<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>aws | Sergio López</title><link>https://slopezz.dev/tags/aws/</link><atom:link href="https://slopezz.dev/tags/aws/index.xml" rel="self" type="application/rss+xml"/><description>aws</description><generator>Source Themes Academic (https://sourcethemes.com/academic/)</generator><language>en-us</language><copyright>© 2021 Sergio López · Fork me on [GitHub](https://github.com/slopezz/slopezz.dev)</copyright><lastBuildDate>Thu, 22 Apr 2021 00:00:00 +0200</lastBuildDate><image><url>https://slopezz.dev/img/logo-svg-slopezz.dev.png</url><title>aws</title><link>https://slopezz.dev/tags/aws/</link></image><item><title>tf-aws-cloudtrail</title><link>https://slopezz.dev/project/tf-aws-guardduty/</link><pubDate>Thu, 22 Apr 2021 00:00:00 +0200</pubDate><guid>https://slopezz.dev/project/tf-aws-guardduty/</guid><description>&lt;ul&gt;
&lt;li&gt;This terraform module tries to standarize the way we configure AWS Cloudtrail in aws accounts&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>tf-aws-guardduty</title><link>https://slopezz.dev/project/tf-aws-cloudtrail/</link><pubDate>Thu, 22 Apr 2021 00:00:00 +0200</pubDate><guid>https://slopezz.dev/project/tf-aws-cloudtrail/</guid><description>&lt;ul&gt;
&lt;li&gt;This terraform module tries to standarize the way we configure AWS GuardDuty in aws accounts&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>tf-aws-guardduty</title><link>https://slopezz.dev/project/tf-aws-config/</link><pubDate>Thu, 22 Apr 2021 00:00:00 +0200</pubDate><guid>https://slopezz.dev/project/tf-aws-config/</guid><description>&lt;ul&gt;
&lt;li&gt;This terraform module tries to standarize the way we configure AWS GuardDuty in aws accounts&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>aws-secret-retriever</title><link>https://slopezz.dev/project/aws-secret-retriever/</link><pubDate>Fri, 09 Aug 2019 00:00:00 +0200</pubDate><guid>https://slopezz.dev/project/aws-secret-retriever/</guid><description>&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The aim of this docker image is to be able to create secrets on AWS Secrets Manager Service and retrieve its value, so this container execution can be integrated into any CICD to safely store secrets on a Cloud service without having to store secrets on a Github Repository&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It uses ENV VARS &lt;code&gt;AWS_SECRET_ACCESS_KEY&lt;/code&gt; and &lt;code&gt;AWS_ACCESS_KEY_ID&lt;/code&gt;, so you need to have aws-cli configured with valid credentials or at least to set these ENV VARS&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item></channel></rss>