I hereby claim:
- I am florin-andrei-curbside on github.
- I am florinandreicurb (https://keybase.io/florinandreicurb) on keybase.
- I have a public key ASAxLmSJbCXrkAkl2Tas_H_0ooup6lVfZtmKcyHw9FF1ywo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
grep "CRL CHECK OK" /var/log/daemon.log | grep -v curbside.in_CA | awk -F "CN=" '{print $2}' | cut -d / -f 1 | |
grep "CRL CHECK FAILED" /var/log/daemon.log | grep -v curbside.in_CA | awk -F "CN=" '{print $2}' | cut -d / -f 1 |
aws s3api list-buckets --output text | awk '{print $3}' > buckets.txt | |
for b in `cat buckets.txt`; do echo -ne "$b\t"; aws s3api get-bucket-location --bucket $b --output text; done |
├── dostash-ad2-trace-event/ | |
│ ├── logstash-p1-def-001.2017-02-16-00-00-00/ | |
│ │ ├── ls.s3.1045715e-6536-4013-bab6-7be280338c68.2017-02-17T00.44.part2.txt | |
│ │ ├── ls.s3.41e8091b-bcfe-4ea5-9efb-8fb38a0a06f4.2017-02-17T01.04.part6.txt | |
│ │ ├── ls.s3.423adab9-50d0-4c14-b978-cc469b2ec9c8.2017-02-17T00.54.part4.txt | |
│ │ ├── ls.s3.4e2727b0-adc6-4b8d-b8f6-b7687fa00859.2017-02-17T00.49.part3.txt | |
│ │ ├── ls.s3.50b0d780-1ad2-4370-8fdc-2e324f472d3f.2017-02-17T01.09.part7.txt | |
│ │ ├── ls.s3.57c7134e-f9db-4a81-b3dc-a84c1a1ee847.2017-02-17T01.14.part8.txt | |
│ │ ├── ls.s3.6ded936a-ce15-4e42-94a8-145ef8cdac0d.2017-02-17T00.59.part5.txt | |
│ │ ├── ls.s3.e67e2489-24ae-483f-adeb-514b45dcf1bd.2017-02-17T00.34.part0.txt |
for reg in `aws ec2 describe-regions --query 'Regions[].[RegionName]' --output=text`; do | |
aws --region=${reg} ec2 describe-instances --filters "Name=tag:Name, Values=api-*" \ | |
--query 'Reservations[].Instances[].[PrivateIpAddress, Tags[?Key==`Name`] | [0].Value]' \ | |
--output=text | grep -v ^None | |
done |
#!/usr/bin/env bash | |
(for dom in `openssl x509 -in cert.pem -text -noout | grep DNS`; do | |
echo ${dom} | cut -d : -f 2 | cut -d , -f 1 | |
done) | sort |
#!/usr/bin/env bash | |
aws iam list-server-certificates \ | |
--query 'ServerCertificateMetadataList[].[ServerCertificateName, Expiration, Path, ServerCertificateId]' \ | |
--output=table |
#!/usr/bin/env bash | |
for reg in `aws ec2 describe-regions --query 'Regions[].[RegionName]' --output=text`; do | |
aws ec2 describe-instances --region ${reg} \ | |
--query 'Reservations[].Instances[].[Tags[?Key==`Name`] | [0].Value, InstanceId, Placement.AvailabilityZone, PrivateIpAddress, PublicIpAddress]' --output=text | |
done | |
# the output is Google Docs spreadsheet friendly. | |
# To make it human friendly, change it to --output=table |
#!/usr/bin/env bash | |
aws ec2 describe-instances --query 'Reservations[].Instances[].PublicIpAddress' --output=table | \ | |
awk '{print $2}' | grep -v Describe | grep -v -e '^$' | |
aws ec2 describe-instances --query 'Reservations[].Instances[].PrivateIpAddress' --output=table | \ | |
awk '{print $2}' | grep -v Describe | grep -v -e '^$' |
#!/usr/bin/env bash | |
aws --region=${reg} ec2 describe-reserved-instances \ | |
--filters Name=state,Values=active \ | |
--query 'ReservedInstances[].[ReservedInstancesId, InstanceTenancy, InstanceType, InstanceCount]' \ | |
--output=table | |
# remove --region=${reg} if you only need the default region |