-
Perion Network
- Tel Aviv, Israel
-
23:34
(UTC +03:00) - omerap12@gmail.com
- in/omer-aplatony
Block or Report
Block or report omerap12
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned Loading
-
K8s-Secret-Rotation-Controller
K8s-Secret-Rotation-Controller PublicAn operator designed to automate the rotation and management of secrets stored in AWS Secret Manager
Go 1
-
Serverless-url-shortener-api
Serverless-url-shortener-api PublicThis repository contains Terraform configurations and AWS Lambda functions to create a simple URL shortener API using AWS API Gateway, AWS Lambda, and DynamoDB.
HCL 6
-
Terraform-eks-jenkins-efk
Terraform-eks-jenkins-efk PublicThis project provides infrastructure as code (IaC) components for deploying an Amazon EKS cluster, Jenkins, and an EFK stack (Elasticsearch, Fluentd, Kibana) on AWS.
HCL 2
-
-
Crossplane-EC2-Provisioning
Crossplane-EC2-Provisioning PublicThis project demonstrates how to provision EC2 instances on AWS using Crossplane.
Shell 1
-
Remove AWS IAM Role
Remove AWS IAM Role 1role_name=$1
2aws iam list-instance-profiles-for-role --role-name $role_name | jq -r '.InstanceProfiles[].InstanceProfileName' | xargs -I {} aws iam remove-role-from-instance-profile --instance-profile-name {} --role-name $role_name
3aws iam list-role-policies --role-name $role_name | jq -r '.PolicyNames[]' | xargs -I {} aws iam delete-role-policy --role-name $role_name --policy-name {}
4aws iam list-attached-role-policies --role-name $role_name | jq -r '.AttachedPolicies[].PolicyArn' | xargs -I {} aws iam detach-role-policy --role-name $role_name --policy-arn {}
5aws iam delete-role --role-name $role_name
If the problem persists, check the GitHub status page or contact support.