A tool that helps keeping track of your AWS quota utilization

Overview

aws-quota-checker

A tool that helps keeping track of your AWS quota utilization. It'll determine the limits of your AWS account and compare them to the number of current resources.

Example output of aws-quota-checker

This is especially useful cause today, cloud resources are being created from all kinds of sources, e.g. IaC and Kubernetes operators. This tool will give you a head start for requesting quota increases before you hit a quota limit to prevent being stuck with a production system not being able to scale anymore.

A usual use case is to add it to your CI pipeline right after applying your IaC or run it on a regular basis. Feel free to leave a vote on this issue if you'd like to see a Prometheus exporter.

Installation

From pypi

pip install aws-quota-checker

From source

git clone [email protected]:brennerm/aws-quota-checker.git
cd aws-quota-checker
pip install .

Usage

Make sure you are logged into your AWS account (aws configure or through environment variables) or switch to the one you want to check. This account needs to have read permissions for all supported services. AWS provides a default policy called ReadOnlyAccess that contains the required permissions.

Check the help page with aws-quota-checker --help to see all available command and their documentation.

Run a single check

$ aws-quota-checker check vpc_count
AWS profile: default | AWS region: eu-central-1 | Active checks: vpc_count
VPCs per region [default/eu-central-1]: 1/5 ✓

Run all checks

$ aws-quota-checker check all
AWS profile: default | AWS region: eu-central-1 | Active checks: route53_traffic_policy_count,vpc_count,ec2_tgw_count,ec2_on_demand_standard_count,route53_health_check_count,cw_alarm_count,iam_attached_policy_per_role,asg_count,elasticbeanstalk_environment_count,s3_bucket_count,iam_attached_policy_per_user,elb_listeners_per_alb,ec2_eip_count,route53resolver_rule_count,iam_policy_version_count,elb_listeners_per_nlb,vpc_subnets_per_vpc,route53_vpcs_per_hosted_zone,cf_stack_count,iam_user_count,elb_listeners_per_clb,ni_count,dyndb_table_count,elasticbeanstalk_application_count,route53_traffic_policy_instance_count,ig_count,elb_clb_count,ec2_vpn_connection_count,route53_reusable_delegation_set_count,ebs_snapshot_count,route53_hosted_zone_count,iam_attached_policy_per_group,eks_count,am_mesh_count,elb_target_group_count,route53resolver_rule_association_count,iam_server_certificate_count,elb_alb_count,vpc_acls_per_vpc,iam_group_count,ec2_spot_standard_count,route53resolver_endpoint_count,iam_policy_count,elb_nlb_count,sg_count,route53_records_per_hosted_zone,lc_count,ecs_count,secretsmanager_secrets_count
Collecting checks  [####################################]  100%
Route53 Traffic Policies per Account [default]: 0/50 ✓
VPCs per region [default/eu-central-1]: 1/5 ✓
Transit Gateways per account [default]: 4/5 !
Running On-Demand Standard (A, C, D, H, I, M, R, T, Z) EC2 instances [default]: 0/1280 ✓
Route53 Health Checks per Account [default]: 0/200 ✓
Number of CloudWatch alarms per region [default/eu-central-1]: 0/5000 ✓
Auto Scaling groups per region [default/eu-central-1]: 0/200 ✓
Elastic Beanstalk Environments per account [default]: 0/200 ✓
Application Load Balancers per region [default/eu-central-1]: 46/50 X
...

Run a single instance check

$ aws-quota-checker check-instance vpc_acls_per_vpc vpc-0123456789
Network ACLs per VPC [default/eu-central-1/vpc-0123456789]: 0/200

Missing a quota check?

Feel free to create a new issue with the New Check label including a description which quota check you are missing.

Comments
  • Add RDS snapshot quota checks

    Add RDS snapshot quota checks

    Adds quota checks for Manual DB cluster snapshots and Manual DB instance snapshots https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Limits.html#RDS_Limits.Limits image

    $ aws-quota-checker check rds_db_snapshots,rds_db_cluster_snapshots
    AWS profile: default | AWS region: ap-southeast-2 | Active checks: rds_db_cluster_snapshots,rds_db_snapshots
    Collecting checks  [####################################]  100%
    Manual DB cluster snapshots per Region [xxx/ap-southeast-2]: 0/200 ✓
    Manual DB instance snapshots per Region [xxx/ap-southeast-2]: 152/200 ✓
    
    opened by kedoodle 4
  • Version 1.10.0

    Version 1.10.0

    Added

    • fix MaxResults=1000 for EC2 instances check (from baec59a)
    • new checks: ecsstrg_count,fargatespot_count,fargatedemand_count,iam_role_count (from #23)
    • added service/quota_code: iam_user_count
    • fixed description: s3_bucket_count
    • feature: display NOTDEF for check if limit in AWS is not default (was increased)
    • catch EndpointConnectionError
    opened by alt-dima 4
  • Paginate ebs_snapshot_count check

    Paginate ebs_snapshot_count check

    This PR fixes a memory usage issue whereby quota checks make a single boto3 call, even when supposedly paginating. Symptoms described in this comment on #31.

    • Uses the existing paginator to count the ebs_snapshot_count quota
    • Sets a default pagination page size (otherwise the paginator just gets all resources in my testing of describe_snapshots)
    • Fixes up an error log message

    See memory usage spikes to ~800 MiB on 1.10.0 and is fairly stable at ~50 MiB on this branch. image

    Before:

    • Locally
      $ time aws-quota-checker check ebs_snapshot_count
      
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: ebs_snapshot_count
      EBS Snapshots per Region [xxx/ap-southeast-2]: 34896/100000 ✓
      aws-quota-checker check ebs_snapshot_count  12.72s user 2.32s system 3% cpu 7:27.41 total
      
    • In cluster (~3 minutes):
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: 
      cf_stack_count,ebs_snapshot_count,rds_instances,s3_bucket_count
      ...
      07-Jan-22 06:10:21 [INFO] aws_quota.prometheus - refreshing current values
      07-Jan-22 06:13:39 [INFO] aws_quota.prometheus - current values refreshed
      

    After:

    • Locally:
      $ time aws-quota-checker check ebs_snapshot_count
      
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: ebs_snapshot_count
      EBS Snapshots per Region [xxx/ap-southeast-2]: 34899/100000 ✓
      aws-quota-checker check ebs_snapshot_count  12.33s user 1.36s system 16% cpu 1:25.01 total
      
    • In cluster (~1 minute):
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: 
      cf_stack_count,ebs_snapshot_count,rds_instances,s3_bucket_count
      ...
      07-Jan-22 08:47:46 [INFO] aws_quota.prometheus - refreshing current values
      07-Jan-22 08:48:55 [INFO] aws_quota.prometheus - current values refreshed
      
    opened by kedoodle 2
  • Compatibility with python3

    Compatibility with python3

    Getting the following error while running it inside a kubernetes pod or even as a container

    Traceback (most recent call last): File "/usr/local/bin/aws-quota-checker", line 7, in from aws_quota.cli import cli File "/usr/local/lib/python3.7/site-packages/aws_quota/cli.py", line 2, in from aws_quota.utils import get_account_id File "/usr/local/lib/python3.7/site-packages/aws_quota/utils.py", line 6, in def get_account_id(session: boto3.Session) -> str: File "/usr/lib64/python3.7/functools.py", line 490, in lru_cache raise TypeError('Expected maxsize to be an integer or None') TypeError: Expected maxsize to be an integer or None

    opened by rishavsharma9802 2
  • ebs_snapshot_count seems high

    ebs_snapshot_count seems high

    I'm seeing EBS Snapshots per region [default/eu-west-1]: 25780/100000 ✓ for an account with only a handful of actual snapshots. Perhaps change

    return len(self.boto_session.client('ec2').describe_snapshots()['Snapshots'])
    

    To

    return len(self.boto_session.client('ec2').describe_snapshots(OwnerIds=["self"])['Snapshots'])
    
    opened by cariaso 2
  • Bump urllib3 from 1.26.4 to 1.26.5

    Bump urllib3 from 1.26.4 to 1.26.5

    Bumps urllib3 from 1.26.4 to 1.26.5.

    Release notes

    Sourced from urllib3's releases.

    1.26.5

    :warning: IMPORTANT: urllib3 v2.0 will drop support for Python 2: Read more in the v2.0 Roadmap

    • Fixed deprecation warnings emitted in Python 3.10.
    • Updated vendored six library to 1.16.0.
    • Improved performance of URL parser when splitting the authority component.

    If you or your organization rely on urllib3 consider supporting us via GitHub Sponsors

    Changelog

    Sourced from urllib3's changelog.

    1.26.5 (2021-05-26)

    • Fixed deprecation warnings emitted in Python 3.10.
    • Updated vendored six library to 1.16.0.
    • Improved performance of URL parser when splitting the authority component.
    Commits
    • d161647 Release 1.26.5
    • 2d4a3fe Improve performance of sub-authority splitting in URL
    • 2698537 Update vendored six to 1.16.0
    • 07bed79 Fix deprecation warnings for Python 3.10 ssl module
    • d725a9b Add Python 3.10 to GitHub Actions
    • 339ad34 Use pytest==6.2.4 on Python 3.10+
    • f271c9c Apply latest Black formatting
    • 1884878 [1.26] Properly proxy EOF on the SSLTransport test suite
    • See full diff in compare view

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 1
  • [New Check] Roles in an AWS account

    [New Check] Roles in an AWS account

    The AWS console is warning us about getting close to the limit for number of IAM roles (1000). Would like to have a check for this limit.

    https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entities

    opened by charleshepner 1
  • Regression for blacklist check in 1.3.0

    Regression for blacklist check in 1.3.0

    Running check with a blacklist entry in 1.3.0 returns a usage error.

    (aws-quota-checker) [(HEAD detached at 1.3.0)] aws-quota-checker $ aws-quota-checker check 'all,!vpc_count'
    Usage: aws-quota-checker check [OPTIONS] [all|am_mesh_count|asg_count|cf_stack
                                   _count|cw_alarm_count|dyndb_table_count|ebs_sna
                                   pshot_count|ec2_eip_count|ec2_on_demand_f_count
                                   |ec2_on_demand_g_count|ec2_on_demand_inf_count|
                                   ec2_on_demand_p_count|ec2_on_demand_standard_co
                                   unt|ec2_on_demand_x_count|ec2_spot_f_count|ec2_
                                   spot_g_count|ec2_spot_inf_count|ec2_spot_p_coun
                                   t|ec2_spot_standard_count|ec2_spot_x_count|ec2_
                                   tgw_count|ec2_vpn_connection_count|ecs_count|ek
                                   s_count|elasticbeanstalk_application_count|elas
                                   ticbeanstalk_environment_count|elb_alb_count|el
                                   b_clb_count|elb_listeners_per_alb|elb_listeners
                                   _per_clb|elb_listeners_per_nlb|elb_nlb_count|el
                                   b_target_group_count|iam_attached_policy_per_gr
                                   oup|iam_attached_policy_per_role|iam_attached_p
                                   olicy_per_user|iam_group_count|iam_policy_count
                                   |iam_policy_version_count|iam_server_certificat
                                   e_count|iam_user_count|ig_count|lc_count|ni_cou
                                   nt|route53_health_check_count|route53_hosted_zo
                                   ne_count|route53_records_per_hosted_zone|route5
                                   3_reusable_delegation_set_count|route53_traffic
                                   _policy_count|route53_traffic_policy_instance_c
                                   ount|route53_vpcs_per_hosted_zone|route53resolv
                                   er_endpoint_count|route53resolver_rule_associat
                                   ion_count|route53resolver_rule_count|s3_bucket_
                                   count|secretsmanager_secrets_count|sg_count|sns
                                   _pending_subscriptions_count|sns_subscriptions_
                                   per_topic|sns_topics_count|vpc_acls_per_vpc|vpc
                                   _count|vpc_subnets_per_vpc]
    Try 'aws-quota-checker check --help' for help.
    
    Error: Invalid value for '[all|am_mesh_count|asg_count|cf_stack_count|cw_alarm_count|dyndb_table_count|ebs_snapshot_count|ec2_eip_count|ec2_on_demand_f_count|ec2_on_demand_g_count|ec2_on_demand_inf_count|ec2_on_demand_p_count|ec2_on_demand_standard_count|ec2_on_demand_x_count|ec2_spot_f_count|ec2_spot_g_count|ec2_spot_inf_count|ec2_spot_p_count|ec2_spot_standard_count|ec2_spot_x_count|ec2_tgw_count|ec2_vpn_connection_count|ecs_count|eks_count|elasticbeanstalk_application_count|elasticbeanstalk_environment_count|elb_alb_count|elb_clb_count|elb_listeners_per_alb|elb_listeners_per_clb|elb_listeners_per_nlb|elb_nlb_count|elb_target_group_count|iam_attached_policy_per_group|iam_attached_policy_per_role|iam_attached_policy_per_user|iam_group_count|iam_policy_count|iam_policy_version_count|iam_server_certificate_count|iam_user_count|ig_count|lc_count|ni_count|route53_health_check_count|route53_hosted_zone_count|route53_records_per_hosted_zone|route53_reusable_delegation_set_count|route53_traffic_policy_count|route53_traffic_policy_instance_count|route53_vpcs_per_hosted_zone|route53resolver_endpoint_count|route53resolver_rule_association_count|route53resolver_rule_count|s3_bucket_count|secretsmanager_secrets_count|sg_count|sns_pending_subscriptions_count|sns_subscriptions_per_topic|sns_topics_count|vpc_acls_per_vpc|vpc_count|vpc_subnets_per_vpc]': invalid choice: all,!vpc_count. (choose from all, am_mesh_count, asg_count, cf_stack_count, cw_alarm_count, dyndb_table_count, ebs_snapshot_count, ec2_eip_count, ec2_on_demand_f_count, ec2_on_demand_g_count, ec2_on_demand_inf_count, ec2_on_demand_p_count, ec2_on_demand_standard_count, ec2_on_demand_x_count, ec2_spot_f_count, ec2_spot_g_count, ec2_spot_inf_count, ec2_spot_p_count, ec2_spot_standard_count, ec2_spot_x_count, ec2_tgw_count, ec2_vpn_connection_count, ecs_count, eks_count, elasticbeanstalk_application_count, elasticbeanstalk_environment_count, elb_alb_count, elb_clb_count, elb_listeners_per_alb, elb_listeners_per_clb, elb_listeners_per_nlb, elb_nlb_count, elb_target_group_count, iam_attached_policy_per_group, iam_attached_policy_per_role, iam_attached_policy_per_user, iam_group_count, iam_policy_count, iam_policy_version_count, iam_server_certificate_count, iam_user_count, ig_count, lc_count, ni_count, route53_health_check_count, route53_hosted_zone_count, route53_records_per_hosted_zone, route53_reusable_delegation_set_count, route53_traffic_policy_count, route53_traffic_policy_instance_count, route53_vpcs_per_hosted_zone, route53resolver_endpoint_count, route53resolver_rule_association_count, route53resolver_rule_count, s3_bucket_count, secretsmanager_secrets_count, sg_count, sns_pending_subscriptions_count, sns_subscriptions_per_topic, sns_topics_count, vpc_acls_per_vpc, vpc_count, vpc_subnets_per_vpc)
    
    

    Expected output (1.2.0):

    (aws-quota-checker) [(HEAD detached at 1.2.0)] aws-quota-checker $ aws-quota-checker check 'all,!vpc_count'
    AWS profile: default | AWS region: None | Active checks: am_mesh_count,asg_count,cf_stack_count,cw_alarm_count,dyndb_table_count,ebs_snapshot_count,ec2_eip_count,ec2_on_demand_f_count,ec2_on_demand_g_count,ec2_on_demand_inf_count,ec2_on_demand_p_count,ec2_on_demand_standard_count,ec2_on_demand_x_count,ec2_spot_f_count,ec2_spot_g_count,ec2_spot_inf_count,ec2_spot_p_count,ec2_spot_standard_count,ec2_spot_x_count,ec2_tgw_count,ec2_vpn_connection_count,ecs_count,eks_count,elasticbeanstalk_application_count,elasticbeanstalk_environment_count,elb_alb_count,elb_clb_count,elb_listeners_per_alb,elb_listeners_per_clb,elb_listeners_per_nlb,elb_nlb_count,elb_target_group_count,iam_attached_policy_per_group,iam_attached_policy_per_role,iam_attached_policy_per_user,iam_group_count,iam_policy_count,iam_policy_version_count,iam_server_certificate_count,iam_user_count,ig_count,lc_count,ni_count,route53_health_check_count,route53_hosted_zone_count,route53_records_per_hosted_zone,route53_reusable_delegation_set_count,route53_traffic_policy_count,route53_traffic_policy_instance_count,route53_vpcs_per_hosted_zone,route53resolver_endpoint_count,route53resolver_rule_association_count,route53resolver_rule_count,s3_bucket_count,secretsmanager_secrets_count,sg_count,sns_pending_subscriptions_count,sns_subscriptions_per_topic,sns_topics_count,vpc_acls_per_vpc,vpc_subnets_per_vpc
    
    opened by philof 1
  • Add vpc endpoint and nat gateways checks.

    Add vpc endpoint and nat gateways checks.

    Add two more checks at vpc check.

    AWS profile: default | AWS region: us-west-2 | Active checks: nat_count
    Collecting checks  [####################################]  100%
    NAT gateways per Region [XXXXXXX/us-west-2]: 60/90 ✓
    
    AWS profile: default | AWS region: eu-west-2 | Active checks: vpc_endpoint
    Collecting checks  [####################################]  100%
    Gateway VPC endpoints per Region [XXXXXXX/eu-west-2]: 1/20 ✓
    ``
    opened by ppanagiotis 0
  • Build for MacM1

    Build for MacM1

    Would love to use this locally, however the Docker image is not build for linux/arm64/v8

    WARNING: The requested image's platform (linux/amd64) does not match the detected host platform (linux/arm64/v8) and no specific platform was requested
    

    Probably https://github.com/marketplace/actions/build-and-push-docker-images will help as the following ran fine

    docker buildx build --platform=linux/arm/v8 -t aws-quota-checker:macm1 .
    
    opened by mavogel 0
  • How to check more than one region at the same time?

    How to check more than one region at the same time?

    I configured the quota check with my prometheus, but it only brings me the default region of aws configure, but I need it to bring sa-east-1 and us-east-1, could you help me?

    opened by ericosuporte 0
  • Avoid TooManyRequestsException using backoff

    Avoid TooManyRequestsException using backoff

    Adds backoff package to avoid TooManyRequestsException happened with high-rated requests. https://docs.aws.amazon.com/servicequotas/2019-06-24/apireference/API_GetServiceQuota.html Now there are retries:

    12-Apr-22 16:57:04 [INFO] aws_quota.prometheus - starting /metrics endpoint on port 8080
    12-Apr-22 16:57:04 [INFO] aws_quota.prometheus - collecting checks
    12-Apr-22 16:57:22 [INFO] aws_quota.prometheus - collected 746 checks
    12-Apr-22 16:57:22 [INFO] aws_quota.prometheus - refreshing limits
    12-Apr-22 16:57:39 [INFO] backoff - Backing off _maximum(...) for 0.3s (botocore.errorfactory.TooManyRequestsException: An error occurred (TooManyRequestsException) when calling the GetServiceQuota operation: Rate exceeded)
    12-Apr-22 16:57:41 [INFO] backoff - Backing off _maximum(...) for 0.6s (botocore.errorfactory.TooManyRequestsException: An error occurred (TooManyRequestsException) when calling the GetServiceQuota operation: Rate exceeded)
    

    In addition I add traceback to logs when error still happens.

    opened by velom 1
  • CloudFormation stack count doesn't return full count

    CloudFormation stack count doesn't return full count

    Version: aws-quota-checker==1.12.0

    when running

    aws-quota-checker check cf_stack_count --profile tools --region $region
    

    I'm seeing a maximum of 100 returned for regions that have more than 100 stacks. I suspect this is some kind of paging issue.

    opened by Graham42 1
Releases(1.12.0)
  • 1.12.0(Jan 14, 2022)

  • 1.11.0(Jan 10, 2022)

  • 1.10.0(Jan 6, 2022)

    Changelog

    Added

    • add error handling for CLI result reporter
    • new check: iam_role_count
    • Prometheus metrics now have a new label that contains the quota key, see #31 for further details
    Source code(tar.gz)
    Source code(zip)
  • 1.9.0(Sep 21, 2021)

  • 1.8.0(Sep 10, 2021)

    Changelog

    Added

    • new check: rds_instances
    • new check: rds_parameter_groups
    • new check: rds_cluster_parameter_groups

    Fixed

    • iterator bug that prevented check-instance command to function

    Security

    • update several dependencies
    Source code(tar.gz)
    Source code(zip)
  • 1.7.0(May 5, 2021)

  • 1.6.0(Apr 30, 2021)

  • 1.5.0(Apr 19, 2021)

  • 1.4.1(Mar 25, 2021)

  • 1.4.0(Mar 21, 2021)

    Changelog

    Added

    • new check: vpc_rules_per_acl
    • new check: vpc_ipv4_cidr_blocks_per_vpc
    • new check: vpc_ipv6_cidr_blocks_per_vpc
    • new check: vpc_rules_per_sg
    • new check: vpc_route_tables_per_vpc
    • new check: vpc_routes_per_route_table
    • add Grafana dashboard: on-demand-ec2
    • new Prometheus metric that will expose the time it took to get the current/max value of each check
    Source code(tar.gz)
    Source code(zip)
  • 1.3.1(Mar 17, 2021)

  • 1.3.0(Mar 12, 2021)

    Changelog

    Added

    • now available as a Docker image, give it a try with docker run ghcr.io/brennerm/aws-quota-checker:latest
    • improve autocompletion support
    Source code(tar.gz)
    Source code(zip)
  • 1.2.0(Mar 9, 2021)

    Changelog

    Added

    • implement Prometheus exporter that provides access to all quota results

    Changed

    • display AWS account ID instead of profile name in check scope
    Source code(tar.gz)
    Source code(zip)
  • 1.1.0(Feb 27, 2021)

    Changelog

    Added

    • new check: ec2_on_demand_f_count
    • new check: ec2_on_demand_g_count
    • new check: ec2_on_demand_p_count
    • new check: ec2_on_demand_x_count
    • new check: ec2_on_demand_inf_count
    • new check: ec2_spot_f_count
    • new check: ec2_spot_g_count
    • new check: ec2_spot_p_count
    • new check: ec2_spot_x_count
    • new check: ec2_spot_inf_count
    • new check: sns_topics_count
    • new check: sns_pending_subscriptions_count
    • new check: sns_subscriptions_per_topic

    Changed

    • sort checks alphabetically by key
    Source code(tar.gz)
    Source code(zip)
  • 1.0.0(Feb 24, 2021)

ZenML 🙏: MLOps framework to create reproducible ML pipelines for production machine learning.

ZenML is an extensible, open-source MLOps framework to create production-ready machine learning pipelines. It has a simple, flexible syntax, is cloud and tool agnostic, and has interfaces/abstraction

ZenML 2.6k Dec 27, 2022
Sadew Jayasekara 23 Oct 21, 2022
Use an air-gapped Raspberry Pi Zero to sign for Bitcoin transactions! (and do other cool stuff)

Hello World! Build your own offline, airgapped Bitcoin transaction signing device for less than $35! Also generate seed word 24 or generate a seed phr

371 Dec 31, 2022
Script to get a notification when a product, on Amazon Warehouse, is available within a target price

Amazon_Warehouse_Scraping This script aims to scrape Amazon Warehouse and send an email back if there are products whose price matches with the target

2 Oct 25, 2021
Signs API calls to SberCloud.Advanced with AK/SK

sbercloud-api-aksk Signs API calls to SberCloud.Advanced with AK/SK This script is a courtesy of @sadpdtchr Description Sometimes there is a need to m

Peter Predtechensky 1 Nov 30, 2021
Console BeautifulDiscord theme manager

BeautifulDiscord theme manager Console script for downloading & managing Discord .css themes via BeautifulDiscord. Setup Simply run # Linux/MacOS pip3

1 Dec 15, 2022
LHXP・Official "LH - Cyber Security" Discord Leveling-Bot

LHXP・Official "LH - Cyber Security" Discord Leveling-Bot Based on nsde/NOVΛLIX Feature Overview /clear @user Requires admin permission Purges all XP

Felix・onlix 2 Mar 09, 2022
Python binding to the OneTimeSecret API

Thin Python binding for onetimesecret.com API. Unicode-safe. Description of API itself you can find here: https://onetimesecret.com/docs/api Usage:

Vladislav Stepanov 10 Jun 12, 2022
Flood discord webhooks

Webhook-Spammer Flood discord webhooks Asynchronous webhook spammer Fast & Efficient Usage - Use it with atleast 500 threads Put a valid webhook Use a

trey 1 Apr 22, 2022
Python bindings for swm-core client REST API

Python bindings for swm-core client REST API Description Sky Port is an universal bus between user software and compute resources. It can also be cons

Sky Workflows 1 Jan 01, 2022
Unofficial GoPro API Library for Python - connect to GoPro via WiFi.

GoPro API for Python Unofficial GoPro API Library for Python - connect to GoPro cameras via WiFi. Compatibility: HERO3 HERO3+ HERO4 (including HERO Se

Konrad Iturbe 1.3k Jan 01, 2023
A telegram photos or videos background remover bot

Remove BG Bot A telegram photos or videos background remover bot Variables API_HASH Your API Hash from my.telegram.org API_ID Your API ID from my.tele

ALBY 7 Dec 13, 2022
A pypi package that helps in generating discord bots.

A pypi package that helps in generating discord bots.

PineCode Corp 3 Nov 17, 2021
This is a discord bot, which tells you food recipes.

Discord Chef Bot You have a friend, familiy or other group / channel where the topic is the food? You cannot really decide what's for Saturday lunch?

2 Apr 25, 2022
A discord bot for tracking Iranian Minecraft servers and showing the statistics of them

A discord bot for tracking Iranian Minecraft servers and showing the statistics of them

MCTracker 20 Dec 30, 2022
A Simple Telegram Bot To Download And Upload Files

AquaDLBot ➠ I Can Download And Upload files To Telegram DEMO Copyright (C) 2020-2026 by [ema

Asia Argento 8 Feb 15, 2022
Source code of BobuxAdmin bot from Bobux Bot Development server.

BobuxAdmin Source code of BobuxAdmin bot from Bobux Bot Development server. The bot is written with usage of disnake and SQLite database. Functionalit

Bobux Bot Developers 3 Dec 29, 2022
Quickly and efficiently delete your entire tweet history with the help of your Twitter archive without worrying about the pointless 3200 tweet limit imposed by Twitter.

Twitter Nuke Quickly and efficiently delete your entire tweet history with the help of your Twitter archive without worrying about the puny and pointl

Mayur Bhoi 73 Dec 12, 2022
A telegram bot to read RSS feeds

Telegram bot to fetch RSS feeds This is a telegram bot that fetches RSS feeds in regular intervals and send it to you. The feed sources can be added o

Santhosh Thottingal 14 Dec 15, 2022
The accompanying code for the paper "GMAT: Global Memory Augmentation for Transformers" (Ankit Gupta and Jonathan Berant).

GMAT: Global Memory Augmentation for Transformers This repository contains the accompanying code for the paper: "GMAT: Global Memory Augmentation for

Ankit Gupta 7 Oct 21, 2021