-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathsetup.txt
More file actions
129 lines (108 loc) · 4.81 KB
/
setup.txt
File metadata and controls
129 lines (108 loc) · 4.81 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
#https://aws.amazon.com/blogs/compute/extracting-video-metadata-using-lambda-and-mediainfo/
aws ec2 run-instances --image-id ami-60b6c60a --count 1 --instance-type t2.medium --key-name cytovas_key --security-group-ids sg-ebe6c290 --subnet-id subnet-b1edcde9
aws dynamodb create-table \
--table-name TechnicalMetadata \
--attribute-definitions \
AttributeName=keyName,AttributeType=S \
--key-schema AttributeName=keyName,KeyType=HASH \
--provisioned-throughput ReadCapacityUnits=1,WriteCapacityUnits=1
{
"TableDescription": {
"TableArn": "arn:aws:dynamodb:us-east-1:205853417430:table/TechnicalMetadata",
"AttributeDefinitions": [
{
"AttributeName": "keyName",
"AttributeType": "S"
}
],
"ProvisionedThroughput": {
"NumberOfDecreasesToday": 0,
"WriteCapacityUnits": 1,
"ReadCapacityUnits": 1
},
"TableSizeBytes": 0,
"TableName": "TechnicalMetadata",
"TableStatus": "CREATING",
"KeySchema": [
{
"KeyType": "HASH",
"AttributeName": "keyName"
}
],
"ItemCount": 0,
"CreationDateTime": 1505239996.314
}
}
996 aws dynamodb create-table --table-name TechnicalMetadata --attribute-definitions AttributeName=cytovas-instrument-files,AttributeType=S --key-schema AttributeName=cytovas-instrument-files,KeyType=HASH --provisioned-throughput ReadCapacityUnits=1,WriteCapacityUnits=1
997 ls
998 aws iam create-role --role-name LambdaMediaInfoExecutionRole --assume-role-policy-document file://lambda_trust_policy.json
999 ls
1000 emacs lambda_access_policy.json
1001 rm lambda_access_policy.json
1002 emacs lambda_access_policy.json
1003 aws iam create-policy --policy-name LambdaMediaInfoExecutionRolePolicy --policy-document file://lambda_access_policy.json
1004 aws iam attach-role-policy --role-name LambdaMediaInfoExecutionRole --policy-arn arn:aws:iam::205853417430:policy/LambdaMediaInfoExecutionRolePolicy
aws lambda create-function \
--function-name LambdaMediaInfo \
--runtime python2.7 \
--role arn:aws:iam::205853417430:role/LambdaMediaInfoExecutionRole \
--handler lambda_function.lambda_handler \
--description "Lambda MediaInfo Function" \
--timeout 60 \
--memory-size 128 \
--zip-file fileb://Lambda.zip
{
"CodeSha256": "XRFtphtMpASj8cotBwkjVpPn44IW16q+rLXFhpd75IE=",
"FunctionName": "LambdaMediaInfo",
"CodeSize": 3249037,
"MemorySize": 128,
"FunctionArn": "arn:aws:lambda:us-east-1:205853417430:function:LambdaMediaInfo",
"Version": "$LATEST",
"Role": "arn:aws:iam::205853417430:role/LambdaMediaInfoExecutionRole",
"Timeout": 60,
"LastModified": "2017-09-12T17:26:59.047+0000",
"Handler": "lambda_function.lambda_handler",
"Runtime": "python2.7",
"Description": "Lambda MediaInfo Function"
}
aws lambda add-permission \
--function-name LambdaMediaInfo \
--statement-id Id-1 \
--action "lambda:InvokeFunction" \
--principal s3.amazonaws.com \
--source-arn arn:aws:s3:::cytovas-instrument-files \
--source-account 205853417430
###try this with the modified one
aws lambda delete-function --function-name LambdaFCS && aws lambda create-function --function-name LambdaFCS --runtime python3.6 --role arn:aws:iam::205853417430:role/LambdaMediaInfoExecutionRole --handler lambda_function.lambda_handler --description "Lambda FCS Function" --timeout 60 --memory-size 128 --zip-file fileb://lambda.zip
{
"TracingConfig": {
"Mode": "PassThrough"
},
"CodeSha256": "qcJDvyQKz9F7jaXyW592KND8OrJM8xlvhDsxSTB5dMY=",
"FunctionName": "LambdaFCS",
"CodeSize": 37854516,
"MemorySize": 128,
"FunctionArn": "arn:aws:lambda:us-east-1:205853417430:function:LambdaFCS",
"Version": "$LATEST",
"Role": "arn:aws:iam::205853417430:role/LambdaMediaInfoExecutionRole",
"Timeout": 60,
"LastModified": "2017-09-18T16:55:29.475+0000",
"Handler": "lambda_function.lambda_handler",
"Runtime": "python3.6",
"Description": "Lambda FCS Function"
}
aws lambda add-permission \
--function-name LambdaFCS \
--statement-id Id-1 \
--action "lambda:InvokeFunction" \
--principal s3.amazonaws.com \
--source-arn arn:aws:s3:::cytovas-instrument-files \
--source-account 205853417430
aws s3api put-bucket-notification \
--bucket cytovas-instrument-files \
--notification-configuration file://notification.json
rm -r *info
find . | grep "tests/" | xargs rm -r
find . | grep "/tests" | xargs rm -r
find . | grep __pycache__ | xargs rm -r
find . | grep .pyc$ | xargs rm