c7 android n,c7n · PyPI

Cloud Custodian

Cloud Custodian is a rules engine for AWS fleet management. It

allows users to define policies to enable a well managed cloud infrastructure,

that’s both secure and cost optimized. It consolidates many of the adhoc

scripts organizations have into a lightweight and flexible tool, with unified

metrics and reporting.

Custodian can be used to manage AWS accounts by ensuring real time

compliance to security policies (like encryption and access requirements),

tag policies, and cost management via garbage collection of unused resources

and off-hours resource management.

Custodian policies are written in simple YAML configuration files that

enable users to specify policies on a resource type (ec2, asg, redshift, etc)

and are constructed from a vocabulary of filters and actions.

It integrates with lambda and cloudwatch events to provide for

real time enforcement of policies with builtin provisioning of the lambdas, or

as a simple cron job on a server to execute against large existing fleets.

Features

Comprehensive support for AWS services and resources (> 100), along with

400+ actions and 300+ filters to build policies with.

Supports arbitrary filtering on resources with nested boolean conditions.

Dry run any policy to see what it would do.

Automatically provisions lambda functions, config rules, and cloud watch event targets for

real-time policies.

Cloudwatch metrics outputs on resources that matched a policy

Structured outputs into s3 of which resources matched a policy.

Intelligent cache usage to minimize api calls.

Battle-tested - in production on some very large AWS accounts.

Supports cross-account usage via STS role assumption.

Supports integration with custom/user supplied lambdas as actions.

Quick Install

$ virtualenv --python=python2 custodian

$ source custodian/bin/activate

(custodian) $ pip install c7n

Usage

First a policy file needs to be created in YAML format, as an example:

policies:

- name: remediate-extant-keys

description: |

Scan through all s3 buckets in an account and ensure all objects

are encrypted (default to AES256).

resource: s3

actions:

- encrypt-keys

- name: ec2-require-non-public-and-encrypted-volumes

resource: ec2

description: |

Provision a lambda and cloud watch event target

that looks at all new instances and terminates those with

unencrypted volumes.

mode:

type: cloudtrail

events:

- RunInstances

filters:

- type: ebs

key: Encrypted

value: false

actions:

- terminate

- name: tag-compliance

resource: ec2

description: |

Schedule a resource that does not meet tag compliance policies

to be stopped in four days.

filters:

- State.Name: running

- "tag:Environment": absent

- "tag:AppId": absent

- or:

- "tag:OwnerContact": absent

- "tag:DeptID": absent

actions:

- type: mark-for-op

op: stop

days: 4

Given that, you can run cloud-custodian with:

# Validate the configuration (note this happens by default on run)

$ custodian validate policy.yml

# Dryrun on the policies (no actions executed) to see what resources

# match each policy.

$ custodian run --dryrun -s out policy.yml

# Run the policy

$ custodian run -s out policy.yml

Custodian supports a few other useful subcommands and options, including

outputs to s3, cloud watch metrics, sts role assumption. Policies go together

like lego bricks with actions and filters.

Consult the documentation for additional information, or reach out on gitter.

Additional Tools

The Custodian project also develops and maintains a suite of additional tools

here https://github.com/capitalone/cloud-custodian/tree/master/tools:

Salactus

Scale out s3 scanning.

Mailer

A reference implementation of sending emails to users to notify them.

TrailDB

Cloudtrail indexing and timeseries generation for dashboarding

LogExporter

Cloud watch log exporting to s3

Index

Indexing of custodian metrics and outputs for dashboarding

Sentry

Log parsing for python tracebacks to integrate with

https://sentry.io/welcome/

Contributors

We welcome Your interest in Capital One’s Open Source Projects (the

“Project”). Any Contributor to the Project must accept and sign an

Agreement indicating agreement to the license terms below. Except for

the license granted in this Agreement to Capital One and to recipients

of software distributed by Capital One, You reserve all right, title,

and interest in and to Your Contributions; this Agreement does not

impact Your rights to use Your own Contributions for any other purpose.

Code of Conduct

This project adheres to the Open Code of Conduct. By participating, you are

expected to honor this code.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
使用 JavaScript 编写的记忆游戏(附源代码)   项目:JavaScript 记忆游戏(附源代码) 记忆检查游戏是一个使用 HTML5、CSS 和 JavaScript 开发的简单项目。这个游戏是关于测试你的短期 记忆技能。玩这个游戏 时,一系列图像会出现在一个盒子形状的区域中 。玩家必须找到两个相同的图像并单击它们以使它们消失。 如何运行游戏? 记忆游戏项目仅包含 HTML、CSS 和 JavaScript。谈到此游戏的功能,用户必须单击两个相同的图像才能使它们消失。 点击卡片或按下键盘键,通过 2 乘 2 旋转来重建鸟儿对,并发现隐藏在下面的图像! 如果翻开的牌面相同(一对),您就赢了,并且该对牌将从游戏中消失! 否则,卡片会自动翻面朝下,您需要重新尝试! 该游戏包含大量的 javascript 以确保游戏正常运行。 如何运行该项目? 要运行此游戏,您不需要任何类型的本地服务器,但需要浏览器。我们建议您使用现代浏览器,如 Google Chrome 和 Mozilla Firefox, 以获得更好、更优化的游戏体验。要玩游戏,首先,通过单击 memorygame-index.html 文件在浏览器中打开游戏。 演示: 该项目为国外大神项目,可以作为毕业设计的项目,也可以作为大作业项目,不用担心代码重复,设计重复等,如果需要对项目进行修改,需要具备一定基础知识。 注意:如果装有360等杀毒软件,可能会出现误报的情况,源码本身并无病毒,使用源码时可以关闭360,或者添加信任。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值