I hereby claim:
- I am iashwash on github.
- I am issa (https://keybase.io/issa) on keybase.
- I have a public key whose fingerprint is C74F AE93 DCE8 FA19 765B 7077 7D0E DDC7 EE52 EDFA
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/bin/env python | |
''' | |
Usage: python instance.py --help | |
Replace YOURKEYHERE and YOURSECRETKEYHERE and us-east-1 | |
Setup: | |
pip install -r requirements.txt | |
''' | |
import boto3 |
#!/usr/bin/env python | |
from littlechef import runner as lc | |
# Update user and target | |
lc.env.user = 'ubuntu' | |
lc.env.host_string = 'node.yourdomain.net' | |
lc.env.kitchen_path = '/path/to/your/kitchen' | |
lc.env.http_proxy = None | |
lc.env.https_proxy = None |
#!/usr/bin/env python | |
# Simple script to test bandwidth connectivity to s3 | |
# Requires boto python package | |
# Must run on a system that supports /dev/null | |
# | |
# Quick setup: | |
# sudo pip install virtualenv | |
# sudo pip install virtualenvwrapper | |
# source /usr/local/bin/virtualenvwrapper.sh | |
# mkvirtualenv s3load |
# Modified from https://gist.github.com/OnlyInAmerica/9964456 | |
# Find the IAM username belonging to the TARGET_ACCESS_KEY | |
# Useful for finding IAM user corresponding to a compromised AWS credential | |
# | |
# Usage: | |
# python find_iam_user AWS_KEY_ID | |
# | |
# Requirements: | |
# | |
# Environmental variables: |