jmespath.py
leapp
jmespath.py | leapp | |
---|---|---|
30 | 73 | |
2,085 | 1,530 | |
1.7% | 0.7% | |
0.0 | 9.7 | |
about 2 months ago | 8 days ago | |
Python | TypeScript | |
MIT License | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
jmespath.py
-
Automating Nightly Local Database Refreshes from Azure Blob Storage with Docker
The Azure CLI lets us write queries to filter the results of the az storage blob list command. The queries are written in JMESPath, which is a query language for JSON. In this case, we are filtering the results to only include blobs that end with the .bacpac extension and then selecting the first one as ordered by the lastModified property. If there are no blobs found, the script exits with a failure code. If we find a blob, we download it to the local path specified by the localPath variable.
-
What's New in Python 3.12
For JSON there is the `jmespath` library which might help.
https://github.com/jmespath/jmespath.py
-
jq 1.7 Released
I love jq, but I also use JMESPath (especially with AWS CLI), yq (bundled with tomlq and xq as well), and dasel [2]. I also wish hclq [3] wasn't so dead!
[0]: https://jmespath.org/
-
Announcing serde-query 0.2.0
Probably writing the query side of things is a lot of the fun here, but there is actually a spec (and a complying Rust impl) you can hook into for this JQ-like querying: https://jmespath.org/ ( https://github.com/jmespath/jmespath.rs ).
- JMESPath
-
Spring Boot logging with Loki, Promtail, and Grafana (Loki stack)
Thanks to custom variables that use labels, we can create various filters for the dashboard. You can look up my configuration of variables and extend it with an analogy way for your own needs. At the top, I marked the filter with detected pods in selected namespace. In the lower part, you can see a preview of all labels that are associated with a single log line. Most labels are meta information that Promtail adds during scraping targets. This part of the Promtail configuration provides it. In this section, I also marked a few labels that not comes out-of-the box e.g. leavel , class , thread . We added these labels using the Promtail json stage. You need to know that Promtail processes scraped logs in a pipeline. A pipeline is comprised of a set of stages. json stage is a parsing stage that reads the log line as JSON and accepts JMESPath expressions to extract data.
- Who is JSON?
-
jmespath.py VS jertl - a user suggested alternative
2 projects | 31 Oct 2022
-
YAML value retrieval
The tester on the official website for JMESPath (what json_query is doing) has been useful to me: https://jmespath.org/
-
I've built a PathDict, a library that makes it easy to work with dicts!
Interesting. How does this compared to Jmespath? Not saying Jmespath is superior, just wondering whether you were aware of it.
leapp
-
Ask HN: Who wants to be hired? (March 2024)
Summary:
Do you find yourself overwhelmed with work, requests, or complaints and in need of assistance to alleviate the pressure, enhance communication, facilitate organization, prioritize tasks, and foster greater trust and transparency?
Alternatively, I can work as a full stack developer.
AWS Community builder, AWS User group Leader, public speaker (https://www.youtube.com/watch?v=qdu58NAQfU0&t=271s)
Or perhaps you need both? =)
I have 4+ years of experience as a product manager and 8 in product development (before pm: agile coach, UX designer, and developer).
I've been the co-founder of the open-core company behind the OSS project Leapp (https://github.com/Noovolari/leapp)
Please feel free to reach out.
-
OKTA Identity Engine Upgrade
You can switch to saml2aws using the browser method instead of the Okta method and it will continue to work after the upgrade. There is also a really neat GUI tool to manage your session tokens that also works. https://www.leapp.cloud
-
When using AWS Organizations SSO for multiple accounts (dev, stage, prod) I have a hard time knowing which account I'm currently logged into.
Take a try to Leapp: https://github.com/Noovolari/leapp
-
Ask HN: Should open source projects track you?
Hello everyone, I'm the maintainer of an open-source DeveloperTool (https://github.com/Noovolari/leapp)
With a heuristic of 7000 users daily, I started feeling the need to have more information on how Users are using the project to improve it.
Is it the right thing to do to create a better Developer Experience and gain feedback for the end users?
On a side:
-
Ask HN: Secure and simple way for secret/credential management in a startup?
- For all your employees I can advice you Leapp as open-source project (https://github.com/Noovolari/leapp). It solve mayor of the problem listed here:
-
Alternative Official SDK
I am looking to manage Leapp (https://www.leapp.cloud/) from the StreamDeck. Leapp allows you to manage and switch between different Cloud Accounts (AWS, Azure, etc). Leapp has a command line interface which I could automate with a StreamDeck plugin. Unfortunately it looks like the only official SDK is the sandboxed JavaScript one. This means I cannot automate command line tools with it.
-
What are AWS credentials?
If you’re wondering if there is a tool that allows you to stop thinking about AWS credentials and where to store them in the right way, give a look at Leapp! It takes the responsibility of storing long-term credentials in the system vault, generating/refreshing short-term credentials, and placing them in the right place for the clients to use them.
-
AWS multi-account strategy explained
Still, there is an elementary problem that we need to address, and it’s more on the operational side of things. Once we secured and implemented a tremendous multi-account strategy, how do people access AWS accounts? It turns out there is a fantastic open-source tool that lets you handle that with no effort, and its name is Leapp.
-
AWS Credentials: from Environment Variables to credentials_process
When you have to configure access to multiple AWS accounts using the Assume Role access pattern, it becomes difficult to get rid of all the Named Profiles configuration data and relationships. When you’ve to deal with a complex access scenario, tools like Leapp (https://www.leapp.cloud) come to the rescue! Leapp avoids you to specify relationships between Named Profiles in the config file, as the access methods are stored in the tool-specific configuration file.
-
Multiple active AWS consoles in the same browser with Leapp open-source browser extension (for Firefox and Chrome)
Leapp Github repository
What are some alternatives?
jq - Command-line JSON processor [Moved to: https://github.com/jqlang/jq]
aws-vault - A vault for securely storing and accessing AWS credentials in development environments
jq - Command-line JSON processor
sshportal - :tophat: simple, fun and transparent SSH (and telnet) bastion server
yq - yq is a portable command-line YAML, JSON, XML, CSV, TOML and properties processor
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
jfq - JSONata on the command line
gatus - ⛑ Automated developer-oriented status page
jello - CLI tool to filter JSON and JSON Lines data with Python syntax. (Similar to jq)
lowdefy - The config web stack for business apps - build internal tools, client portals, web apps, admin panels, dashboards, web sites, and CRUD apps with YAML or JSON.
yq - Command-line YAML, XML, TOML processor - jq wrapper for YAML/XML/TOML documents
simplelocalize-cli - SimpleLocalize CLI is a developer-friendly command-line tool for uploading and downloading translation files