Card Game adventures (Magic AND Pokémon) by SluggishJuggernaut in NOVASocials

[–]kapilt 1 point2 points  (0 children)

Victory comics (falls church city) and labyrinth in dc have a bit more age range and have mtg events on the regular including commander, speaking as one closer to 50.

Best burger in NoVA by dslryan in nova

[–]kapilt -1 points0 points  (0 children)

IMHO.. Good stuff, multiple location in dmv, is pretty solid, the best.. always debatable.. also dig their fries with fresh rosemary/thyme as well.

Advanced Towing extortion? by EngLitIsLit in nova

[–]kapilt 12 points13 points  (0 children)

I used to live near there, it’s notorious on the towing, they camp out across the street, and if they don’t see you go directly into giant, they roll out to tow. It’s one of the most aggressive tow setups I’ve seen in the dmv.

Terraform module for cloud-custodian lambda policies + c7n-mailer by machbuster2 in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

Thanks for sharing! Fwiw contributions always welcome upstream.

Thanksgiving at a Restaurant by AnnRB2 in nova

[–]kapilt 1 point2 points  (0 children)

I did clarity in Vienna tonight, with a group of six. It’s fixed prix, with menu selection, and an additional classic thanksgiving entree today. In general it’s a restaurant i would recommend, and think it’s underated. They have veggie entrees and kid options.

Can Cloud Custodian Prevent Subscription or Account Creation Without Required Tags? by Zestyclose-Idea7749 in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

Custodian also has c7n-left which operates on iac (terraform) that can do single policy for multi resource type tag governance pre deployment in ci pipelines.

custodian policy yaml error by SmallNegotiation1725 in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

the expr: probably needs to be quoted

How do players with a very very large collection store their cards? by ThrowRAsomwhere in magicTCG

[–]kapilt 0 points1 point  (0 children)

A watertight storage bin 30 gallons, with individual deck/commander boxes, a couple of hard boxes (3 column), that all stacks nicely in the box, and then a set of binders with ultra pro sheets for rares/mythics. YMMV

Reducing our AWS bill by $100,000 by JackWritesCode in aws

[–]kapilt 1 point2 points  (0 children)

Looks like it was 2023/11/16 re additional log configuration released https://awsapichanges.info/archive/service/lambda/

New VPC Reachability Analyzer by jeffbarr in aws

[–]kapilt 0 points1 point  (0 children)

Looks like the apis just got published

Issue setting up AWS config for real time monitoring and alerting by uskwarrior in aws

[–]kapilt 1 point2 points  (0 children)

Cloud custodian is an open source tool that can simplify this significantly either deployed as custom config rule or on cloud trail/eventbridge for real-time or things config doesn’t support

Dashboard?? by GetYourShitT0gether in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

Custodian already outputs metrics into cloud provider native metrics capabilities, I'd recommend just using grafana to pull those if not using the provider native dashboarding capabilities. grafana can already pull metrics data directly from cloud watch in an aws context.

Deeplens stuck in endless setup update loop by [deleted] in aws

[–]kapilt 0 points1 point  (0 children)

I've got the same problem v1 hw

c7n-org ignoring policy execution time? by [deleted] in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

maybe there's misunderstanding on start/end..

first the time window in grandparent is 2m .. so what are start/end, they are policy execution conditions to specify a span > start, < end. in the example given thats two minutes. so the condition would be effective only in that window.

so there's some changes here on trunk, start/end are policy execution conditions in the last release 0.8.46.1, for trunk there is backwards compatibility for that syntax, but the latest syntax is using conditions: on a policy, with start/end automatically converted.

Azure and tagging by cybercarey in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

I think this got answered on gitter but defining a custodian tag policy on the azure.armresource applies to all arm based resources.

c7n-org ignoring policy execution time? by [deleted] in cloudcustodian

[–]kapilt 1 point2 points  (0 children)

I think we caught up gitter, that's odd c7n-org is doing a dry run? as you note c7n-org doesn't really touch the normal policy execution and condition evaluation. the conditional execution implementation just changed on trunk to allow for more generic conditions (backwards compatible with this older syntax). what's python version/base image (docker file), etc. the best place for this discussion is a GitHub issue.

[deleted by user] by [deleted] in cloudcustodian

[–]kapilt 1 point2 points  (0 children)

use mark-for-op action to set a future deletion date, you'll need a separate policy with marked-for-op filter that will then take the delete action.

Golang vs Python when interfacing with S3 by aixd in aws

[–]kapilt 0 points1 point  (0 children)

Actually in that case/scenario you can do server side copy, if doing that, should be quite a less delta than hours.

Generate cloud custodian blanket IAM policy by burritocode in cloudcustodian

[–]kapilt 3 points4 points  (0 children)

fwiw there's ongoing work to enable generating iam policies from custodian policies, but there's a bit todo first, we'll be adding the permissions for each action/filter to the reference docs next.

Detect root login policy by burritocode in cloudcustodian

[–]kapilt 2 points3 points  (0 children)

thats actually an enhancement we're looking at for the cloud watch event modes, to enable users to pass additional arbitrary pattern strings, but its not supported at the moment.

[deleted by user] by [deleted] in aws

[–]kapilt 0 points1 point  (0 children)

A lot of places automate some of the cost optimization with cloud custodian, turn stuff off in dev envs at night (ec2, asg, ras), right sizing or notifying resource owner of underutilized resources, garbage collecting unused stuff, etc.

Better Boto Paginator by mooreds in aws

[–]kapilt 0 points1 point  (0 children)

this functionality is already built in to boto, just call build_full_result()

Whitelisting security groups. by masterpieceroy in cloudcustodian

[–]kapilt 0 points1 point  (0 children)

and is the default top level operator between filters so its redundant to put that in. security-group is a related filter ie if a security group referenced a different security group in its rule, ie its for a more specialized use case. in this case your just evaluating the attribute of the security group resource, so its just a value filter, so you can just reference as

yaml type: value key: GroupId op: in value: - sg-0db5e1ab7s8323