_type="'$(echo ${LINE//\//:} | cut -d ':' -f6)'",resource_id="'$(echo ${LINE//\//:} | cut -d ':' -f7)'"} 1'; done| sort -u)
EOF
@andreyev
andreyev / gist:d73534cf3deaf159a59a924a26c1c7c9
Created June 18, 2021 17:07
list all aws resources by ARN
aws ec2 describe-regions --region us-east-1 | jq -r '.Regions[].RegionName' | sort | while read REGION; do aws resourcegroupstaggingapi get-resources --region $REGION | jq --arg Region $REGION -r '.ResourceTagMappingList[]|"\($Region):\(.ResourceARN)"'; done
@andreyev
andreyev / gist:e2590962f2fbebcdcaf8626f34ce2efb
Created June 18, 2021 16:47
compare and instances reservations on every region of aws
aws ec2 describe-regions --region us-east-1 | jq -r '.Regions[].RegionName' | sort | while read REGION; do aws --region $REGION ec2 describe-instances | jq -r '.Reservations[].Instances[]|select(.State.Name|match("running"))|"\(.InstanceType)"'| sort | uniq -c > /tmp/instances; aws --region $REGION ec2 describe-reserved-instances | jq -r '.ReservedInstances[]|select(.State|match("active"))|" \(.InstanceCount) \(.InstanceType)"'| sort > /tmp/reservations; [[ -s /tmp/instances || -s /tmp/reservations ]] && echo -ne "Region: $REGION\n-Instances:\n$(cat /tmp/instances)\n-Reservations:\n$(cat /tmp/reservations)\n"; done
#!/bin/bash
# Before run you need to cache policies files running:
# $ mkdir policies
# $ i=0 aws iam list-policies | jq -r '.Policies[]|"\(.PolicyName) \(.Arn) \(.DefaultVersionId)"' | while read name arn version; do echo $((i++)); aws iam get-policy-version --policy-arn $arn --version-id $version > policies/${name}.json; done
# And map policy name and ARN
# $ aws iam list-policies | jq -r '.Policies[]|"\(.PolicyName) \(.Arn)"' > policies-arn
# To do: handle inline policies
# usage example to get all users who have s3 action on my-bucket: `$ bash policy-inspector.sh 's3:' "arn:aws:s3:::my-bucket" policies/*`
@andreyev
andreyev / ScriptRunner REST Endpoint to update JIRA's User Property
Last active March 23, 2021 18:14
ScriptRunner REST Endpoint to update JIRA's User Property
import com.onresolve.scriptrunner.runner.rest.common.CustomEndpointDelegate
import groovy.json.JsonBuilder
import groovy.transform.BaseScript
import com.atlassian.jira.component.ComponentAccessor
import javax.servlet.http.HttpServletRequest
import javax.ws.rs.core.MultivaluedMap
import javax.ws.rs.core.Response
import com.atlassian.jira.component.ComponentAccessor
@andreyev
andreyev / aws-app
Created December 22, 2016 17:18
scripts
#!/bin/bash
wget https://apt.puppetlabs.com/puppetlabs-release-pc1-trusty.deb
dpkg -i puppetlabs-release-pc1-trusty.deb
apt-get update
apt-get -q -y install puppet-agent \
&& echo "[main]" > /etc/puppetlabs/puppet/puppet.conf \
&& echo "server=puppet.adtsys.com.br" >>/etc/puppetlabs/puppet/puppet.conf \
&& echo "environment=adtsys_createcloudinfra" >>/etc/puppetlabs/puppet/puppet.conf \
&& echo "certname=srv-app-aws.adtsys.com.br-$(date +%s)" >>/etc/puppetlabs/puppet/puppet.conf