I hereby claim:
- I am mvanholsteijn on github.
- I am mvanholsteijn (https://keybase.io/mvanholsteijn) on keybase.
- I have a public key ASC8m3WQn3rAaN6rL70h8G5tzhZXjiRrNBqS3heiR9KVego
To claim this, I am signing this object:
#!/bin/bash | |
# | |
# Installs and Configures the AWS cloudwatch agent, and sets the default log group name and region | |
# | |
# | |
# You need to add the following policy statement to the machine's IAM role. | |
# | |
# { | |
# "Effect": "Allow", | |
# "Action": [ |
#!/bin/bash | |
DOMAIN=${1:-mvanholsteijn.eu.auth0.com} | |
KONG_API=http://localhost:8001 | |
PUBLIC_KEY=$(curl -sS https://${DOMAIN}/pem | openssl x509 -pubkey -noout) | |
[[ -z $PUBLIC_KEY ]] && echo "ERROR: could not retrieve public key of $PUBLIC_KEY" && exit 1 | |
# add user | |
curl -sS -i -X POST $KONG_API/consumers --data username=$DOMAIN |
AUTH0_DOMAIN=mvanholsteijn.eu.auth0.com | |
curl -sS https://$AUTH0_DOMAIN/pem | \ | |
openssl x509 -pubkey -noout |
AUTH0_DOMAIN=mvanholsteijn.eu.auth0.com | |
curl -sS https://$AUTH0_DOMAIN/pem | \ | |
openssl x509 -pubkey -noout | \ | |
tr -d '\r' | \ | |
tr '\n' '|' | \ | |
sed -e 's/|/\\n/g' | \ | |
sed -e 's/^/"/' -e 's/$/"/' |
#!/usr/bin/env python | |
# | |
# reports errors on the last stack operations | |
# | |
import sys | |
import boto3 | |
def report_errors(stackname): | |
cfn = boto3.client('cloudformation') |
#!/usr/bin/env python | |
# | |
# copy all SSM parameter store parameters to disk | |
# | |
import os, sys, argparse, boto3 | |
parser = argparse.ArgumentParser(description='copy all parameter values to local') | |
parser.add_argument("--path", dest="path", required=True, | |
help="to copy the keys from", metavar="STRING") | |
parser.add_argument("--directory", dest="directory", required=True, |
#!/bin/bash | |
aws route53 list-resource-record-sets \ | |
--hosted-zone ${SOURCE_HOSTED_ZONE_ID} \ | |
--query '{Changes: ResourceRecordSets[?Type != `NS` && Type != `SOA`].{"Action": `UPSERT`, "ResourceRecordSet": @ }}' > changeset.json | |
aws route53 change-resource-record-sets \ | |
--hosted-zone ${TARGET_HOSTED_ZONE_ID} \ | |
--change-batch "$(<changeset.json)" | |
#!/bin/bash | |
gcloud compute instances delete-access-config $INSTANCE --access-config-name external-nat |
I hereby claim:
To claim this, I am signing this object:
AWSTemplateFormatVersion: '2010-09-09' | |
Description: AWS Backup daily CloudFormation configuration | |
Resources: | |
BackupPlan: | |
Type: AWS::Backup::BackupPlan | |
Properties: | |
BackupPlan: | |
BackupPlanName: default | |
BackupPlanRule: | |
- RuleName: daily-backups |