Skip to content

Commit

Permalink
AWS folder cleanup
Browse files Browse the repository at this point in the history
  • Loading branch information
JimmyDuong00 committed Jul 3, 2024
1 parent f42f86c commit 1b814c0
Show file tree
Hide file tree
Showing 7 changed files with 8 additions and 107 deletions.
90 changes: 0 additions & 90 deletions CODE_OF_CONDUCT.md

This file was deleted.

16 changes: 2 additions & 14 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,6 @@
# Quartz v4
# OtterDocs

> [One] who works with the door open gets all kinds of interruptions, but [they] also occasionally gets clues as to what the world is and what might be important.” — Richard Hamming
Quartz is a set of tools that helps you publish your [digital garden](https://jzhao.xyz/posts/networked-thought) and notes as a website for free.
Quartz v4 features a from-the-ground rewrite focusing on end-user extensibility and ease-of-use.

🔗 Read the documentation and get started: https://quartz.jzhao.xyz/

[Join the Discord Community](https://discord.gg/cRFFHYye7t)

## Sponsors

<p align="center">
<a href="https://github.com/sponsors/jackyzha0">
<img src="https://cdn.jsdelivr.net/gh/jackyzha0/jackyzha0/sponsorkit/sponsors.svg" />
</a>
</p>
This site is built and hosted on Github Pages. Find more about Quartz here: https://quartz.jzhao.xyz/
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ In the S3 portal, click on 'Create bucket' we will need to create 2 buckets:
![[Pasted image 20240702113438.png]]

Give it a unique name, I named one 'imagepixelationsource' and 'imagepixelationprocessed':

![[Pasted image 20240702115102.png]]
![[Pasted image 20240702115818.png]]

Expand Down Expand Up @@ -76,6 +77,7 @@ Make sure to select the source bucket or it may cause an exponential look and in
#### Assembling everything together

Upload an image into the source bucket and see how the processed bucket will output 5 images with varying degrees of pixelation:

![[Pasted image 20240702125012.png]]![[Pasted image 20240702125030.png]]

![[Pasted image 20240702125139.png]]
Expand Down
7 changes: 4 additions & 3 deletions content/AWS/Revoking AWS Temporary Access Credentials.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,10 @@ draft: false
tags:
- aws
---

The rest of your content lives here. You can use **Markdown** here :)
In order to revoke Temporary Access Credentials, we need to remove active sessions using the credentials. Running the revoke policy will
Securing credentials is crucial in preventing unauthorized access to the cloud. In the event that a credential is leaked, follow the steps below.

In order to revoke Temporary Access Credentials, we need to remove active sessions using the credentials. Running the revoke policy will remove any services that are assuming the role therefore, make sure to identify what services or users are using it before beginning the process.

Navigate to IAM and under Access Management, select Roles:

![[Pasted image 20240702103852.png]]
Expand Down
Empty file removed content/AWS/S3.md
Empty file.

0 comments on commit 1b814c0

Please sign in to comment.