knqyf263 / utern
Multi group and stream log tailing for AWS CloudWatch Logs.
☆306Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for utern
- CLI tool that you can interactively call Amazon ECS APIs (run-task, execute-command, stop-task), copy files between ECS and local, and vi…☆161Updated 3 months ago
- A CLI command to parse Terraform execution result and notify it to GitHub☆622Updated last year
- ECS Dynamic Environment Manager (eden) CLI☆42Updated 4 years ago
- Run and Integrate AWS CodeBuild with GitHub Push/Pull-Request webhook events.☆103Updated last year
- ecspresso is a deployment tool for Amazon ECS☆829Updated this week
- Rss Feeds of AWS official information☆37Updated 2 years ago
- Easily assume AWS roles in your terminal.☆566Updated last year
- Error tracking tool on AWS managed services.☆103Updated 2 years ago
- ecschedule is a tool to manage ECS Scheduled Tasks.☆173Updated 2 weeks ago
- Baseline Environment on AWS(BLEA) is a set of reference CDK template to establish secure baseline on standalone-account or ControlTower b…☆394Updated this week
- lambroll is a minimal deployment tool for AWS Lambda.☆348Updated 2 weeks ago
- ECS Task Assistant tool.☆64Updated 3 weeks ago
- User-friendly deployment and management tool for AWS Lambda function☆92Updated 3 years ago
- Amazon Kinesis output plugin for Fluentd☆293Updated 7 months ago
- Roadworker is a tool to manage Route53. It defines the state of Route53 using DSL, and updates Route53 according to DSL.☆320Updated 5 months ago
- Sample logging architectures for FireLens on Amazon ECS and AWS Fargate.☆306Updated 8 months ago
- ☆21Updated 6 years ago
- tail for Kinesis Stream☆35Updated 6 years ago
- Miam is a tool to manage IAM. It defines the state of IAM using DSL, and updates IAM according to DSL.☆127Updated 5 months ago
- Perform AWS CodePipeline approval action from Slack☆8Updated 9 months ago
- re-implementation of ecs-deploy in Golang☆33Updated last year
- ECS task event/log tracer CLI☆97Updated 3 months ago
- The CLI tool to force delete the entire AWS CloudFormation stack, even if it contains resources that fail to delete by the CloudFormation…