To get the IP ranges for a specific service in Atlassian cloud, use this:
curl -s https://ip-ranges.atlassian.com | jq -r '.items[] | select(.product[]=="statuspage") | select (.mask_len<32) | .cidr'
blueprint: | |
name: Frigate - Telegram Notification | |
description: Create automations to receive Snapshots and Clips from Frigate | |
domain: automation | |
input: | |
camera: | |
name: Frigate Camera | |
description: The name of the camera as defined in your frigate configuration (/conf.yml). | |
target_chat: | |
name: Target |
To get the IP ranges for a specific service in Atlassian cloud, use this:
curl -s https://ip-ranges.atlassian.com | jq -r '.items[] | select(.product[]=="statuspage") | select (.mask_len<32) | .cidr'
To get the IP ranges for a specific service in a specific region, use this:
curl -s https://ip-ranges.amazonaws.com/ip-ranges.json | jq -r '.prefixes[] | select(.region=="us-west-1") | select(.service=="S3") | .ip_prefix'
To allow roles to delete talbes in a specific database.schema:
grant DELETE TABLE on <dbName>.<schmeaName> to role <roleName>;
To grant other roles to be able to create databases privilege:
grant CREATE DATABASE on account to role <roleName>;
If you're getting this error:
Cannot execute task , EXECUTE TASK privilege must be granted to owner role`
You should grant the following privilege using an ACCOUNTADMIN role or similar:
GRANT EXECUTE TASK ON ACCOUNT TO ROLE <roleName>;
When you get this kind of message:
"code": "UnauthorizedOperation",
"message": "You are not authorized to perform this operation. Encoded authorization failure message: Q92aQ6....
Make sure you have the proper set of IAM rights, I simply use an assumable administrator role:
eval $(aws sts assume-role \
--role-arn arn:aws:iam::1234567:role/mgmt-assumable-role \
--role-session-name test | \
# create a pair of access key id and access secret key for the user above
resource "aws_iam_access_key" "active" {
user = aws_iam_user.travis_ci.name
status = "Active"
}
# create a pair of rotated access key id and access secret key for the user above
resource "aws_iam_access_key" "rotated" {
count = var.key_rotation ? 1 : 0
user = aws_iam_user.travis_ci.name
To query rabbit's API using curl(e.g list all queues):
curl -u '<user>:<password>' -i -H "content-type:application/json" -X GET "http://127.0.0.1:15672/api/queues"