I hereby claim:
- I am iashwash on github.
- I am issa (https://keybase.io/issa) on keybase.
- I have a public key whose fingerprint is C74F AE93 DCE8 FA19 765B 7077 7D0E DDC7 EE52 EDFA
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| #!/bin/env python | |
| ''' | |
| Usage: python instance.py --help | |
| Replace YOURKEYHERE and YOURSECRETKEYHERE and us-east-1 | |
| Setup: | |
| pip install -r requirements.txt | |
| ''' | |
| import boto3 |
| #!/usr/bin/env python | |
| from littlechef import runner as lc | |
| # Update user and target | |
| lc.env.user = 'ubuntu' | |
| lc.env.host_string = 'node.yourdomain.net' | |
| lc.env.kitchen_path = '/path/to/your/kitchen' | |
| lc.env.http_proxy = None | |
| lc.env.https_proxy = None |
| #!/usr/bin/env python | |
| # Simple script to test bandwidth connectivity to s3 | |
| # Requires boto python package | |
| # Must run on a system that supports /dev/null | |
| # | |
| # Quick setup: | |
| # sudo pip install virtualenv | |
| # sudo pip install virtualenvwrapper | |
| # source /usr/local/bin/virtualenvwrapper.sh | |
| # mkvirtualenv s3load |
| # Modified from https://gist.github.com/OnlyInAmerica/9964456 | |
| # Find the IAM username belonging to the TARGET_ACCESS_KEY | |
| # Useful for finding IAM user corresponding to a compromised AWS credential | |
| # | |
| # Usage: | |
| # python find_iam_user AWS_KEY_ID | |
| # | |
| # Requirements: | |
| # | |
| # Environmental variables: |