Skip to content
View omerap12's full-sized avatar
Block or Report

Block or report omerap12

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. K8s-Secret-Rotation-Controller K8s-Secret-Rotation-Controller Public

    An operator designed to automate the rotation and management of secrets stored in AWS Secret Manager

    Go 1

  2. Serverless-url-shortener-api Serverless-url-shortener-api Public

    This repository contains Terraform configurations and AWS Lambda functions to create a simple URL shortener API using AWS API Gateway, AWS Lambda, and DynamoDB.

    HCL 6

  3. Terraform-eks-jenkins-efk Terraform-eks-jenkins-efk Public

    This project provides infrastructure as code (IaC) components for deploying an Amazon EKS cluster, Jenkins, and an EFK stack (Elasticsearch, Fluentd, Kibana) on AWS.

    HCL 2

  4. readComicOnline readComicOnline Public

    readComicOnline.com downloader

    Python 12

  5. Crossplane-EC2-Provisioning Crossplane-EC2-Provisioning Public

    This project demonstrates how to provision EC2 instances on AWS using Crossplane.

    Shell 1

  6. Remove AWS IAM Role Remove AWS IAM Role
    1
    role_name=$1
    2
    aws iam list-instance-profiles-for-role --role-name $role_name | jq -r '.InstanceProfiles[].InstanceProfileName' | xargs -I {} aws iam remove-role-from-instance-profile --instance-profile-name {} --role-name $role_name
    3
    aws iam list-role-policies --role-name $role_name | jq -r '.PolicyNames[]' | xargs -I {} aws iam delete-role-policy --role-name $role_name --policy-name {}
    4
    aws iam list-attached-role-policies --role-name $role_name | jq -r '.AttachedPolicies[].PolicyArn' | xargs -I {} aws iam detach-role-policy --role-name $role_name --policy-arn {}
    5
    aws iam delete-role --role-name $role_name