mirror of
https://github.com/nubenetes/awesome-kubernetes.git
synced 2026-03-06 03:30:44 +00:00
5.5 KiB
5.5 KiB
AWS Tools and Scripts
- AWS Scripts
- AWS Samples (Boilerplates)
- Open Source at AWS
- AWS Tools
- AWS Toolkits
- AWS Management Tools Blog
- AWS CLI and AWS SDK
- Third Party Tools
AWS Scripts
- AWS IP inventory Tool to generate an inventory of all IP addresses in use in an account, one or multiple VPC, or one or multiple subnet.
- dev.to: How to Copy a Security Group with Rules from one AWS Account to Another account
- github.com/awslabs/assisted-log-enabler-for-aws: Assisted Log Enabler - Find resources that are not logging, and turn them on
- https://github.com/dannysteenman/aws-toolbox A collection of useful Shell & Python scripts that make your DevOps life easier in AWS. Furthermore you'll also find a list of links that point to awesome DevOps tools from other creators.
- saml-to/assume-aws-role-action Assume AWS IAM Roles using SAML.to in GitHub Actions. This action enables workflows to obtain AWS Access Credentials for a desired IAM Role using AWS IAM SAML and a GitHub Actions Repository Token.
AWS Samples (Boilerplates)
Open Source at AWS
AWS Tools
- github.com/awslabs
- ==steampipe== 🌟 Steampipe is an open source tool for querying cloud APIs in a universal way and reasoning about the data in SQL.
- ==awslabs/aws-cloudsaga: AWS CloudSaga - Simulate security events in AWS== AWS CloudSaga is for customers to test security controls and alerts within their Amazon Web Services (AWS) environment, using generated alerts based on security events seen by the AWS Customer Incident Response Team (CIRT).
- New Open Source tool alert! Introducing AWS CloudSaga, a open source tool for generating events within AWS to be investigated by blue teams & incident responders.
- AWS CloudSaga is based on basic scenarios related to security events. Using AWS CloudSaga, you can safely generate events via the AWS API, and then use these events to test your team's investigation capabilities and responses in order to identify gaps and areas of improvement.
AWS Toolkits
AWS Management Tools Blog
- AWS Management Tools Blog
- Metabadger Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
AWS CLI and AWS SDK
- Amazon CLI Documentation
- AWS CLI Command Reference
- New usage examples have been added to the CLI for CodePipeline API Reference
- ec2-ssh-yplan: A pair of command line utilities for finding and SSH-ing into your Amazon EC2 instances by tag (such as ‘Name’)
- List running instances using 'awscli':
aws ec2 describe-instances --filters Name=instance-state-name,Values=running --query 'Reservations[].Instances[].[InstanceID]'
- List all AWS instances in a table format using 'awscli':
aws ec2 describe-instances --query 'Reservations[].Instances[].[Placement.AvailabilityZone, State.Name, InstanceID,InstanceType,Platform,Tags.Value,State.Code,Tags.Values]' --output table
- Announcing the end of support for Python 2.7 in the AWS SDK for Python and AWS CLI v1
- AWS SDK for Java
- medium: AWS CLI with jq and Bash The CLI is utilitarian, but a little jq sauce makes it beautiful
Third Party Tools
- ec2-spot-converter This tool converts existing EC2 instances back and forth from on-demand and 'persistent' Spot billing models while preserving instance attributes (Launch configuration, Tags..), network attributes (existing Private IP addresses, Elastic IP), storage (Volumes), Elastic Inference accelerators and Elastic GPUs. It also allows replacement of existing Spot instances with new "identical" ones to update the instance type and cpu options.
- techcrunch.com: Vantage makes managing AWS easier
- vantage.sh