代码拉取完成,页面将自动刷新
同步操作将从 jiujiangxueyuan/DevOps-Bash-tools 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
#!/usr/bin/env bash
# vim:ts=4:sts=4:sw=4:et
#
# Author: Hari Sekhon
# Date: 2020-01-07 15:08:44 +0000 (Tue, 07 Jan 2020)
#
# https://github.com/harisekhon/bash-tools
#
# License: see accompanying Hari Sekhon LICENSE file
#
# If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback to help steer this or other code I publish
#
# https://www.linkedin.com/in/harisekhon
#
# Dumps AWS account summary to key = value pairs for easy viewing / grepping
#
# Useful information in here is whether the root account has MFA enabled and no access keys:
#
# AccountAccessKeysPresent = 0
# AccountMFAEnabled = 1
#
# or comparing number of users to number of MFA devices eg.
#
# MFADevices = 6
# MFADevicesInUse = 6
# ...
# Users = 14
#
# See Also:
#
# aws_users_mfa_active_report.sh (adjacent)
# check_aws_root_account.py - in The Advanced Nagios Plugins collection (https://github.com/harisekhon/nagios-plugins)
set -euo pipefail
[ -n "${DEBUG:-}" ] && set -x
aws iam get-account-summary |
jq -r '.SummaryMap | to_entries | map(.key + " = " + (.value | tostring)) | .[]' |
sort
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。