Amazon Web Services
Amazon Web Services is a subsidiary of Amazon.com that provides on-demand cloud computing platforms to individuals, companies, and governments, on a subscription basis.
Here are 20,688 public repositories matching this topic...
-
Updated
May 20, 2021 - Python
-
Updated
May 13, 2021 - Python
-
Updated
May 19, 2021 - Shell
-
Updated
May 20, 2021 - Python
FEATURE REQUEST:
Hi,
I see that there is nothing in the kargo repo related to docker login stuff and more precisely nothing about the ability to make kubernetes pull images from private registries such as ECR.
I have a solution for this that currently works for ECR and CoreOS and that could be extended to different registries solutions (azure one, custom private registry on premi
-
Updated
May 5, 2021 - Python
-
Updated
May 20, 2021 - Java
-
Updated
May 20, 2021 - Go
## Python/Regex fix
This is a reminder for me or a task if anyone wants :P
Basically, The last two questions aren't really regex's questions.
To do:
- Move said questions to correct place.
- Add new regex questions (Python related!)?
- Maybe add a new ## Regex section, as it is a valuable skill
-
Updated
Nov 18, 2020 - Go
Before opening, please confirm:
- I have installed the latest version of the Amplify CLI (see above), and confirmed that the issue still persists.
- I have searched for duplicate or closed issues.
- I have read the guide for [submitting bug reports](https://github.com/aws-amplify/amplify-cli/blob/master/CONTR
-
Updated
May 20, 2021 - Python
-
Updated
May 17, 2021 - Python
-
Updated
May 20, 2021 - Go
-
Updated
May 8, 2021 - Go
Command: cortex debug exec API_NAME
Behavior: choose a running API pod (at random is ok if there are multiple), and run e.g. kubectl exec -it api-iris-classifier-6d866654f8-pwz62 --container api -- /bin/bash
This command should be executed in the manager container, similar to how the cortex cluster up command works. However unlike cortex cluster up, this command will require interact
-
Updated
May 5, 2021 - TypeScript
When adding a queue to cloudwatch events, I use add_target. However, it's not straightforward to customize the resource policy that's created. There's an sqs queue policy with the principal get att to the cloudwatch rule, though no hook to expose the resource policy.
event_rule.add_target(event_targets.SqsQueue(queue))
-
Updated
May 20, 2021 - JavaScript
-
Updated
May 18, 2021 - Shell
-
Updated
Dec 4, 2020 - Python
-
Updated
May 20, 2021 - Python
-
Updated
Dec 23, 2020 - Python
I am having a project structure as follows:
.
├── README.md
├── modules
│ ├── function-app-consumption
│ │ ├── locals.tf
│ │ ├── main.tf
│ │ ├── output.tf
│ │ └── variables.tf
│ └── storage-account
│ ├── main.tf
│ ├── output.tf
│ └── variables.tf
└── sandbox
├── eastus
│ ├── regional.tfvars
│ ├── functionapp-svc
│ │ └─
Released March 2006
- Organization
- aws
- Website
- aws.amazon.com
- Wikipedia
- Wikipedia
