Skip to content

Instantly share code, notes, and snippets.

View ccortezb's full-sized avatar

Carlos Eduardo Cortez Bazan ccortezb

View GitHub Profile
data = requests.get(url)
soup = BeautifulSoup(data.content, 'html.parser')
cloud_category = url.split('/')[4]
cortezcloud_urls = ['https://www.cortez.cloud/categories/fundamentals',
'https://www.cortez.cloud/categories/serverless',
'https://www.cortez.cloud/categories/awsugperu']
import requests
from bs4 import BeautifulSoup
import pandas as pd
import numpy as np
import matplotlib.pyplot as plt
import seaborn as sns
import os
@ccortezb
ccortezb / ingestando-noticias-de-mi-propia-web.ipynb
Created April 2, 2021 19:43
Ingestando noticias de mi propia web.ipynb
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@ccortezb
ccortezb / ingestando-noticias-de-mi-propia-web.ipynb
Created April 2, 2021 19:41
Ingestando noticias de mi propia web.ipynb
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
const AWS = require("aws-sdk");
const crypto = require("crypto");
// Generate unique id with no external dependencies
const generateUUID = () => crypto.randomBytes(16).toString("hex");
// Initialising the DynamoDB SDK
const documentClient = new AWS.DynamoDB.DocumentClient();
exports.handler = async event => {
@ccortezb
ccortezb / create_dynamodb_table.sh
Created April 1, 2021 03:10
Create dynamodb table from CLI and JSON definitions
aws dynamodb create-table --cli-input-json file://dynamodbdefinition.json
@ccortezb
ccortezb / dynamodb_iam_permissions.json
Created April 1, 2021 03:09
Dynamodb IAM Permissions Policy
{
"AttributeDefinitions": [
{
"AttributeName": "id",
"AttributeType": "S"
}
],
"ProvisionedThroughput": {
"WriteCapacityUnits": 5,
"ReadCapacityUnits": 5
@ccortezb
ccortezb / creating_iam_policy_and_roles.sh
Last active April 1, 2021 03:28
creat iam policy, iam role y asumirlos en la aws cli
# Usa los anteriores json para poder crearlos
#crear iam policy
aws iam create-policy --policy-name iampolicy_dynamodb_For_lambda --policy-document file://iampolicy_dynamodb_For_lambda.json
# crear IAM role y asumirlo
aws iam create-role --role-name LambdaRoleForDynamoDBAccess --assume-role-policy-document file://IAM_Role_Trust_Relationship_Lambda_Dynamodb.json
aws iam attach-role-policy --role-name LambdaRoleForDynamoDBAccess --policy-arn "arn:aws:iam::279624932954:policy/iampolicy_dynamodb_For_lambda"