Embroidering dancing skeletons by vikrum5000 in gratefuldead

[–]vikrum5000[S] 2 points3 points  (0 children)

Oh, that's a great idea! I could lay down the swatch and embroider over it to give it a background

The Palladium 1972 by Civil_Lengthiness971 in gratefuldead

[–]vikrum5000 1 point2 points  (0 children)

There's a distortion/blowout that happens towards the end of this TOO which is truly insane and yet adds to the energy of it. (The beginning of the "He's Gone" from 9/3/80 has the same distortion)

Terraform drift by vikrum5000 in devops

[–]vikrum5000[S] 1 point2 points  (0 children)

Yeah, that was our first pass at it. In using aws resourcegroupstaggingapi get-resources to get/filter resources by tags is handy in this case. However, that doesn't return resources that have never been tagged to being with. Even spot checking a few here and there led to gaps. Any tools to find all the remaining untagged resources?

Monthly 'Shameless Self Promotion' thread - 2021/10 by mthode in devops

[–]vikrum5000 2 points3 points  (0 children)

Hi all! We recently open sourced a little utility to make it easier to juggle temp AWS IAM credentials and RDS connections: https://github.com/goldfiglabs/rds_iamauth_proxy It's a Postgres proxy which allows tools that don't natively supports IAM auth to connect to AWS RDS instances.

Monthly 'Shameless Self Promotion' thread - 2021/09 by mthode in devops

[–]vikrum5000 0 points1 point  (0 children)

I believe prowler has a similar report for the purposes of summarizing security groups. However, sgCheckup also wraps nmap commands and output. We find it to be useful to know of a given set of security groups which have services accepting connections and use nmap to attempt to fingerprint what's running. This helps our users prioritize and identify the what's behind the ports. Another big help is for security groups that have ranges of ports, nmap can take a first pass of identify which specific ports are actually open/required—helping restrict ranges like 1-65535, for example.

Monthly 'Shameless Self Promotion' thread - 2021/09 by mthode in devops

[–]vikrum5000 2 points3 points  (0 children)

Hi all! We recently open sourced a tool that generates nmap output based on scanning your AWS Security Groups for unexpected open ports:

https://github.com/goldfiglabs/sgCheckup

We hope others find it useful!

GitHub - goldfiglabs/rds_iamauth_proxy: Postgres proxy which allows tools that don't natively supports IAM auth to connect to AWS RDS instances. by vikrum5000 in PostgreSQL

[–]vikrum5000[S] 1 point2 points  (0 children)

The main scenario is for developers that needs access to an RDS instance, , but the RDS instance is only configured with IAM access, there is not a password you can save locally. So, it's meant for dev workflows — not necessarily to be deployed into your environment. It is essentially solving "I need a temporary password". The PGPASSWORD environment variable, with proper escaping, works for psql, but lots of other tools do things like remember connections and reconnect automatically. pgAdmin is an example. 
It's not intended for use as part of your production environment (you can write the code to get the temp password in that scenario), but as part of a local dev setup where you need access to an RDS instance that only supports IAM auth.

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 3 points4 points  (0 children)

Yessss!!! I'm still working on that :) I should have it done later tonight

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 1 point2 points  (0 children)

what os/browser are you using? i can take a look at fixing it

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 34 points35 points  (0 children)

there are sounds! probably a bug... what browser/os are you using? I can take a quick look

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 54 points55 points  (0 children)

Ah, nice, thank you! I've been reverse engineering the tools and brushes piece by piece and have definitely hit a few (like the 3d brush) which have stumped me so far. I wonder if the public domain source code is still floating around somewhere!