I hereby claim:
- I am pmarques on github.
- I am pmarques (https://keybase.io/pmarques) on keybase.
- I have a public key whose fingerprint is FFC5 303F 47F1 89C8 515A D807 D67D B7CB 1472 CB5B
To claim this, I am signing this object:
// Number of VMs by PowerState | |
// Filter per: | |
// * Management Group | |
// * Tags | |
Resources | |
| where type =~ 'Microsoft.Compute/virtualMachines' | |
| where tags.service =~ "svc1" and tags.application in~ ("app1", "app2") | |
| join kind=inner ( | |
ResourceContainers | |
| where type == "microsoft.resources/subscriptions" and properties.managementGroupAncestorsChain[0].name in ("staging", "prod") |
gcloud projects get-iam-policy ${GOOGLE_CLOUD_PROJECT} \ | |
--flatten='bindings[].members' \ | |
--format='table(bindings.role)' \ | |
--filter="bindings.members:${MEMBER_EMAIL}" |
--- | |
Description: > | |
Create a simple encrypted S3 bucket | |
Parameters: | |
BucketName: | |
Type: String | |
Default: pmarques1234567890-x-account-replication | |
SourceAccount: | |
Type: String | |
Resources: |
AWSTemplateFormatVersion: 2010-09-09 | |
Parameters: | |
ResourceName: | |
Type: String | |
MinLength: 1 | |
Resources: | |
DummyResource: | |
Type: AWS::CloudWatch::Dashboard |
const Octokit = require('@octokit/rest') | |
const octokit = new Octokit({ | |
auth: "<my github access token", | |
userAgent: "pmarques 1.0" // tried with and without | |
}) | |
octokit.repos.getContents({ | |
"owner": "ansible", | |
"repo": "ansible", | |
"path": "README.rst", | |
"ref": "devel" |
--- | |
Resources: | |
SecurityGroup: | |
Type: AWS::EC2::SecurityGroup | |
Properties: | |
GroupDescription: Allow http to client host | |
VpcId: "vpc-1" | |
SecurityGroupIngress: | |
- IpProtocol: tcp |
# How to install, tested in Windows Server R2012 | |
# Write the functions in file %HOMEPATH\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1 | |
# | |
function checkPort { | |
New-Object System.Net.Sockets.TcpClient($args[0], $args[1]) | |
} | |
# Test it | |
# C:\> checkPort "127.0.0.1" 80 |
I hereby claim:
To claim this, I am signing this object:
R_GROUP=a | |
# Delete all VMs in a group | |
az vm list --resource-group "${R_GROUP}" | jq '.[] .id' | xargs az vm delete --yes --ids |