CodingBee

A beginners guide to programming and automating stuff

Python – Pip

https://pip.pypa.io/en/stable/ To install python on centos: $ yum install python-pip Some useful commands: $ pip list # equivalent to: yum list aailable … $ pip show {packagename} # equivalent to: yum info …. $ pip search {keyworld} # equivalent to: yum search …. https://pypi.python.org/pypi # equivalent to rubygems.org In Ruby, . . . Read more

Python – Virtualenv

Virtualenv is the ruby equialent of ruby’s rbm. To start using Virtualenv, you need to run the following as the root user: $ yum install python-pip $ pip install virtualenv $ pip install virtualenvwrapper # optional but provides the workon From this point forward you can run all other commands . . . Read more

Python – crash course

To install python: $ yum install python indentation is important, since code blocks are not encased in any brackets whatsoever. to access python command line (aka repl) do: [root@ansibleclient01 ~]# python Python 2.7.5 (default, Nov 20 2015, 02:00:19) [GCC 4.8.5 20150623 (Red Hat 4.8.5-4)] on linux2 Type “help”, “copyright”, “credits” . . . Read more

AWS – CloudHSM

CloudHSM (Hardware Security Module): This is essentially the name of a dedicated physical machine that is seperate from all the other AWS hardware, and it is used to store encryption keys. If an outside party gains access to these keys, then your AWS infrastructure is compromised. Hence even AWS employees . . . Read more

AWS – Cloudwatch related security features

Cloudwatch related API requests are signed with HMAC-SHA1signature from the request and the the user’s private key Cloudwatch’s (sdk) API is only accessible via https, not http, i.e. it is encrypted with ssl An IAM user can only access cloudwatch if they are given access via IAM You can configure . . . Read more

AWS – Encryption features Overview

You can encrypt the content of your resources. This basically means that the content can’t be viewable by an AWS employee. The only way to decrypt the content is via logging into the AWS Account that created the encrypted data in the first place, and also you need to login . . . Read more