source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(cmd, output, name): formatted = '.. code-block:: console\n\n' formatted += ' (venv)$ {c}\n'.format(c=cmd) lines = output.split('\n') if name != 'help': for idx, line in enumerate(lines): if len(line) > 100: lines[idx] = line[:100] + ' (...)' if len(lines) > 12: tmp_lines = lines[:5] + ['(...)'] + lines[-5:] if ' -l' in cmd or ' --list-defaults' in cmd: api_line = None none_line = None for line in lines: if '(API)' in line: api_line = line break for line in lines: if line.strip().endswith('None'): none_line = line break tmp_lines = lines[:5] if api_line not in tmp_lines and api_line is not None: tmp_lines = tmp_lines + ['(...)'] + [api_line] if none_line not in tmp_lines and none_line is not None: tmp_lines = tmp_lines + ['(...)'] + [none_line] tmp_lines = tmp_lines + ['(...)'] + lines[-5:] lines = tmp_lines for line in lines: if line.strip() == '': continue formatted += ' ' + line + '\n' formatted += '\n' return formatted
format_cmd_output
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cmd, output, name):\n formatted = '.. code-block:: console\\n\\n'\n formatted += ' (venv)$ {c}\\n'.format(c=cmd)\n lines = output.split('\\n')\n if name != 'help':\n for idx, line in enumerate(lines):\n if len(line) > 100:\n lines[idx] = line[:100] + ' (...)'\n if len(lines) > 12:\n tmp_lines = lines[:5] + ['(...)'] + lines[-5:]\n if ' -l' in cmd or ' --list-defaults' in cmd:\n api_line = None\n none_line = None\n for line in lines:\n if '(API)' in line:\n api_line = line\n break\n for line in lines:\n if line.strip().endswith('None'):\n none_line = line\n break\n tmp_lines = lines[:5]\n if api_line not in tmp_lines and api_line is not None:\n tmp_lines = tmp_lines + ['(...)'] + [api_line]\n if none_line not in tmp_lines and none_line is not None:\n tmp_lines = tmp_lines + ['(...)'] + [none_line]\n tmp_lines = tmp_lines + ['(...)'] + lines[-5:]\n lines = tmp_lines\n for line in lines:\n if line.strip() == '':\n continue\n formatted += ' ' + line + '\\n'\n formatted += '\\n'\n return formatted\n", "role": "user" }, { "content": "format_cmd_output", "role": "assistant" } ]
def x(): if os.environ.get('CI', None) is not None: print('Not building dynamic docs in CI environment') raise SystemExit(0) region = os.environ.get('AWS_DEFAULT_REGION', None) if region is None: raise SystemExit('ERROR: Please export AWS_DEFAULT_REGION') logger.info('Beginning build of dynamically-generated docs') logger.info('Instantiating AwsLimitChecker') c = AwsLimitChecker(region=region) build_iam_policy(c) build_limits(c) build_runner_examples()
build_docs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if os.environ.get('CI', None) is not None:\n print('Not building dynamic docs in CI environment')\n raise SystemExit(0)\n region = os.environ.get('AWS_DEFAULT_REGION', None)\n if region is None:\n raise SystemExit('ERROR: Please export AWS_DEFAULT_REGION')\n logger.info('Beginning build of dynamically-generated docs')\n logger.info('Instantiating AwsLimitChecker')\n c = AwsLimitChecker(region=region)\n build_iam_policy(c)\n build_limits(c)\n build_runner_examples()\n", "role": "user" }, { "content": "build_docs", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect() for lim in self.limits.values(): lim._reset_usage() self._find_usage_vpcs() subnet_to_az = self._find_usage_subnets() self._find_usage_ACLs() self._find_usage_route_tables() self._find_usage_gateways() self._find_usage_nat_gateways(subnet_to_az) self._find_usages_vpn_gateways() self._find_usage_network_interfaces() self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_vpcs()\n subnet_to_az = self._find_usage_subnets()\n self._find_usage_ACLs()\n self._find_usage_route_tables()\n self._find_usage_gateways()\n self._find_usage_nat_gateways(subnet_to_az)\n self._find_usages_vpn_gateways()\n self._find_usage_network_interfaces()\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): vpcs = self.conn.describe_vpcs() self.limits['VPCs']._add_current_usage(len(vpcs['Vpcs']), aws_type= 'AWS::EC2::VPC')
find_usage_vpcs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vpcs = self.conn.describe_vpcs()\n self.limits['VPCs']._add_current_usage(len(vpcs['Vpcs']), aws_type=\n 'AWS::EC2::VPC')\n", "role": "user" }, { "content": "find_usage_vpcs", "role": "assistant" } ]
def x(self): subnet_to_az = {} subnets = defaultdict(int) for subnet in self.conn.describe_subnets()['Subnets']: subnets[subnet['VpcId']] += 1 subnet_to_az[subnet['SubnetId']] = subnet['AvailabilityZone'] for vpc_id in subnets: self.limits['Subnets per VPC']._add_current_usage(subnets[vpc_id], aws_type='AWS::EC2::VPC', resource_id=vpc_id) return subnet_to_az
find_usage_subnets
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n subnet_to_az = {}\n subnets = defaultdict(int)\n for subnet in self.conn.describe_subnets()['Subnets']:\n subnets[subnet['VpcId']] += 1\n subnet_to_az[subnet['SubnetId']] = subnet['AvailabilityZone']\n for vpc_id in subnets:\n self.limits['Subnets per VPC']._add_current_usage(subnets[vpc_id],\n aws_type='AWS::EC2::VPC', resource_id=vpc_id)\n return subnet_to_az\n", "role": "user" }, { "content": "find_usage_subnets", "role": "assistant" } ]
def x(self): acls = defaultdict(int) for acl in self.conn.describe_network_acls()['NetworkAcls']: acls[acl['VpcId']] += 1 self.limits['Rules per network ACL']._add_current_usage(len(acl[ 'Entries']), aws_type='AWS::EC2::NetworkAcl', resource_id=acl[ 'NetworkAclId']) for vpc_id in acls: self.limits['Network ACLs per VPC']._add_current_usage(acls[vpc_id], aws_type='AWS::EC2::VPC', resource_id=vpc_id)
find_usage_ACLs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n acls = defaultdict(int)\n for acl in self.conn.describe_network_acls()['NetworkAcls']:\n acls[acl['VpcId']] += 1\n self.limits['Rules per network ACL']._add_current_usage(len(acl[\n 'Entries']), aws_type='AWS::EC2::NetworkAcl', resource_id=acl[\n 'NetworkAclId'])\n for vpc_id in acls:\n self.limits['Network ACLs per VPC']._add_current_usage(acls[vpc_id],\n aws_type='AWS::EC2::VPC', resource_id=vpc_id)\n", "role": "user" }, { "content": "find_usage_ACLs", "role": "assistant" } ]
def x(self): tables = defaultdict(int) for table in self.conn.describe_route_tables()['RouteTables']: tables[table['VpcId']] += 1 routes = [r for r in table['Routes'] if r['Origin'] != 'EnableVgwRoutePropagation'] self.limits['Entries per route table']._add_current_usage(len( routes), aws_type='AWS::EC2::RouteTable', resource_id=table[ 'RouteTableId']) for vpc_id in tables: self.limits['Route tables per VPC']._add_current_usage(tables[ vpc_id], aws_type='AWS::EC2::VPC', resource_id=vpc_id)
find_usage_route_tables
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n tables = defaultdict(int)\n for table in self.conn.describe_route_tables()['RouteTables']:\n tables[table['VpcId']] += 1\n routes = [r for r in table['Routes'] if r['Origin'] !=\n 'EnableVgwRoutePropagation']\n self.limits['Entries per route table']._add_current_usage(len(\n routes), aws_type='AWS::EC2::RouteTable', resource_id=table[\n 'RouteTableId'])\n for vpc_id in tables:\n self.limits['Route tables per VPC']._add_current_usage(tables[\n vpc_id], aws_type='AWS::EC2::VPC', resource_id=vpc_id)\n", "role": "user" }, { "content": "find_usage_route_tables", "role": "assistant" } ]
def x(self): gws = self.conn.describe_internet_gateways() self.limits['Internet gateways']._add_current_usage(len(gws[ 'InternetGateways']), aws_type='AWS::EC2::InternetGateway')
find_usage_gateways
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n gws = self.conn.describe_internet_gateways()\n self.limits['Internet gateways']._add_current_usage(len(gws[\n 'InternetGateways']), aws_type='AWS::EC2::InternetGateway')\n", "role": "user" }, { "content": "find_usage_gateways", "role": "assistant" } ]
def x(self, subnet_to_az): try: gws_per_az = defaultdict(int) for gw in paginate_dict(self.conn.describe_nat_gateways, alc_marker_path=['NextToken'], alc_data_path=['NatGateways'], alc_marker_param='NextToken')['NatGateways']: if gw['State'] not in ['pending', 'available']: logger.debug('Skipping NAT Gateway %s in state: %s', gw[ 'NatGatewayId'], gw['State']) continue if gw['SubnetId'] not in subnet_to_az: logger.error( 'ERROR: NAT Gateway %s in SubnetId %s, but SubnetId not found in subnet_to_az; Gateway cannot be counted!' , gw['NatGatewayId'], gw['SubnetId']) continue gws_per_az[subnet_to_az[gw['SubnetId']]] += 1 for az in sorted(gws_per_az.keys()): self.limits['NAT Gateways per AZ']._add_current_usage(gws_per_az [az], resource_id=az, aws_type='AWS::EC2::NatGateway') except ClientError: logger.error( 'Caught exception when trying to list NAT Gateways; perhaps NAT service does not exist in this region?' , exc_info=1)
find_usage_nat_gateways
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, subnet_to_az):\n try:\n gws_per_az = defaultdict(int)\n for gw in paginate_dict(self.conn.describe_nat_gateways,\n alc_marker_path=['NextToken'], alc_data_path=['NatGateways'],\n alc_marker_param='NextToken')['NatGateways']:\n if gw['State'] not in ['pending', 'available']:\n logger.debug('Skipping NAT Gateway %s in state: %s', gw[\n 'NatGatewayId'], gw['State'])\n continue\n if gw['SubnetId'] not in subnet_to_az:\n logger.error(\n 'ERROR: NAT Gateway %s in SubnetId %s, but SubnetId not found in subnet_to_az; Gateway cannot be counted!'\n , gw['NatGatewayId'], gw['SubnetId'])\n continue\n gws_per_az[subnet_to_az[gw['SubnetId']]] += 1\n for az in sorted(gws_per_az.keys()):\n self.limits['NAT Gateways per AZ']._add_current_usage(gws_per_az\n [az], resource_id=az, aws_type='AWS::EC2::NatGateway')\n except ClientError:\n logger.error(\n 'Caught exception when trying to list NAT Gateways; perhaps NAT service does not exist in this region?'\n , exc_info=1)\n", "role": "user" }, { "content": "find_usage_nat_gateways", "role": "assistant" } ]
def x(self): vpngws = self.conn.describe_vpn_gateways(Filters=[{'Name': 'state', 'Values': ['available', 'pending']}])['VpnGateways'] self.limits['Virtual private gateways']._add_current_usage(len(vpngws), aws_type='AWS::EC2::VPNGateway')
find_usages_vpn_gateways
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vpngws = self.conn.describe_vpn_gateways(Filters=[{'Name': 'state',\n 'Values': ['available', 'pending']}])['VpnGateways']\n self.limits['Virtual private gateways']._add_current_usage(len(vpngws),\n aws_type='AWS::EC2::VPNGateway')\n", "role": "user" }, { "content": "find_usages_vpn_gateways", "role": "assistant" } ]
def x(self): enis = paginate_dict(self.conn.describe_network_interfaces, alc_marker_path=['NextToken'], alc_data_path=['NetworkInterfaces'], alc_marker_param='NextToken') self.limits['Network interfaces per Region']._add_current_usage(len( enis['NetworkInterfaces']), aws_type='AWS::EC2::NetworkInterface')
find_usage_network_interfaces
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n enis = paginate_dict(self.conn.describe_network_interfaces,\n alc_marker_path=['NextToken'], alc_data_path=['NetworkInterfaces'],\n alc_marker_param='NextToken')\n self.limits['Network interfaces per Region']._add_current_usage(len(\n enis['NetworkInterfaces']), aws_type='AWS::EC2::NetworkInterface')\n", "role": "user" }, { "content": "find_usage_network_interfaces", "role": "assistant" } ]
def x(self): self.connect() self.connect_resource() logger.info('Querying EC2 DescribeAccountAttributes for limits') attribs = self.conn.describe_account_attributes() for attrib in attribs['AccountAttributes']: if attrib['AttributeName'] == 'max-instances': val = attrib['AttributeValues'][0]['AttributeValue'] if int(val) * 5 > DEFAULT_ENI_LIMIT: limit_name = 'Network interfaces per Region' self.limits[limit_name]._set_api_limit(int(val) * 5) logger.debug('Done setting limits from API')
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.connect()\n self.connect_resource()\n logger.info('Querying EC2 DescribeAccountAttributes for limits')\n attribs = self.conn.describe_account_attributes()\n for attrib in attribs['AccountAttributes']:\n if attrib['AttributeName'] == 'max-instances':\n val = attrib['AttributeValues'][0]['AttributeValue']\n if int(val) * 5 > DEFAULT_ENI_LIMIT:\n limit_name = 'Network interfaces per Region'\n self.limits[limit_name]._set_api_limit(int(val) * 5)\n logger.debug('Done setting limits from API')\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect() for lim in self.limits.values(): lim._reset_usage() resp = self.conn.get_directory_limits() directory_limits = resp['DirectoryLimits'] self.limits['CloudOnlyDirectories']._add_current_usage(directory_limits ['CloudOnlyDirectoriesCurrentCount'], aws_type='AWS::DirectoryService') self.limits['CloudOnlyMicrosoftAD']._add_current_usage(directory_limits ['CloudOnlyMicrosoftADCurrentCount'], aws_type='AWS::DirectoryService') self.limits['ConnectedDirectories']._add_current_usage(directory_limits ['ConnectedDirectoriesCurrentCount'], aws_type='AWS::DirectoryService') self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n resp = self.conn.get_directory_limits()\n directory_limits = resp['DirectoryLimits']\n self.limits['CloudOnlyDirectories']._add_current_usage(directory_limits\n ['CloudOnlyDirectoriesCurrentCount'], aws_type='AWS::DirectoryService')\n self.limits['CloudOnlyMicrosoftAD']._add_current_usage(directory_limits\n ['CloudOnlyMicrosoftADCurrentCount'], aws_type='AWS::DirectoryService')\n self.limits['ConnectedDirectories']._add_current_usage(directory_limits\n ['ConnectedDirectoriesCurrentCount'], aws_type='AWS::DirectoryService')\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): logger.debug('Setting DirectoryService limits from API') self.connect() resp = self.conn.get_directory_limits() directory_limits = resp['DirectoryLimits'] self.limits['CloudOnlyDirectories']._set_api_limit(directory_limits[ 'CloudOnlyDirectoriesLimit']) self.limits['CloudOnlyMicrosoftAD']._set_api_limit(directory_limits[ 'CloudOnlyMicrosoftADLimit']) self.limits['ConnectedDirectories']._set_api_limit(directory_limits[ 'ConnectedDirectoriesLimit'])
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Setting DirectoryService limits from API')\n self.connect()\n resp = self.conn.get_directory_limits()\n directory_limits = resp['DirectoryLimits']\n self.limits['CloudOnlyDirectories']._set_api_limit(directory_limits[\n 'CloudOnlyDirectoriesLimit'])\n self.limits['CloudOnlyMicrosoftAD']._set_api_limit(directory_limits[\n 'CloudOnlyMicrosoftADLimit'])\n self.limits['ConnectedDirectories']._set_api_limit(directory_limits[\n 'ConnectedDirectoriesLimit'])\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self): ignore_statuses = ['DELETE_COMPLETE'] logger.debug('Checking usage for service %s', self.service_name) self.connect() for lim in self.limits.values(): lim._reset_usage() count = 0 paginator = self.conn.get_paginator('describe_stacks') iter = paginator.paginate() for page in iter: for stk in page['Stacks']: if stk['StackStatus'] not in ignore_statuses: count += 1 self.limits['Stacks']._add_current_usage(count, aws_type= 'AWS::CloudFormation::Stack') self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n ignore_statuses = ['DELETE_COMPLETE']\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n count = 0\n paginator = self.conn.get_paginator('describe_stacks')\n iter = paginator.paginate()\n for page in iter:\n for stk in page['Stacks']:\n if stk['StackStatus'] not in ignore_statuses:\n count += 1\n self.limits['Stacks']._add_current_usage(count, aws_type=\n 'AWS::CloudFormation::Stack')\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): logger.debug('Setting CloudFormation limits from API') self.connect() resp = self.conn.describe_account_limits() for lim in resp['AccountLimits']: if lim['Name'] == 'StackLimit': self.limits['Stacks']._set_api_limit(lim['Value']) continue logger.debug('API response contained unknown CloudFormation limit: %s', lim['Name'])
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Setting CloudFormation limits from API')\n self.connect()\n resp = self.conn.describe_account_limits()\n for lim in resp['AccountLimits']:\n if lim['Name'] == 'StackLimit':\n self.limits['Stacks']._set_api_limit(lim['Value'])\n continue\n logger.debug('API response contained unknown CloudFormation limit: %s',\n lim['Name'])\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self, limit_value, override_ta=True): self.limit_override = limit_value self.override_ta = override_ta
set_limit_override
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, limit_value, override_ta=True):\n self.limit_override = limit_value\n self.override_ta = override_ta\n", "role": "user" }, { "content": "set_limit_override", "role": "assistant" } ]
def x(self): if self.limit_override is not None and (self.override_ta is True or self.ta_limit is None and self.ta_unlimited is False): return SOURCE_OVERRIDE if self.api_limit is not None: return SOURCE_API if self.ta_limit is not None or self.ta_unlimited is True: return SOURCE_TA return SOURCE_DEFAULT
get_limit_source
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.limit_override is not None and (self.override_ta is True or \n self.ta_limit is None and self.ta_unlimited is False):\n return SOURCE_OVERRIDE\n if self.api_limit is not None:\n return SOURCE_API\n if self.ta_limit is not None or self.ta_unlimited is True:\n return SOURCE_TA\n return SOURCE_DEFAULT\n", "role": "user" }, { "content": "get_limit_source", "role": "assistant" } ]
def x(self): limit_type = self.get_limit_source() if limit_type == SOURCE_OVERRIDE: return self.limit_override elif limit_type == SOURCE_API: return self.api_limit elif limit_type == SOURCE_TA: if self.ta_unlimited is True: return None return self.ta_limit return self.default_limit
get_limit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n limit_type = self.get_limit_source()\n if limit_type == SOURCE_OVERRIDE:\n return self.limit_override\n elif limit_type == SOURCE_API:\n return self.api_limit\n elif limit_type == SOURCE_TA:\n if self.ta_unlimited is True:\n return None\n return self.ta_limit\n return self.default_limit\n", "role": "user" }, { "content": "get_limit", "role": "assistant" } ]
def x(self): if len(self._current_usage) == 0: return '<unknown>' if len(self._current_usage) == 1: return str(self._current_usage[0]) lim_str = ', '.join([str(x) for x in sorted(self._current_usage)]) s = 'max: {m} ({l})'.format(m=str(max(self._current_usage)), l=lim_str) return s
get_current_usage_str
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if len(self._current_usage) == 0:\n return '<unknown>'\n if len(self._current_usage) == 1:\n return str(self._current_usage[0])\n lim_str = ', '.join([str(x) for x in sorted(self._current_usage)])\n s = 'max: {m} ({l})'.format(m=str(max(self._current_usage)), l=lim_str)\n return s\n", "role": "user" }, { "content": "get_current_usage_str", "role": "assistant" } ]
def x(self, value, maximum=None, resource_id=None, aws_type=None): self._current_usage.append(AwsLimitUsage(self, value, maximum=maximum, resource_id=resource_id, aws_type=aws_type))
add_current_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, value, maximum=None, resource_id=None, aws_type=None):\n self._current_usage.append(AwsLimitUsage(self, value, maximum=maximum,\n resource_id=resource_id, aws_type=aws_type))\n", "role": "user" }, { "content": "add_current_usage", "role": "assistant" } ]
def x(self): t = (self.warn_count, self.warn_percent or self.def_warning_threshold, self.crit_count, self.crit_percent or self.def_critical_threshold) return t
get_thresholds
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n t = (self.warn_count, self.warn_percent or self.def_warning_threshold,\n self.crit_count, self.crit_percent or self.def_critical_threshold)\n return t\n", "role": "user" }, { "content": "get_thresholds", "role": "assistant" } ]
def x(self, warn_percent=None, warn_count=None, crit_percent=None, crit_count=None): self.warn_percent = warn_percent self.warn_count = warn_count self.crit_percent = crit_percent self.crit_count = crit_count
set_threshold_override
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, warn_percent=None, warn_count=None, crit_percent=None,\n crit_count=None):\n self.warn_percent = warn_percent\n self.warn_count = warn_count\n self.crit_percent = crit_percent\n self.crit_count = crit_count\n", "role": "user" }, { "content": "set_threshold_override", "role": "assistant" } ]
def x(self): warn_int, warn_pct, crit_int, crit_pct = self._get_thresholds() all_ok = True for u in self._current_usage: usage = u.get_value() limit = u.get_maximum() or self.get_limit() if limit is None: continue pct = usage / (limit * 1.0) * 100 if crit_int is not None and usage >= crit_int: self._criticals.append(u) all_ok = False elif pct >= crit_pct: self._criticals.append(u) all_ok = False elif warn_int is not None and usage >= warn_int: self._warnings.append(u) all_ok = False elif pct >= warn_pct: self._warnings.append(u) all_ok = False return all_ok
check_thresholds
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n warn_int, warn_pct, crit_int, crit_pct = self._get_thresholds()\n all_ok = True\n for u in self._current_usage:\n usage = u.get_value()\n limit = u.get_maximum() or self.get_limit()\n if limit is None:\n continue\n pct = usage / (limit * 1.0) * 100\n if crit_int is not None and usage >= crit_int:\n self._criticals.append(u)\n all_ok = False\n elif pct >= crit_pct:\n self._criticals.append(u)\n all_ok = False\n elif warn_int is not None and usage >= warn_int:\n self._warnings.append(u)\n all_ok = False\n elif pct >= warn_pct:\n self._warnings.append(u)\n all_ok = False\n return all_ok\n", "role": "user" }, { "content": "check_thresholds", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect() for lim in self.limits.values(): lim._reset_usage() self._find_usage_nodes() self._find_usage_subnet_groups() self._find_usage_parameter_groups() self._find_usage_security_groups() self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_nodes()\n self._find_usage_subnet_groups()\n self._find_usage_parameter_groups()\n self._find_usage_security_groups()\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): nodes = 0 paginator = self.conn.get_paginator('describe_cache_clusters') for page in paginator.paginate(ShowCacheNodeInfo=True): for cluster in page['CacheClusters']: try: num_nodes = len(cluster['CacheNodes']) except (IndexError, TypeError, KeyError): logger.debug( "Cache Cluster '%s' returned dict with CacheNodes None", cluster['CacheClusterId']) num_nodes = cluster['NumCacheNodes'] nodes += num_nodes if cluster['Engine'] == 'memcached': self.limits['Nodes per Cluster']._add_current_usage(num_nodes, aws_type='AWS::ElastiCache::CacheCluster', resource_id= cluster['CacheClusterId']) self.limits['Nodes']._add_current_usage(nodes, aws_type= 'AWS::ElastiCache::CacheNode')
find_usage_nodes
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n nodes = 0\n paginator = self.conn.get_paginator('describe_cache_clusters')\n for page in paginator.paginate(ShowCacheNodeInfo=True):\n for cluster in page['CacheClusters']:\n try:\n num_nodes = len(cluster['CacheNodes'])\n except (IndexError, TypeError, KeyError):\n logger.debug(\n \"Cache Cluster '%s' returned dict with CacheNodes None\",\n cluster['CacheClusterId'])\n num_nodes = cluster['NumCacheNodes']\n nodes += num_nodes\n if cluster['Engine'] == 'memcached':\n self.limits['Nodes per Cluster']._add_current_usage(num_nodes,\n aws_type='AWS::ElastiCache::CacheCluster', resource_id=\n cluster['CacheClusterId'])\n self.limits['Nodes']._add_current_usage(nodes, aws_type=\n 'AWS::ElastiCache::CacheNode')\n", "role": "user" }, { "content": "find_usage_nodes", "role": "assistant" } ]
def x(self): num_groups = 0 paginator = self.conn.get_paginator('describe_cache_parameter_groups') for page in paginator.paginate(): for group in page['CacheParameterGroups']: num_groups += 1 self.limits['Parameter Groups']._add_current_usage(num_groups, aws_type ='AWS::ElastiCache::ParameterGroup')
find_usage_parameter_groups
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n num_groups = 0\n paginator = self.conn.get_paginator('describe_cache_parameter_groups')\n for page in paginator.paginate():\n for group in page['CacheParameterGroups']:\n num_groups += 1\n self.limits['Parameter Groups']._add_current_usage(num_groups, aws_type\n ='AWS::ElastiCache::ParameterGroup')\n", "role": "user" }, { "content": "find_usage_parameter_groups", "role": "assistant" } ]
def x(self): num_groups = 0 try: paginator = self.conn.get_paginator('describe_cache_security_groups') for page in paginator.paginate(): for secgroup in page['CacheSecurityGroups']: num_groups += 1 except ClientError as ex: if ex.response['Error']['Code'] != 'InvalidParameterValue': raise ex logger.debug( 'caught ClientError checking ElastiCache security groups (account without EC2-Classic?)' ) self.limits['Security Groups']._add_current_usage(num_groups, aws_type= 'WS::ElastiCache::SecurityGroup')
find_usage_security_groups
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n num_groups = 0\n try:\n paginator = self.conn.get_paginator('describe_cache_security_groups')\n for page in paginator.paginate():\n for secgroup in page['CacheSecurityGroups']:\n num_groups += 1\n except ClientError as ex:\n if ex.response['Error']['Code'] != 'InvalidParameterValue':\n raise ex\n logger.debug(\n 'caught ClientError checking ElastiCache security groups (account without EC2-Classic?)'\n )\n self.limits['Security Groups']._add_current_usage(num_groups, aws_type=\n 'WS::ElastiCache::SecurityGroup')\n", "role": "user" }, { "content": "find_usage_security_groups", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) for lim in self.limits.values(): lim._reset_usage() self._update_limits_from_api() self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n for lim in self.limits.values():\n lim._reset_usage()\n self._update_limits_from_api()\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): if self.limits != {}: return self.limits limits = {} limits['Groups'] = AwsLimit('Groups', self, 300, self.warning_threshold, self.critical_threshold, limit_type='AWS::IAM::Group') limits['Users'] = AwsLimit('Users', self, 5000, self.warning_threshold, self.critical_threshold, limit_type='AWS::IAM::User') limits['Roles'] = AwsLimit('Roles', self, 1000, self.warning_threshold, self.critical_threshold, limit_type='AWS::IAM::Role') limits['Instance profiles'] = AwsLimit('Instance profiles', self, 1000, self.warning_threshold, self.critical_threshold, limit_type= 'AWS::IAM::InstanceProfile') limits['Server certificates'] = AwsLimit('Server certificates', self, 20, self.warning_threshold, self.critical_threshold, limit_type= 'AWS::IAM::ServerCertificate') limits['Policies'] = AwsLimit('Policies', self, 1500, self. warning_threshold, self.critical_threshold, limit_type= 'AWS::IAM::Policy') limits['Policy Versions In Use'] = AwsLimit('Policy Versions In Use', self, 10000, self.warning_threshold, self.critical_threshold, limit_type='AWS::IAM::ServerCertificate') self.limits = limits return limits
get_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.limits != {}:\n return self.limits\n limits = {}\n limits['Groups'] = AwsLimit('Groups', self, 300, self.warning_threshold,\n self.critical_threshold, limit_type='AWS::IAM::Group')\n limits['Users'] = AwsLimit('Users', self, 5000, self.warning_threshold,\n self.critical_threshold, limit_type='AWS::IAM::User')\n limits['Roles'] = AwsLimit('Roles', self, 1000, self.warning_threshold,\n self.critical_threshold, limit_type='AWS::IAM::Role')\n limits['Instance profiles'] = AwsLimit('Instance profiles', self, 1000,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::IAM::InstanceProfile')\n limits['Server certificates'] = AwsLimit('Server certificates', self, \n 20, self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::IAM::ServerCertificate')\n limits['Policies'] = AwsLimit('Policies', self, 1500, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::IAM::Policy')\n limits['Policy Versions In Use'] = AwsLimit('Policy Versions In Use',\n self, 10000, self.warning_threshold, self.critical_threshold,\n limit_type='AWS::IAM::ServerCertificate')\n self.limits = limits\n return limits\n", "role": "user" }, { "content": "get_limits", "role": "assistant" } ]
def x(self): self.connect_resource() summary = self.resource_conn.AccountSummary() for k, v in sorted(summary.summary_map.items()): if k in self.API_TO_LIMIT_NAME: lname = self.API_TO_LIMIT_NAME[k] self.limits[lname]._add_current_usage(v) elif k.endswith('Quota') and k[:-5] in self.API_TO_LIMIT_NAME: lname = self.API_TO_LIMIT_NAME[k[:-5]] self.limits[lname]._set_api_limit(v) else: logger.debug('Ignoring IAM AccountSummary attribute: %s', k)
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.connect_resource()\n summary = self.resource_conn.AccountSummary()\n for k, v in sorted(summary.summary_map.items()):\n if k in self.API_TO_LIMIT_NAME:\n lname = self.API_TO_LIMIT_NAME[k]\n self.limits[lname]._add_current_usage(v)\n elif k.endswith('Quota') and k[:-5] in self.API_TO_LIMIT_NAME:\n lname = self.API_TO_LIMIT_NAME[k[:-5]]\n self.limits[lname]._set_api_limit(v)\n else:\n logger.debug('Ignoring IAM AccountSummary attribute: %s', k)\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self, argv): desc = ( 'Report on AWS service limits and usage via boto3, optionally warn about any services with usage nearing or exceeding their limits. For further help, see <http://awslimitchecker.readthedocs.org/>' ) epilog = ( 'awslimitchecker is AGPLv3-licensed Free Software. Anyone using this program, even remotely over a network, is entitled to a copy of the source code. Use `--version` for information on the source code location.' ) p = argparse.ArgumentParser(description=desc, epilog=epilog) p.add_argument('-S', '--service', action='store', nargs='*', help= 'perform action for only the specified service name; see -s|--list-services for valid names' ) p.add_argument('--skip-service', action='append', default=[], dest= 'skip_service', help= 'avoid performing actions for the specified service name; see -s|--list-services for valid names' ) p.add_argument('--skip-check', action='append', default=[], dest= 'skip_check', help= 'avoid performing actions for the specified check name') p.add_argument('-s', '--list-services', action='store_true', default= False, help= 'print a list of all AWS service types that awslimitchecker knows how to check' ) p.add_argument('-l', '--list-limits', action='store_true', default= False, help= 'print all AWS effective limits in "service_name/limit_name" format') p.add_argument('--list-defaults', action='store_true', default=False, help='print all AWS default limits in "service_name/limit_name" format' ) p.add_argument('-L', '--limit', action=StoreKeyValuePair, help= 'override a single AWS limit, specified in "service_name/limit_name=value" format; can be specified multiple times.' ) p.add_argument('-u', '--show-usage', action='store_true', default=False, help= 'find and print the current usage of all AWS services with known limits' ) p.add_argument('--iam-policy', action='store_true', default=False, help = 'output a JSON serialized IAM Policy listing the required permissions for awslimitchecker to run correctly.' ) p.add_argument('-W', '--warning-threshold', action='store', type=int, default=80, help= 'default warning threshold (percentage of limit); default: 80') p.add_argument('-C', '--critical-threshold', action='store', type=int, default=99, help= 'default critical threshold (percentage of limit); default: 99') p.add_argument('-P', '--profile', action='store', dest='profile_name', type=str, default=None, help= 'Name of profile in the AWS cross-sdk credentials file to use credentials from; similar to the corresponding awscli option' ) p.add_argument('-A', '--sts-account-id', action='store', type=str, default=None, help= 'for use with STS, the Account ID of the destination account (account to assume a role in)' ) p.add_argument('-R', '--sts-account-role', action='store', type=str, default=None, help= 'for use with STS, the name of the IAM role to assume') p.add_argument('-E', '--external-id', action='store', type=str, default =None, help='External ID to use when assuming a role via STS') p.add_argument('-M', '--mfa-serial-number', action='store', type=str, default=None, help= 'MFA Serial Number to use when assuming a role via STS') p.add_argument('-T', '--mfa-token', action='store', type=str, default= None, help='MFA Token to use when assuming a role via STS') p.add_argument('-r', '--region', action='store', type=str, default=None, help='AWS region name to connect to; required for STS') p.add_argument('--skip-ta', action='store_true', default=False, help= 'do not attempt to pull *any* information on limits from Trusted Advisor' ) g = p.add_mutually_exclusive_group() g.add_argument('--ta-refresh-wait', dest='ta_refresh_wait', action= 'store_true', default=False, help= 'If applicable, refresh all Trusted Advisor limit-related checks, and wait for the refresh to complete before continuing.' ) g.add_argument('--ta-refresh-trigger', dest='ta_refresh_trigger', action='store_true', default=False, help= 'If applicable, trigger refreshes for all Trusted Advisor limit-related checks, but do not wait for them to finish refreshing; trigger the refresh and continue on (useful to ensure checks are refreshed before the next scheduled run).' ) g.add_argument('--ta-refresh-older', dest='ta_refresh_older', action= 'store', type=int, default=None, help= 'If applicable, trigger refreshes for all Trusted Advisor limit-related checks with results more than this number of seconds old. Wait for the refresh to complete before continuing.' ) p.add_argument('--ta-refresh-timeout', dest='ta_refresh_timeout', type= int, action='store', default=None, help= 'If waiting for TA checks to refresh, wait up to this number of seconds before continuing on anyway.' ) p.add_argument('--no-color', action='store_true', default=False, help= 'do not colorize output') p.add_argument('--no-check-version', action='store_false', default=True, dest='check_version', help='do not check latest version at startup') p.add_argument('-v', '--verbose', dest='verbose', action='count', default=0, help='verbose output. specify twice for debug-level output.' ) p.add_argument('-V', '--version', dest='version', action='store_true', default=False, help='print version number and exit.') args = p.parse_args(argv) args.ta_refresh_mode = None if args.ta_refresh_wait: args.ta_refresh_mode = 'wait' elif args.ta_refresh_trigger: args.ta_refresh_mode = 'trigger' elif args.ta_refresh_older is not None: args.ta_refresh_mode = args.ta_refresh_older return args
parse_args
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, argv):\n desc = (\n 'Report on AWS service limits and usage via boto3, optionally warn about any services with usage nearing or exceeding their limits. For further help, see <http://awslimitchecker.readthedocs.org/>'\n )\n epilog = (\n 'awslimitchecker is AGPLv3-licensed Free Software. Anyone using this program, even remotely over a network, is entitled to a copy of the source code. Use `--version` for information on the source code location.'\n )\n p = argparse.ArgumentParser(description=desc, epilog=epilog)\n p.add_argument('-S', '--service', action='store', nargs='*', help=\n 'perform action for only the specified service name; see -s|--list-services for valid names'\n )\n p.add_argument('--skip-service', action='append', default=[], dest=\n 'skip_service', help=\n 'avoid performing actions for the specified service name; see -s|--list-services for valid names'\n )\n p.add_argument('--skip-check', action='append', default=[], dest=\n 'skip_check', help=\n 'avoid performing actions for the specified check name')\n p.add_argument('-s', '--list-services', action='store_true', default=\n False, help=\n 'print a list of all AWS service types that awslimitchecker knows how to check'\n )\n p.add_argument('-l', '--list-limits', action='store_true', default=\n False, help=\n 'print all AWS effective limits in \"service_name/limit_name\" format')\n p.add_argument('--list-defaults', action='store_true', default=False,\n help='print all AWS default limits in \"service_name/limit_name\" format'\n )\n p.add_argument('-L', '--limit', action=StoreKeyValuePair, help=\n 'override a single AWS limit, specified in \"service_name/limit_name=value\" format; can be specified multiple times.'\n )\n p.add_argument('-u', '--show-usage', action='store_true', default=False,\n help=\n 'find and print the current usage of all AWS services with known limits'\n )\n p.add_argument('--iam-policy', action='store_true', default=False, help\n =\n 'output a JSON serialized IAM Policy listing the required permissions for awslimitchecker to run correctly.'\n )\n p.add_argument('-W', '--warning-threshold', action='store', type=int,\n default=80, help=\n 'default warning threshold (percentage of limit); default: 80')\n p.add_argument('-C', '--critical-threshold', action='store', type=int,\n default=99, help=\n 'default critical threshold (percentage of limit); default: 99')\n p.add_argument('-P', '--profile', action='store', dest='profile_name',\n type=str, default=None, help=\n 'Name of profile in the AWS cross-sdk credentials file to use credentials from; similar to the corresponding awscli option'\n )\n p.add_argument('-A', '--sts-account-id', action='store', type=str,\n default=None, help=\n 'for use with STS, the Account ID of the destination account (account to assume a role in)'\n )\n p.add_argument('-R', '--sts-account-role', action='store', type=str,\n default=None, help=\n 'for use with STS, the name of the IAM role to assume')\n p.add_argument('-E', '--external-id', action='store', type=str, default\n =None, help='External ID to use when assuming a role via STS')\n p.add_argument('-M', '--mfa-serial-number', action='store', type=str,\n default=None, help=\n 'MFA Serial Number to use when assuming a role via STS')\n p.add_argument('-T', '--mfa-token', action='store', type=str, default=\n None, help='MFA Token to use when assuming a role via STS')\n p.add_argument('-r', '--region', action='store', type=str, default=None,\n help='AWS region name to connect to; required for STS')\n p.add_argument('--skip-ta', action='store_true', default=False, help=\n 'do not attempt to pull *any* information on limits from Trusted Advisor'\n )\n g = p.add_mutually_exclusive_group()\n g.add_argument('--ta-refresh-wait', dest='ta_refresh_wait', action=\n 'store_true', default=False, help=\n 'If applicable, refresh all Trusted Advisor limit-related checks, and wait for the refresh to complete before continuing.'\n )\n g.add_argument('--ta-refresh-trigger', dest='ta_refresh_trigger',\n action='store_true', default=False, help=\n 'If applicable, trigger refreshes for all Trusted Advisor limit-related checks, but do not wait for them to finish refreshing; trigger the refresh and continue on (useful to ensure checks are refreshed before the next scheduled run).'\n )\n g.add_argument('--ta-refresh-older', dest='ta_refresh_older', action=\n 'store', type=int, default=None, help=\n 'If applicable, trigger refreshes for all Trusted Advisor limit-related checks with results more than this number of seconds old. Wait for the refresh to complete before continuing.'\n )\n p.add_argument('--ta-refresh-timeout', dest='ta_refresh_timeout', type=\n int, action='store', default=None, help=\n 'If waiting for TA checks to refresh, wait up to this number of seconds before continuing on anyway.'\n )\n p.add_argument('--no-color', action='store_true', default=False, help=\n 'do not colorize output')\n p.add_argument('--no-check-version', action='store_false', default=True,\n dest='check_version', help='do not check latest version at startup')\n p.add_argument('-v', '--verbose', dest='verbose', action='count',\n default=0, help='verbose output. specify twice for debug-level output.'\n )\n p.add_argument('-V', '--version', dest='version', action='store_true',\n default=False, help='print version number and exit.')\n args = p.parse_args(argv)\n args.ta_refresh_mode = None\n if args.ta_refresh_wait:\n args.ta_refresh_mode = 'wait'\n elif args.ta_refresh_trigger:\n args.ta_refresh_mode = 'trigger'\n elif args.ta_refresh_older is not None:\n args.ta_refresh_mode = args.ta_refresh_older\n return args\n", "role": "user" }, { "content": "parse_args", "role": "assistant" } ]
def x(self, service_name, limit, crits, warns): usage_str = '' if len(crits) > 0: tmp = 'CRITICAL: ' tmp += ', '.join([str(x) for x in sorted(crits)]) usage_str += self.color_output(tmp, 'red') if len(warns) > 0: if len(crits) > 0: usage_str += ' ' tmp = 'WARNING: ' tmp += ', '.join([str(x) for x in sorted(warns)]) usage_str += self.color_output(tmp, 'yellow') k = '{s}/{l}'.format(s=service_name, l=limit.name) v = '(limit {v}) {u}'.format(v=limit.get_limit(), u=usage_str) return k, v
print_issue
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, service_name, limit, crits, warns):\n usage_str = ''\n if len(crits) > 0:\n tmp = 'CRITICAL: '\n tmp += ', '.join([str(x) for x in sorted(crits)])\n usage_str += self.color_output(tmp, 'red')\n if len(warns) > 0:\n if len(crits) > 0:\n usage_str += ' '\n tmp = 'WARNING: '\n tmp += ', '.join([str(x) for x in sorted(warns)])\n usage_str += self.color_output(tmp, 'yellow')\n k = '{s}/{l}'.format(s=service_name, l=limit.name)\n v = '(limit {v}) {u}'.format(v=limit.get_limit(), u=usage_str)\n return k, v\n", "role": "user" }, { "content": "print_issue", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) for lim in self.limits.values(): lim._reset_usage() elb_usage = self._find_usage_elbv1() alb_usage = self._find_usage_elbv2() logger.debug('ELBs in use: %d, ALBs in use: %d', elb_usage, alb_usage) self.limits['Active load balancers']._add_current_usage(elb_usage + alb_usage, aws_type='AWS::ElasticLoadBalancing::LoadBalancer') self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n for lim in self.limits.values():\n lim._reset_usage()\n elb_usage = self._find_usage_elbv1()\n alb_usage = self._find_usage_elbv2()\n logger.debug('ELBs in use: %d, ALBs in use: %d', elb_usage, alb_usage)\n self.limits['Active load balancers']._add_current_usage(elb_usage +\n alb_usage, aws_type='AWS::ElasticLoadBalancing::LoadBalancer')\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for ELBv1') self.connect() lbs = paginate_dict(self.conn.describe_load_balancers, alc_marker_path= ['NextMarker'], alc_data_path=['LoadBalancerDescriptions'], alc_marker_param='Marker') for lb in lbs['LoadBalancerDescriptions']: self.limits['Listeners per load balancer']._add_current_usage(len( lb['ListenerDescriptions']), aws_type= 'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[ 'LoadBalancerName']) self.limits['Registered instances per load balancer' ]._add_current_usage(len(lb['Instances']), aws_type= 'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[ 'LoadBalancerName']) logger.debug('Done with ELBv1 usage') return len(lbs['LoadBalancerDescriptions'])
find_usage_elbv1
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for ELBv1')\n self.connect()\n lbs = paginate_dict(self.conn.describe_load_balancers, alc_marker_path=\n ['NextMarker'], alc_data_path=['LoadBalancerDescriptions'],\n alc_marker_param='Marker')\n for lb in lbs['LoadBalancerDescriptions']:\n self.limits['Listeners per load balancer']._add_current_usage(len(\n lb['ListenerDescriptions']), aws_type=\n 'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[\n 'LoadBalancerName'])\n self.limits['Registered instances per load balancer'\n ]._add_current_usage(len(lb['Instances']), aws_type=\n 'AWS::ElasticLoadBalancing::LoadBalancer', resource_id=lb[\n 'LoadBalancerName'])\n logger.debug('Done with ELBv1 usage')\n return len(lbs['LoadBalancerDescriptions'])\n", "role": "user" }, { "content": "find_usage_elbv1", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for ELBv2') conn2 = client('elbv2', config=Config(retries={'max_attempts': ELBV2_MAX_RETRY_ATTEMPTS}), **self._boto3_connection_kwargs) logger.debug( 'Connected to %s in region %s (with max retry attempts overridden to %d)' , 'elbv2', conn2._client_config.region_name, ELBV2_MAX_RETRY_ATTEMPTS) tgroups = paginate_dict(conn2.describe_target_groups, alc_marker_path=[ 'NextMarker'], alc_data_path=['TargetGroups'], alc_marker_param= 'Marker') self.limits['Target groups']._add_current_usage(len(tgroups[ 'TargetGroups']), aws_type='AWS::ElasticLoadBalancingV2::TargetGroup') lbs = paginate_dict(conn2.describe_load_balancers, alc_marker_path=[ 'NextMarker'], alc_data_path=['LoadBalancers'], alc_marker_param= 'Marker') logger.debug('Checking usage for each of %d ALBs', len(lbs[ 'LoadBalancers'])) alb_count = 0 nlb_count = 0 for lb in lbs['LoadBalancers']: if lb.get('Type') == 'network': nlb_count += 1 else: alb_count += 1 self._update_usage_for_alb(conn2, lb['LoadBalancerArn'], lb[ 'LoadBalancerName']) self.limits['Network load balancers']._add_current_usage(nlb_count, aws_type='AWS::ElasticLoadBalancing::NetworkLoadBalancer') logger.debug('Done with ELBv2 usage') return alb_count
find_usage_elbv2
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for ELBv2')\n conn2 = client('elbv2', config=Config(retries={'max_attempts':\n ELBV2_MAX_RETRY_ATTEMPTS}), **self._boto3_connection_kwargs)\n logger.debug(\n 'Connected to %s in region %s (with max retry attempts overridden to %d)'\n , 'elbv2', conn2._client_config.region_name, ELBV2_MAX_RETRY_ATTEMPTS)\n tgroups = paginate_dict(conn2.describe_target_groups, alc_marker_path=[\n 'NextMarker'], alc_data_path=['TargetGroups'], alc_marker_param=\n 'Marker')\n self.limits['Target groups']._add_current_usage(len(tgroups[\n 'TargetGroups']), aws_type='AWS::ElasticLoadBalancingV2::TargetGroup')\n lbs = paginate_dict(conn2.describe_load_balancers, alc_marker_path=[\n 'NextMarker'], alc_data_path=['LoadBalancers'], alc_marker_param=\n 'Marker')\n logger.debug('Checking usage for each of %d ALBs', len(lbs[\n 'LoadBalancers']))\n alb_count = 0\n nlb_count = 0\n for lb in lbs['LoadBalancers']:\n if lb.get('Type') == 'network':\n nlb_count += 1\n else:\n alb_count += 1\n self._update_usage_for_alb(conn2, lb['LoadBalancerArn'], lb[\n 'LoadBalancerName'])\n self.limits['Network load balancers']._add_current_usage(nlb_count,\n aws_type='AWS::ElasticLoadBalancing::NetworkLoadBalancer')\n logger.debug('Done with ELBv2 usage')\n return alb_count\n", "role": "user" }, { "content": "find_usage_elbv2", "role": "assistant" } ]
def x(self, conn, alb_arn, alb_name): logger.debug('Updating usage for ALB %s', alb_arn) listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn= alb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners' ], alc_marker_param='Marker')['Listeners'] num_rules = 0 num_certs = 0 for l in listeners: certs = [x for x in l.get('Certificates', []) if x.get('IsDefault', False) is False] num_certs += len(certs) rules = paginate_dict(conn.describe_rules, ListenerArn=l[ 'ListenerArn'], alc_marker_path=['NextMarker'], alc_data_path=[ 'Rules'], alc_marker_param='Marker')['Rules'] num_rules += len(rules) self.limits['Listeners per application load balancer']._add_current_usage( len(listeners), aws_type= 'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name) self.limits['Rules per application load balancer']._add_current_usage( num_rules, aws_type='AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name) self.limits['Certificates per application load balancer' ]._add_current_usage(num_certs, aws_type= 'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)
update_usage_for_alb
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, conn, alb_arn, alb_name):\n logger.debug('Updating usage for ALB %s', alb_arn)\n listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn=\n alb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners'\n ], alc_marker_param='Marker')['Listeners']\n num_rules = 0\n num_certs = 0\n for l in listeners:\n certs = [x for x in l.get('Certificates', []) if x.get('IsDefault',\n False) is False]\n num_certs += len(certs)\n rules = paginate_dict(conn.describe_rules, ListenerArn=l[\n 'ListenerArn'], alc_marker_path=['NextMarker'], alc_data_path=[\n 'Rules'], alc_marker_param='Marker')['Rules']\n num_rules += len(rules)\n self.limits['Listeners per application load balancer']._add_current_usage(\n len(listeners), aws_type=\n 'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)\n self.limits['Rules per application load balancer']._add_current_usage(\n num_rules, aws_type='AWS::ElasticLoadBalancingV2::LoadBalancer',\n resource_id=alb_name)\n self.limits['Certificates per application load balancer'\n ]._add_current_usage(num_certs, aws_type=\n 'AWS::ElasticLoadBalancingV2::LoadBalancer', resource_id=alb_name)\n", "role": "user" }, { "content": "update_usage_for_alb", "role": "assistant" } ]
def x(self, conn, nlb_arn, nlb_name): logger.debug('Updating usage for NLB %s', nlb_arn) listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn= nlb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners' ], alc_marker_param='Marker')['Listeners'] self.limits['Listeners per network load balancer']._add_current_usage(len (listeners), aws_type= 'AWS::ElasticLoadBalancingV2::NetworkLoadBalancer', resource_id= nlb_name)
update_usage_for_nlb
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, conn, nlb_arn, nlb_name):\n logger.debug('Updating usage for NLB %s', nlb_arn)\n listeners = paginate_dict(conn.describe_listeners, LoadBalancerArn=\n nlb_arn, alc_marker_path=['NextMarker'], alc_data_path=['Listeners'\n ], alc_marker_param='Marker')['Listeners']\n self.limits['Listeners per network load balancer']._add_current_usage(len\n (listeners), aws_type=\n 'AWS::ElasticLoadBalancingV2::NetworkLoadBalancer', resource_id=\n nlb_name)\n", "role": "user" }, { "content": "update_usage_for_nlb", "role": "assistant" } ]
def x(self): self.connect() logger.debug('Querying ELB DescribeAccountLimits for limits') attribs = self.conn.describe_account_limits() name_to_limits = {'classic-load-balancers': 'Active load balancers', 'classic-listeners': 'Listeners per load balancer', 'classic-registered-instances': 'Registered instances per load balancer'} for attrib in attribs['Limits']: if int(attrib.get('Max', 0)) == 0: continue name = attrib.get('Name', 'unknown') if name not in name_to_limits: continue self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max'])) self.conn2 = client('elbv2', **self._boto3_connection_kwargs) logger.debug('Connected to %s in region %s', 'elbv2', self.conn2. _client_config.region_name) logger.debug('Querying ELBv2 (ALB) DescribeAccountLimits for limits') attribs = self.conn2.describe_account_limits() name_to_limits = {'target-groups': 'Target groups', 'listeners-per-application-load-balancer': 'Listeners per application load balancer', 'rules-per-application-load-balancer': 'Rules per application load balancer', 'network-load-balancers': 'Network load balancers', 'listeners-per-network-load-balancer': 'Listeners per network load balancer'} for attrib in attribs['Limits']: if int(attrib.get('Max', 0)) == 0: continue name = attrib.get('Name', 'unknown') if name not in name_to_limits: continue self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max'])) logger.debug('Done setting limits from API')
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.connect()\n logger.debug('Querying ELB DescribeAccountLimits for limits')\n attribs = self.conn.describe_account_limits()\n name_to_limits = {'classic-load-balancers': 'Active load balancers',\n 'classic-listeners': 'Listeners per load balancer',\n 'classic-registered-instances':\n 'Registered instances per load balancer'}\n for attrib in attribs['Limits']:\n if int(attrib.get('Max', 0)) == 0:\n continue\n name = attrib.get('Name', 'unknown')\n if name not in name_to_limits:\n continue\n self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max']))\n self.conn2 = client('elbv2', **self._boto3_connection_kwargs)\n logger.debug('Connected to %s in region %s', 'elbv2', self.conn2.\n _client_config.region_name)\n logger.debug('Querying ELBv2 (ALB) DescribeAccountLimits for limits')\n attribs = self.conn2.describe_account_limits()\n name_to_limits = {'target-groups': 'Target groups',\n 'listeners-per-application-load-balancer':\n 'Listeners per application load balancer',\n 'rules-per-application-load-balancer':\n 'Rules per application load balancer', 'network-load-balancers':\n 'Network load balancers', 'listeners-per-network-load-balancer':\n 'Listeners per network load balancer'}\n for attrib in attribs['Limits']:\n if int(attrib.get('Max', 0)) == 0:\n continue\n name = attrib.get('Name', 'unknown')\n if name not in name_to_limits:\n continue\n self.limits[name_to_limits[name]]._set_api_limit(int(attrib['Max']))\n logger.debug('Done setting limits from API')\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(d, spaces=2, separator=' '): if len(d) == 0: return '' s = '' maxlen = max([len(k) for k in d.keys()]) fmt_str = '{k:' + separator + '<' + str(maxlen + spaces) + '}{v}\n' for k in sorted(d.keys()): s += fmt_str.format(k=k, v=d[k]) return s
dict2cols
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(d, spaces=2, separator=' '):\n if len(d) == 0:\n return ''\n s = ''\n maxlen = max([len(k) for k in d.keys()])\n fmt_str = '{k:' + separator + '<' + str(maxlen + spaces) + '}{v}\\n'\n for k in sorted(d.keys()):\n s += fmt_str.format(k=k, v=d[k])\n return s\n", "role": "user" }, { "content": "dict2cols", "role": "assistant" } ]
def x(function_ref, *argv, **kwargs): if 'alc_marker_path' not in kwargs: raise Exception( 'alc_marker_path must be specified for queries that return a dict.' ) if 'alc_data_path' not in kwargs: raise Exception( 'alc_data_path must be specified for queries that return a dict.') if 'alc_marker_param' not in kwargs: raise Exception( 'alc_marker_param must be specified for queries that return a dict.' ) marker_path = kwargs['alc_marker_path'] data_path = kwargs['alc_data_path'] marker_param = kwargs['alc_marker_param'] pass_kwargs = {} for k, v in kwargs.items(): if not k.startswith('alc_'): pass_kwargs[k] = v result = function_ref(*argv, **pass_kwargs) marker = _get_dict_value_by_path(result, marker_path) if marker is None: return result logger.debug('Found marker (%s) in result; iterating for more results', marker_path) results = [] results.extend(_get_dict_value_by_path(result, data_path)) while marker is not None: logger.debug('Querying %s with %s=%s', function_ref, marker_param, marker) pass_kwargs[marker_param] = marker result = function_ref(*argv, **pass_kwargs) data = _get_dict_value_by_path(result, data_path) results.extend(data) marker = _get_dict_value_by_path(result, marker_path) res = _set_dict_value_by_path(result, results, data_path) return res
paginate_dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(function_ref, *argv, **kwargs):\n if 'alc_marker_path' not in kwargs:\n raise Exception(\n 'alc_marker_path must be specified for queries that return a dict.'\n )\n if 'alc_data_path' not in kwargs:\n raise Exception(\n 'alc_data_path must be specified for queries that return a dict.')\n if 'alc_marker_param' not in kwargs:\n raise Exception(\n 'alc_marker_param must be specified for queries that return a dict.'\n )\n marker_path = kwargs['alc_marker_path']\n data_path = kwargs['alc_data_path']\n marker_param = kwargs['alc_marker_param']\n pass_kwargs = {}\n for k, v in kwargs.items():\n if not k.startswith('alc_'):\n pass_kwargs[k] = v\n result = function_ref(*argv, **pass_kwargs)\n marker = _get_dict_value_by_path(result, marker_path)\n if marker is None:\n return result\n logger.debug('Found marker (%s) in result; iterating for more results',\n marker_path)\n results = []\n results.extend(_get_dict_value_by_path(result, data_path))\n while marker is not None:\n logger.debug('Querying %s with %s=%s', function_ref, marker_param,\n marker)\n pass_kwargs[marker_param] = marker\n result = function_ref(*argv, **pass_kwargs)\n data = _get_dict_value_by_path(result, data_path)\n results.extend(data)\n marker = _get_dict_value_by_path(result, marker_path)\n res = _set_dict_value_by_path(result, results, data_path)\n return res\n", "role": "user" }, { "content": "paginate_dict", "role": "assistant" } ]
def x(d, path): tmp_path = deepcopy(path) try: while len(tmp_path) > 0: k = tmp_path.pop(0) d = d[k] return d except: return None
get_dict_value_by_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(d, path):\n tmp_path = deepcopy(path)\n try:\n while len(tmp_path) > 0:\n k = tmp_path.pop(0)\n d = d[k]\n return d\n except:\n return None\n", "role": "user" }, { "content": "get_dict_value_by_path", "role": "assistant" } ]
def x(d, val, path): tmp_path = deepcopy(path) tmp_d = deepcopy(d) result = tmp_d while len(tmp_path) > 0: if len(tmp_path) == 1: result[tmp_path[0]] = val break k = tmp_path.pop(0) result = result[k] return tmp_d
set_dict_value_by_path
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(d, val, path):\n tmp_path = deepcopy(path)\n tmp_d = deepcopy(d)\n result = tmp_d\n while len(tmp_path) > 0:\n if len(tmp_path) == 1:\n result[tmp_path[0]] = val\n break\n k = tmp_path.pop(0)\n result = result[k]\n return tmp_d\n", "role": "user" }, { "content": "set_dict_value_by_path", "role": "assistant" } ]
def x(self): kwargs = {'region_name': self.region} if self.account_id is not None: logger.debug( "Connecting for account %s role '%s' with STS (region: %s)", self.account_id, self.account_role, self.region) credentials = self._get_sts_token() kwargs['aws_access_key_id'] = credentials.access_key kwargs['aws_secret_access_key'] = credentials.secret_key kwargs['aws_session_token'] = credentials.session_token elif self.profile_name is not None: logger.debug('Using credentials profile: %s', self.profile_name) session = boto3.Session(profile_name=self.profile_name) credentials = session._session.get_credentials() kwargs['aws_access_key_id'] = credentials.access_key kwargs['aws_secret_access_key'] = credentials.secret_key kwargs['aws_session_token'] = credentials.token else: logger.debug('Connecting to region %s', self.region) return kwargs
boto_conn_kwargs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n kwargs = {'region_name': self.region}\n if self.account_id is not None:\n logger.debug(\n \"Connecting for account %s role '%s' with STS (region: %s)\",\n self.account_id, self.account_role, self.region)\n credentials = self._get_sts_token()\n kwargs['aws_access_key_id'] = credentials.access_key\n kwargs['aws_secret_access_key'] = credentials.secret_key\n kwargs['aws_session_token'] = credentials.session_token\n elif self.profile_name is not None:\n logger.debug('Using credentials profile: %s', self.profile_name)\n session = boto3.Session(profile_name=self.profile_name)\n credentials = session._session.get_credentials()\n kwargs['aws_access_key_id'] = credentials.access_key\n kwargs['aws_secret_access_key'] = credentials.secret_key\n kwargs['aws_session_token'] = credentials.token\n else:\n logger.debug('Connecting to region %s', self.region)\n return kwargs\n", "role": "user" }, { "content": "boto_conn_kwargs", "role": "assistant" } ]
def x(self, services_to_remove=[]): for sname in services_to_remove: logger.warning('Skipping service: %s', sname) self.services.pop(sname, None)
remove_services
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, services_to_remove=[]):\n for sname in services_to_remove:\n logger.warning('Skipping service: %s', sname)\n self.services.pop(sname, None)\n", "role": "user" }, { "content": "remove_services", "role": "assistant" } ]
def x(self): logger.debug('Connecting to STS in region %s', self.region) sts = boto3.client('sts', region_name=self.region) arn = 'arn:aws:iam::%s:role/%s' % (self.account_id, self.account_role) logger.debug('STS assume role for %s', arn) assume_kwargs = {'RoleArn': arn, 'RoleSessionName': 'awslimitchecker'} if self.external_id is not None: assume_kwargs['ExternalId'] = self.external_id if self.mfa_serial_number is not None: assume_kwargs['SerialNumber'] = self.mfa_serial_number if self.mfa_token is not None: assume_kwargs['TokenCode'] = self.mfa_token role = sts.assume_role(**assume_kwargs) creds = ConnectableCredentials(role) creds.account_id = self.account_id logger.debug( 'Got STS credentials for role; access_key_id=%s (account_id=%s)', creds.access_key, creds.account_id) return creds
get_sts_token
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Connecting to STS in region %s', self.region)\n sts = boto3.client('sts', region_name=self.region)\n arn = 'arn:aws:iam::%s:role/%s' % (self.account_id, self.account_role)\n logger.debug('STS assume role for %s', arn)\n assume_kwargs = {'RoleArn': arn, 'RoleSessionName': 'awslimitchecker'}\n if self.external_id is not None:\n assume_kwargs['ExternalId'] = self.external_id\n if self.mfa_serial_number is not None:\n assume_kwargs['SerialNumber'] = self.mfa_serial_number\n if self.mfa_token is not None:\n assume_kwargs['TokenCode'] = self.mfa_token\n role = sts.assume_role(**assume_kwargs)\n creds = ConnectableCredentials(role)\n creds.account_id = self.account_id\n logger.debug(\n 'Got STS credentials for role; access_key_id=%s (account_id=%s)',\n creds.access_key, creds.account_id)\n return creds\n", "role": "user" }, { "content": "get_sts_token", "role": "assistant" } ]
def x(self, service=None, use_ta=True): to_get = self.services if service is not None: to_get = dict((each, self.services[each]) for each in service) if use_ta: self.ta.update_limits() for cls in to_get.values(): if hasattr(cls, '_update_limits_from_api'): cls._update_limits_from_api() logger.debug('Finding usage for service: %s', cls.service_name) cls.find_usage()
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, service=None, use_ta=True):\n to_get = self.services\n if service is not None:\n to_get = dict((each, self.services[each]) for each in service)\n if use_ta:\n self.ta.update_limits()\n for cls in to_get.values():\n if hasattr(cls, '_update_limits_from_api'):\n cls._update_limits_from_api()\n logger.debug('Finding usage for service: %s', cls.service_name)\n cls.find_usage()\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self, override_dict, override_ta=True): for svc_name in override_dict: for lim_name in override_dict[svc_name]: self.services[svc_name].set_limit_override(lim_name, override_dict[svc_name][lim_name], override_ta=override_ta)
set_limit_overrides
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, override_dict, override_ta=True):\n for svc_name in override_dict:\n for lim_name in override_dict[svc_name]:\n self.services[svc_name].set_limit_override(lim_name,\n override_dict[svc_name][lim_name], override_ta=override_ta)\n", "role": "user" }, { "content": "set_limit_overrides", "role": "assistant" } ]
def x(self, service_name, limit_name, value, override_ta=True): self.services[service_name].set_limit_override(limit_name, value, override_ta=override_ta)
set_limit_override
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, service_name, limit_name, value, override_ta=True):\n self.services[service_name].set_limit_override(limit_name, value,\n override_ta=override_ta)\n", "role": "user" }, { "content": "set_limit_override", "role": "assistant" } ]
def x(self, override_dict): for svc_name in sorted(override_dict): for lim_name in sorted(override_dict[svc_name]): d = override_dict[svc_name][lim_name] kwargs = {} if 'warning' in d: if 'percent' in d['warning']: kwargs['warn_percent'] = d['warning']['percent'] if 'count' in d['warning']: kwargs['warn_count'] = d['warning']['count'] if 'critical' in d: if 'percent' in d['critical']: kwargs['crit_percent'] = d['critical']['percent'] if 'count' in d['critical']: kwargs['crit_count'] = d['critical']['count'] self.services[svc_name].set_threshold_override(lim_name, **kwargs)
set_threshold_overrides
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, override_dict):\n for svc_name in sorted(override_dict):\n for lim_name in sorted(override_dict[svc_name]):\n d = override_dict[svc_name][lim_name]\n kwargs = {}\n if 'warning' in d:\n if 'percent' in d['warning']:\n kwargs['warn_percent'] = d['warning']['percent']\n if 'count' in d['warning']:\n kwargs['warn_count'] = d['warning']['count']\n if 'critical' in d:\n if 'percent' in d['critical']:\n kwargs['crit_percent'] = d['critical']['percent']\n if 'count' in d['critical']:\n kwargs['crit_count'] = d['critical']['count']\n self.services[svc_name].set_threshold_override(lim_name, **kwargs)\n", "role": "user" }, { "content": "set_threshold_overrides", "role": "assistant" } ]
def x(self, service_name, limit_name, warn_percent=None, warn_count=None, crit_percent=None, crit_count=None): self.services[service_name].set_threshold_override(limit_name, warn_percent=warn_percent, warn_count=warn_count, crit_percent= crit_percent, crit_count=crit_count)
set_threshold_override
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, service_name, limit_name, warn_percent=None, warn_count=None,\n crit_percent=None, crit_count=None):\n self.services[service_name].set_threshold_override(limit_name,\n warn_percent=warn_percent, warn_count=warn_count, crit_percent=\n crit_percent, crit_count=crit_count)\n", "role": "user" }, { "content": "set_threshold_override", "role": "assistant" } ]
def x(self, service=None, use_ta=True): res = {} to_get = self.services if service is not None: to_get = dict((each, self.services[each]) for each in service) if use_ta: self.ta.update_limits() for sname, cls in to_get.items(): if hasattr(cls, '_update_limits_from_api'): cls._update_limits_from_api() tmp = cls.check_thresholds() if len(tmp) > 0: res[sname] = tmp return res
check_thresholds
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, service=None, use_ta=True):\n res = {}\n to_get = self.services\n if service is not None:\n to_get = dict((each, self.services[each]) for each in service)\n if use_ta:\n self.ta.update_limits()\n for sname, cls in to_get.items():\n if hasattr(cls, '_update_limits_from_api'):\n cls._update_limits_from_api()\n tmp = cls.check_thresholds()\n if len(tmp) > 0:\n res[sname] = tmp\n return res\n", "role": "user" }, { "content": "check_thresholds", "role": "assistant" } ]
def x(self): required_actions = ['support:*', 'trustedadvisor:Describe*', 'trustedadvisor:RefreshCheck'] for cls in self.services.values(): required_actions.extend(cls.required_iam_permissions()) policy = {'Version': '2012-10-17', 'Statement': [{'Effect': 'Allow', 'Resource': '*', 'Action': sorted(list(set(required_actions)))}]} return policy
get_required_iam_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n required_actions = ['support:*', 'trustedadvisor:Describe*',\n 'trustedadvisor:RefreshCheck']\n for cls in self.services.values():\n required_actions.extend(cls.required_iam_permissions())\n policy = {'Version': '2012-10-17', 'Statement': [{'Effect': 'Allow',\n 'Resource': '*', 'Action': sorted(list(set(required_actions)))}]}\n return policy\n", "role": "user" }, { "content": "get_required_iam_policy", "role": "assistant" } ]
def x(self): logger.info('Querying Route53 GetHostedZoneLimits for limits') self.connect() self._find_limit_hosted_zone() logger.debug('Done setting limits from API.')
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.info('Querying Route53 GetHostedZoneLimits for limits')\n self.connect()\n self._find_limit_hosted_zone()\n logger.debug('Done setting limits from API.')\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self): if not self.limits: self.limits = {} for item in [self.MAX_RRSETS_BY_ZONE, self.MAX_VPCS_ASSOCIATED_BY_ZONE ]: self.limits[item['name']] = AwsLimit(item['name'], self, item[ 'default_limit'], self.warning_threshold, self. critical_threshold, limit_type='AWS::Route53::HostedZone', limit_subtype=item['name']) return self.limits
get_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self.limits:\n self.limits = {}\n for item in [self.MAX_RRSETS_BY_ZONE, self.MAX_VPCS_ASSOCIATED_BY_ZONE\n ]:\n self.limits[item['name']] = AwsLimit(item['name'], self, item[\n 'default_limit'], self.warning_threshold, self.\n critical_threshold, limit_type='AWS::Route53::HostedZone',\n limit_subtype=item['name'])\n return self.limits\n", "role": "user" }, { "content": "get_limits", "role": "assistant" } ]
def x(self): results = paginate_dict(self.conn.list_hosted_zones, alc_marker_path=[ 'NextMarker'], alc_data_path=['HostedZones'], alc_marker_param='Marker' ) return results['HostedZones']
get_hosted_zones
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n results = paginate_dict(self.conn.list_hosted_zones, alc_marker_path=[\n 'NextMarker'], alc_data_path=['HostedZones'], alc_marker_param='Marker'\n )\n return results['HostedZones']\n", "role": "user" }, { "content": "get_hosted_zones", "role": "assistant" } ]
def x(self, limit_type, hosted_zone_id): result = self.conn.get_hosted_zone_limit(Type=limit_type, HostedZoneId= hosted_zone_id) return result
get_hosted_zone_limit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, limit_type, hosted_zone_id):\n result = self.conn.get_hosted_zone_limit(Type=limit_type, HostedZoneId=\n hosted_zone_id)\n return result\n", "role": "user" }, { "content": "get_hosted_zone_limit", "role": "assistant" } ]
def x(self): for limit_type in [self.MAX_RRSETS_BY_ZONE, self. MAX_VPCS_ASSOCIATED_BY_ZONE]: self.limits[limit_type['name']]._reset_usage() for hosted_zone in self._get_hosted_zones(): for limit_type in [self.MAX_RRSETS_BY_ZONE, self. MAX_VPCS_ASSOCIATED_BY_ZONE]: if (limit_type == self.MAX_VPCS_ASSOCIATED_BY_ZONE and not hosted_zone['Config']['PrivateZone']): continue limit = self._get_hosted_zone_limit(limit_type['type'], hosted_zone['Id']) self.limits[limit_type['name']]._add_current_usage(int(limit[ 'Count']), maximum=int(limit['Limit']['Value']), aws_type= 'AWS::Route53::HostedZone', resource_id=hosted_zone['Name'])
find_limit_hosted_zone
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n for limit_type in [self.MAX_RRSETS_BY_ZONE, self.\n MAX_VPCS_ASSOCIATED_BY_ZONE]:\n self.limits[limit_type['name']]._reset_usage()\n for hosted_zone in self._get_hosted_zones():\n for limit_type in [self.MAX_RRSETS_BY_ZONE, self.\n MAX_VPCS_ASSOCIATED_BY_ZONE]:\n if (limit_type == self.MAX_VPCS_ASSOCIATED_BY_ZONE and not\n hosted_zone['Config']['PrivateZone']):\n continue\n limit = self._get_hosted_zone_limit(limit_type['type'],\n hosted_zone['Id'])\n self.limits[limit_type['name']]._add_current_usage(int(limit[\n 'Count']), maximum=int(limit['Limit']['Value']), aws_type=\n 'AWS::Route53::HostedZone', resource_id=hosted_zone['Name'])\n", "role": "user" }, { "content": "find_limit_hosted_zone", "role": "assistant" } ]
def x(self): checker = AwsLimitChecker() policy = checker.get_required_iam_policy() return json.dumps(policy, sort_keys=True, indent=2)
get_iam_policy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n checker = AwsLimitChecker()\n policy = checker.get_required_iam_policy()\n return json.dumps(policy, sort_keys=True, indent=2)\n", "role": "user" }, { "content": "get_iam_policy", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect_resource() for lim in self.limits.values(): lim._reset_usage() count = 0 for bkt in self.resource_conn.buckets.all(): count += 1 self.limits['Buckets']._add_current_usage(count, aws_type='AWS::S3::Bucket' ) self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect_resource()\n for lim in self.limits.values():\n lim._reset_usage()\n count = 0\n for bkt in self.resource_conn.buckets.all():\n count += 1\n self.limits['Buckets']._add_current_usage(count, aws_type='AWS::S3::Bucket'\n )\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self, version): for rel in self._repo.releases(): if rel.tag_name == version: return rel.name, rel.html_url return None, None
get_tag
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, version):\n for rel in self._repo.releases():\n if rel.tag_name == version:\n return rel.name, rel.html_url\n return None, None\n", "role": "user" }, { "content": "get_tag", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) for lim in self.limits.values(): lim._reset_usage() try: self.connect() resp = self.conn.get_send_quota() except EndpointConnectionError as ex: logger.warning('Skipping SES: %s', str(ex)) return except ClientError as ex: if ex.response['Error']['Code'] in ['AccessDenied', '503']: logger.warning('Skipping SES: %s', ex) return raise self.limits['Daily sending quota']._add_current_usage(resp[ 'SentLast24Hours']) self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n for lim in self.limits.values():\n lim._reset_usage()\n try:\n self.connect()\n resp = self.conn.get_send_quota()\n except EndpointConnectionError as ex:\n logger.warning('Skipping SES: %s', str(ex))\n return\n except ClientError as ex:\n if ex.response['Error']['Code'] in ['AccessDenied', '503']:\n logger.warning('Skipping SES: %s', ex)\n return\n raise\n self.limits['Daily sending quota']._add_current_usage(resp[\n 'SentLast24Hours'])\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): try: self.connect() resp = self.conn.get_send_quota() except EndpointConnectionError as ex: logger.warning('Skipping SES: %s', str(ex)) return except ClientError as ex: if ex.response['Error']['Code'] in ['AccessDenied', '503']: logger.warning('Skipping SES: %s', ex) return raise self.limits['Daily sending quota']._set_api_limit(resp['Max24HourSend'])
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n try:\n self.connect()\n resp = self.conn.get_send_quota()\n except EndpointConnectionError as ex:\n logger.warning('Skipping SES: %s', str(ex))\n return\n except ClientError as ex:\n if ex.response['Error']['Code'] in ['AccessDenied', '503']:\n logger.warning('Skipping SES: %s', ex)\n return\n raise\n self.limits['Daily sending quota']._set_api_limit(resp['Max24HourSend'])\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self): if self.conn is not None: return kwargs = self._boto3_connection_kwargs self.conn = boto3.client(self.api_name, **kwargs) logger.info('Connected to %s in region %s', self.api_name, self.conn. _client_config.region_name)
connect
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.conn is not None:\n return\n kwargs = self._boto3_connection_kwargs\n self.conn = boto3.client(self.api_name, **kwargs)\n logger.info('Connected to %s in region %s', self.api_name, self.conn.\n _client_config.region_name)\n", "role": "user" }, { "content": "connect", "role": "assistant" } ]
def x(self): if self.resource_conn is not None: return kwargs = self._boto3_connection_kwargs self.resource_conn = boto3.resource(self.api_name, **kwargs) logger.info('Connected to %s (resource) in region %s', self.api_name, self.resource_conn.meta.client._client_config.region_name)
connect_resource
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.resource_conn is not None:\n return\n kwargs = self._boto3_connection_kwargs\n self.resource_conn = boto3.resource(self.api_name, **kwargs)\n logger.info('Connected to %s (resource) in region %s', self.api_name,\n self.resource_conn.meta.client._client_config.region_name)\n", "role": "user" }, { "content": "connect_resource", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect_resource() for lim in self.limits.values(): lim._reset_usage() self._find_usage_dynamodb() self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect_resource()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_dynamodb()\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): table_count = 0 region_read_capacity = 0 region_write_capacity = 0 logger.debug('Getting usage for DynamoDB tables') for table in self.resource_conn.tables.all(): table_count += 1 gsi_write = 0 gsi_read = 0 gsi_count = 0 if table.global_secondary_indexes is not None: for gsi in table.global_secondary_indexes: gsi_count += 1 gsi_read += gsi['ProvisionedThroughput']['ReadCapacityUnits'] gsi_write += gsi['ProvisionedThroughput']['WriteCapacityUnits'] table_write_capacity = table.provisioned_throughput[ 'WriteCapacityUnits'] + gsi_write table_read_capacity = table.provisioned_throughput['ReadCapacityUnits' ] + gsi_read region_write_capacity += table_write_capacity region_read_capacity += table_read_capacity self.limits['Global Secondary Indexes']._add_current_usage(gsi_count, resource_id=table.name, aws_type='AWS::DynamoDB::Table') self.limits['Local Secondary Indexes']._add_current_usage(len(table .local_secondary_indexes) if table.local_secondary_indexes is not None else 0, resource_id=table.name, aws_type= 'AWS::DynamoDB::Table') self.limits['Table Max Write Capacity Units']._add_current_usage( table_write_capacity, resource_id=table.name, aws_type= 'AWS::DynamoDB::Table') self.limits['Table Max Read Capacity Units']._add_current_usage( table_read_capacity, resource_id=table.name, aws_type= 'AWS::DynamoDB::Table') self.limits['Tables Per Region']._add_current_usage(table_count, aws_type='AWS::DynamoDB::Table') self.limits['Account Max Write Capacity Units']._add_current_usage( region_write_capacity, aws_type='AWS::DynamoDB::Table') self.limits['Account Max Read Capacity Units']._add_current_usage( region_read_capacity, aws_type='AWS::DynamoDB::Table')
find_usage_dynamodb
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n table_count = 0\n region_read_capacity = 0\n region_write_capacity = 0\n logger.debug('Getting usage for DynamoDB tables')\n for table in self.resource_conn.tables.all():\n table_count += 1\n gsi_write = 0\n gsi_read = 0\n gsi_count = 0\n if table.global_secondary_indexes is not None:\n for gsi in table.global_secondary_indexes:\n gsi_count += 1\n gsi_read += gsi['ProvisionedThroughput']['ReadCapacityUnits']\n gsi_write += gsi['ProvisionedThroughput']['WriteCapacityUnits']\n table_write_capacity = table.provisioned_throughput[\n 'WriteCapacityUnits'] + gsi_write\n table_read_capacity = table.provisioned_throughput['ReadCapacityUnits'\n ] + gsi_read\n region_write_capacity += table_write_capacity\n region_read_capacity += table_read_capacity\n self.limits['Global Secondary Indexes']._add_current_usage(gsi_count,\n resource_id=table.name, aws_type='AWS::DynamoDB::Table')\n self.limits['Local Secondary Indexes']._add_current_usage(len(table\n .local_secondary_indexes) if table.local_secondary_indexes is not\n None else 0, resource_id=table.name, aws_type=\n 'AWS::DynamoDB::Table')\n self.limits['Table Max Write Capacity Units']._add_current_usage(\n table_write_capacity, resource_id=table.name, aws_type=\n 'AWS::DynamoDB::Table')\n self.limits['Table Max Read Capacity Units']._add_current_usage(\n table_read_capacity, resource_id=table.name, aws_type=\n 'AWS::DynamoDB::Table')\n self.limits['Tables Per Region']._add_current_usage(table_count,\n aws_type='AWS::DynamoDB::Table')\n self.limits['Account Max Write Capacity Units']._add_current_usage(\n region_write_capacity, aws_type='AWS::DynamoDB::Table')\n self.limits['Account Max Read Capacity Units']._add_current_usage(\n region_read_capacity, aws_type='AWS::DynamoDB::Table')\n", "role": "user" }, { "content": "find_usage_dynamodb", "role": "assistant" } ]
def x(self): self.connect() region_name = self.conn._client_config.region_name if self.limits != {}: return self.limits limits = {} limits['Tables Per Region'] = AwsLimit('Tables Per Region', self, 256, self.warning_threshold, self.critical_threshold, limit_type= 'AWS::DynamoDB::Table') limits['Account Max Write Capacity Units'] = AwsLimit( 'Account Max Write Capacity Units', self, 80000 if region_name == 'us-east-1' else 20000, self.warning_threshold, self. critical_threshold, limit_type='AWS::DynamoDB::Table') limits['Table Max Write Capacity Units'] = AwsLimit( 'Table Max Write Capacity Units', self, 40000 if region_name == 'us-east-1' else 10000, self.warning_threshold, self. critical_threshold, limit_type='AWS::DynamoDB::Table') limits['Account Max Read Capacity Units'] = AwsLimit( 'Account Max Read Capacity Units', self, 80000 if region_name == 'us-east-1' else 20000, self.warning_threshold, self. critical_threshold, limit_type='AWS::DynamoDB::Table') limits['Table Max Read Capacity Units'] = AwsLimit( 'Table Max Read Capacity Units', self, 40000 if region_name == 'us-east-1' else 10000, self.warning_threshold, self. critical_threshold, limit_type='AWS::DynamoDB::Table') limits['Global Secondary Indexes'] = AwsLimit('Global Secondary Indexes', self, 20, self.warning_threshold, self.critical_threshold, limit_type='AWS::DynamoDB::Table') limits['Local Secondary Indexes'] = AwsLimit('Local Secondary Indexes', self, 5, self.warning_threshold, self.critical_threshold, limit_type='AWS::DynamoDB::Table') self.limits = limits return limits
get_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.connect()\n region_name = self.conn._client_config.region_name\n if self.limits != {}:\n return self.limits\n limits = {}\n limits['Tables Per Region'] = AwsLimit('Tables Per Region', self, 256,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::DynamoDB::Table')\n limits['Account Max Write Capacity Units'] = AwsLimit(\n 'Account Max Write Capacity Units', self, 80000 if region_name ==\n 'us-east-1' else 20000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Table Max Write Capacity Units'] = AwsLimit(\n 'Table Max Write Capacity Units', self, 40000 if region_name ==\n 'us-east-1' else 10000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Account Max Read Capacity Units'] = AwsLimit(\n 'Account Max Read Capacity Units', self, 80000 if region_name ==\n 'us-east-1' else 20000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Table Max Read Capacity Units'] = AwsLimit(\n 'Table Max Read Capacity Units', self, 40000 if region_name ==\n 'us-east-1' else 10000, self.warning_threshold, self.\n critical_threshold, limit_type='AWS::DynamoDB::Table')\n limits['Global Secondary Indexes'] = AwsLimit('Global Secondary Indexes',\n self, 20, self.warning_threshold, self.critical_threshold,\n limit_type='AWS::DynamoDB::Table')\n limits['Local Secondary Indexes'] = AwsLimit('Local Secondary Indexes',\n self, 5, self.warning_threshold, self.critical_threshold,\n limit_type='AWS::DynamoDB::Table')\n self.limits = limits\n return limits\n", "role": "user" }, { "content": "get_limits", "role": "assistant" } ]
def x(self): self.connect() logger.info('Querying DynamoDB DescribeLimits for limits') lims = self.conn.describe_limits() self.limits['Account Max Read Capacity Units']._set_api_limit(lims[ 'AccountMaxReadCapacityUnits']) self.limits['Account Max Write Capacity Units']._set_api_limit(lims[ 'AccountMaxWriteCapacityUnits']) self.limits['Table Max Read Capacity Units']._set_api_limit(lims[ 'TableMaxReadCapacityUnits']) self.limits['Table Max Write Capacity Units']._set_api_limit(lims[ 'TableMaxWriteCapacityUnits']) logger.debug('Done setting limits from API')
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.connect()\n logger.info('Querying DynamoDB DescribeLimits for limits')\n lims = self.conn.describe_limits()\n self.limits['Account Max Read Capacity Units']._set_api_limit(lims[\n 'AccountMaxReadCapacityUnits'])\n self.limits['Account Max Write Capacity Units']._set_api_limit(lims[\n 'AccountMaxWriteCapacityUnits'])\n self.limits['Table Max Read Capacity Units']._set_api_limit(lims[\n 'TableMaxReadCapacityUnits'])\n self.limits['Table Max Write Capacity Units']._set_api_limit(lims[\n 'TableMaxWriteCapacityUnits'])\n logger.debug('Done setting limits from API')\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(): if os.environ.get('VERSIONCHECK_DEBUG', '') != 'true': for lname in ['versionfinder', 'pip', 'git']: l = logging.getLogger(lname) l.setLevel(logging.CRITICAL) l.propagate = True try: vinfo = find_version('awslimitchecker') dirty = '' if vinfo.git_is_dirty: dirty = '*' tag = vinfo.git_tag if tag is not None: tag += dirty commit = vinfo.git_commit if commit is not None: if len(commit) > 7: commit = commit[:8] commit += dirty return AWSLimitCheckerVersion(vinfo.version, vinfo.url, tag=tag, commit=commit) except Exception: logger.exception( 'Error checking installed version; this installation may not be in compliance with the AGPLv3 license:' ) return AWSLimitCheckerVersion(_VERSION, _PROJECT_URL)
get_version_info
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n if os.environ.get('VERSIONCHECK_DEBUG', '') != 'true':\n for lname in ['versionfinder', 'pip', 'git']:\n l = logging.getLogger(lname)\n l.setLevel(logging.CRITICAL)\n l.propagate = True\n try:\n vinfo = find_version('awslimitchecker')\n dirty = ''\n if vinfo.git_is_dirty:\n dirty = '*'\n tag = vinfo.git_tag\n if tag is not None:\n tag += dirty\n commit = vinfo.git_commit\n if commit is not None:\n if len(commit) > 7:\n commit = commit[:8]\n commit += dirty\n return AWSLimitCheckerVersion(vinfo.version, vinfo.url, tag=tag,\n commit=commit)\n except Exception:\n logger.exception(\n 'Error checking installed version; this installation may not be in compliance with the AGPLv3 license:'\n )\n return AWSLimitCheckerVersion(_VERSION, _PROJECT_URL)\n", "role": "user" }, { "content": "get_version_info", "role": "assistant" } ]
def x(self): vs = str(self.release) if self.tag is not None: vs += '@{t}'.format(t=self.tag) elif self.commit is not None: vs += '@{c}'.format(c=self.commit) return vs
version_str
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vs = str(self.release)\n if self.tag is not None:\n vs += '@{t}'.format(t=self.tag)\n elif self.commit is not None:\n vs += '@{c}'.format(c=self.commit)\n return vs\n", "role": "user" }, { "content": "version_str", "role": "assistant" } ]
def x(self): logger.debug('Listing per-account config subdirectories in %s', self. _conf_dir) for acct_id in os.listdir(self._conf_dir): path = os.path.join(self._conf_dir, acct_id) if not os.path.isdir(path): continue if not self.acct_id_re.match(acct_id): continue self._load_account(acct_id, path) for acct_id, data in self._config.items(): if data['name'] is None: continue self._acct_name_to_id[data['name']] = acct_id
load_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Listing per-account config subdirectories in %s', self.\n _conf_dir)\n for acct_id in os.listdir(self._conf_dir):\n path = os.path.join(self._conf_dir, acct_id)\n if not os.path.isdir(path):\n continue\n if not self.acct_id_re.match(acct_id):\n continue\n self._load_account(acct_id, path)\n for acct_id, data in self._config.items():\n if data['name'] is None:\n continue\n self._acct_name_to_id[data['name']] = acct_id\n", "role": "user" }, { "content": "load_config", "role": "assistant" } ]
def x(self, acct_id, acct_dir_path): self._config[acct_id] = {'name': None, 'role_name': DEFAULT_ROLE_NAME, 'regions': {}} with open(os.path.join(acct_dir_path, 'config.json'), 'r') as fh: acct_conf = json.loads(fh.read()) self._config[acct_id].update(acct_conf) for region_name in os.listdir(acct_dir_path): path = os.path.join(acct_dir_path, region_name) if not os.path.isdir(path): continue self._load_region(acct_id, region_name, path)
load_account
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, acct_id, acct_dir_path):\n self._config[acct_id] = {'name': None, 'role_name': DEFAULT_ROLE_NAME,\n 'regions': {}}\n with open(os.path.join(acct_dir_path, 'config.json'), 'r') as fh:\n acct_conf = json.loads(fh.read())\n self._config[acct_id].update(acct_conf)\n for region_name in os.listdir(acct_dir_path):\n path = os.path.join(acct_dir_path, region_name)\n if not os.path.isdir(path):\n continue\n self._load_region(acct_id, region_name, path)\n", "role": "user" }, { "content": "load_account", "role": "assistant" } ]
def x(self, acct_id, region_name, path): lim_path = os.path.join(path, 'limit_overrides.json') thresh_path = os.path.join(path, 'threshold_overrides.json') res = {'limit_overrides': {}, 'threshold_overrides': {}} if os.path.exists(lim_path): with open(lim_path, 'r') as fh: res['limit_overrides'] = json.loads(fh.read()) if os.path.exists(thresh_path): with open(thresh_path, 'r') as fh: res['threshold_overrides'] = json.loads(fh.read()) self._config[acct_id]['regions'][region_name] = res
load_region
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, acct_id, region_name, path):\n lim_path = os.path.join(path, 'limit_overrides.json')\n thresh_path = os.path.join(path, 'threshold_overrides.json')\n res = {'limit_overrides': {}, 'threshold_overrides': {}}\n if os.path.exists(lim_path):\n with open(lim_path, 'r') as fh:\n res['limit_overrides'] = json.loads(fh.read())\n if os.path.exists(thresh_path):\n with open(thresh_path, 'r') as fh:\n res['threshold_overrides'] = json.loads(fh.read())\n self._config[acct_id]['regions'][region_name] = res\n", "role": "user" }, { "content": "load_region", "role": "assistant" } ]
def x(self, id_or_name): if id_or_name in self._config: return self._config[id_or_name] if id_or_name in self._acct_name_to_id: return self._config[self._acct_name_to_id[id_or_name]] raise RuntimeError('ERROR: Unknown account ID or name')
get_account_config
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, id_or_name):\n if id_or_name in self._config:\n return self._config[id_or_name]\n if id_or_name in self._acct_name_to_id:\n return self._config[self._acct_name_to_id[id_or_name]]\n raise RuntimeError('ERROR: Unknown account ID or name')\n", "role": "user" }, { "content": "get_account_config", "role": "assistant" } ]
def x(self, acct_id, region_name, role_name=None, limit_overrides={}, threshold_overrides={}): if role_name is not None: checker = AwsLimitChecker(account_id=acct_id, region=region_name, account_role=role_name) else: checker = AwsLimitChecker(region=region_name) if len(threshold_overrides) > 0: checker.set_threshold_overrides(threshold_overrides) if len(limit_overrides) > 0: checker.set_limit_overrides(limit_overrides) checker.check_thresholds() warnings = [] criticals = [] for service, svc_limits in sorted(checker.get_limits().items()): for limit_name, limit in sorted(svc_limits.items()): for warn in limit.get_warnings(): warnings.append(colored( "{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})" .format(service=service, limit_name=limit_name, u=str( warn), l=limit.get_limit()), 'yellow')) for crit in limit.get_criticals(): criticals.append(colored( "{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})" .format(service=service, limit_name=limit_name, u=str( crit), l=limit.get_limit()), 'red')) return warnings, criticals
check_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, acct_id, region_name, role_name=None, limit_overrides={},\n threshold_overrides={}):\n if role_name is not None:\n checker = AwsLimitChecker(account_id=acct_id, region=region_name,\n account_role=role_name)\n else:\n checker = AwsLimitChecker(region=region_name)\n if len(threshold_overrides) > 0:\n checker.set_threshold_overrides(threshold_overrides)\n if len(limit_overrides) > 0:\n checker.set_limit_overrides(limit_overrides)\n checker.check_thresholds()\n warnings = []\n criticals = []\n for service, svc_limits in sorted(checker.get_limits().items()):\n for limit_name, limit in sorted(svc_limits.items()):\n for warn in limit.get_warnings():\n warnings.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n warn), l=limit.get_limit()), 'yellow'))\n for crit in limit.get_criticals():\n criticals.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n crit), l=limit.get_limit()), 'red'))\n return warnings, criticals\n", "role": "user" }, { "content": "check_limits", "role": "assistant" } ]
def x(self, error_on_warning=False, region=None, accounts=[]): all_warnings = [] all_criticals = [] if len(accounts) == 0: accounts = self._conf.list_account_ids for acct_id in accounts: acct_conf = self._conf.get_account_config(acct_id) if region is None: regions = list(acct_conf['regions'].keys()) elif region in acct_conf['regions']: regions = [region] else: print('\nAccount %s is not configured for region %s' % (acct_id, region)) regions = [] for rname in regions: print('\n%s (%s) %s' % (acct_id, acct_conf['name'], rname)) warnings, criticals = self.check_limits(acct_id, rname, role_name=acct_conf['role_name'], limit_overrides=acct_conf ['regions'][rname]['limit_overrides'], threshold_overrides= acct_conf['regions'][rname]['threshold_overrides']) for w in warnings: print('\tWARNING: %s' % w) all_warnings.append(w) for c in criticals: print('\tCRITICAL: %s' % c) all_criticals.append(c) if len(warnings) == 0 and len(criticals) == 0: print('\tNo problems found.') if len(all_warnings) > 0 or len(all_criticals) > 0: print( '\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold' .format(c=len(all_criticals), w=len(all_warnings))) else: print('All limits are within thresholds.') if len(all_warnings) > 0 and error_on_warning or len(all_criticals) > 0: print('PROBLEMS FOUND. See above output for details.') raise SystemExit(1)
run
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, error_on_warning=False, region=None, accounts=[]):\n all_warnings = []\n all_criticals = []\n if len(accounts) == 0:\n accounts = self._conf.list_account_ids\n for acct_id in accounts:\n acct_conf = self._conf.get_account_config(acct_id)\n if region is None:\n regions = list(acct_conf['regions'].keys())\n elif region in acct_conf['regions']:\n regions = [region]\n else:\n print('\\nAccount %s is not configured for region %s' % (acct_id,\n region))\n regions = []\n for rname in regions:\n print('\\n%s (%s) %s' % (acct_id, acct_conf['name'], rname))\n warnings, criticals = self.check_limits(acct_id, rname,\n role_name=acct_conf['role_name'], limit_overrides=acct_conf\n ['regions'][rname]['limit_overrides'], threshold_overrides=\n acct_conf['regions'][rname]['threshold_overrides'])\n for w in warnings:\n print('\\tWARNING: %s' % w)\n all_warnings.append(w)\n for c in criticals:\n print('\\tCRITICAL: %s' % c)\n all_criticals.append(c)\n if len(warnings) == 0 and len(criticals) == 0:\n print('\\tNo problems found.')\n if len(all_warnings) > 0 or len(all_criticals) > 0:\n print(\n '\\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold'\n .format(c=len(all_criticals), w=len(all_warnings)))\n else:\n print('All limits are within thresholds.')\n if len(all_warnings) > 0 and error_on_warning or len(all_criticals) > 0:\n print('PROBLEMS FOUND. See above output for details.')\n raise SystemExit(1)\n", "role": "user" }, { "content": "run", "role": "assistant" } ]
def x(self): vols = 0 piops = 0 piops_gb = 0 gp_gb = 0 mag_gb = 0 st_gb = 0 sc_gb = 0 logger.debug('Getting usage for EBS volumes') results = paginate_dict(self.conn.describe_volumes, alc_marker_path=[ 'NextToken'], alc_data_path=['Volumes'], alc_marker_param='NextToken') for vol in results['Volumes']: vols += 1 if vol['VolumeType'] == 'io1': piops_gb += vol['Size'] piops += vol['Iops'] elif vol['VolumeType'] == 'gp2': gp_gb += vol['Size'] elif vol['VolumeType'] == 'standard': mag_gb += vol['Size'] elif vol['VolumeType'] == 'st1': st_gb += vol['Size'] elif vol['VolumeType'] == 'sc1': sc_gb += vol['Size'] else: logger.error( "ERROR - unknown volume type '%s' for volume %s; not counting", vol['VolumeType'], vol['VolumeId']) self.limits['Provisioned IOPS']._add_current_usage(piops, aws_type= 'AWS::EC2::Volume') self.limits['Provisioned IOPS (SSD) storage (GiB)']._add_current_usage( piops_gb, aws_type='AWS::EC2::Volume') self.limits['General Purpose (SSD) volume storage (GiB)' ]._add_current_usage(gp_gb, aws_type='AWS::EC2::Volume') self.limits['Magnetic volume storage (GiB)']._add_current_usage(mag_gb, aws_type='AWS::EC2::Volume') self.limits['Throughput Optimized (HDD) volume storage (GiB)' ]._add_current_usage(st_gb, aws_type='AWS::EC2::Volume') self.limits['Cold (HDD) volume storage (GiB)']._add_current_usage(sc_gb, aws_type='AWS::EC2::Volume') self.limits['Active volumes']._add_current_usage(vols, aws_type= 'AWS::EC2::Volume')
find_usage_ebs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n vols = 0\n piops = 0\n piops_gb = 0\n gp_gb = 0\n mag_gb = 0\n st_gb = 0\n sc_gb = 0\n logger.debug('Getting usage for EBS volumes')\n results = paginate_dict(self.conn.describe_volumes, alc_marker_path=[\n 'NextToken'], alc_data_path=['Volumes'], alc_marker_param='NextToken')\n for vol in results['Volumes']:\n vols += 1\n if vol['VolumeType'] == 'io1':\n piops_gb += vol['Size']\n piops += vol['Iops']\n elif vol['VolumeType'] == 'gp2':\n gp_gb += vol['Size']\n elif vol['VolumeType'] == 'standard':\n mag_gb += vol['Size']\n elif vol['VolumeType'] == 'st1':\n st_gb += vol['Size']\n elif vol['VolumeType'] == 'sc1':\n sc_gb += vol['Size']\n else:\n logger.error(\n \"ERROR - unknown volume type '%s' for volume %s; not counting\",\n vol['VolumeType'], vol['VolumeId'])\n self.limits['Provisioned IOPS']._add_current_usage(piops, aws_type=\n 'AWS::EC2::Volume')\n self.limits['Provisioned IOPS (SSD) storage (GiB)']._add_current_usage(\n piops_gb, aws_type='AWS::EC2::Volume')\n self.limits['General Purpose (SSD) volume storage (GiB)'\n ]._add_current_usage(gp_gb, aws_type='AWS::EC2::Volume')\n self.limits['Magnetic volume storage (GiB)']._add_current_usage(mag_gb,\n aws_type='AWS::EC2::Volume')\n self.limits['Throughput Optimized (HDD) volume storage (GiB)'\n ]._add_current_usage(st_gb, aws_type='AWS::EC2::Volume')\n self.limits['Cold (HDD) volume storage (GiB)']._add_current_usage(sc_gb,\n aws_type='AWS::EC2::Volume')\n self.limits['Active volumes']._add_current_usage(vols, aws_type=\n 'AWS::EC2::Volume')\n", "role": "user" }, { "content": "find_usage_ebs", "role": "assistant" } ]
def x(self): logger.debug('Getting usage for EBS snapshots') snaps = paginate_dict(self.conn.describe_snapshots, OwnerIds=['self'], alc_marker_path=['NextToken'], alc_data_path=['Snapshots'], alc_marker_param='NextToken') self.limits['Active snapshots']._add_current_usage(len(snaps[ 'Snapshots']), aws_type='AWS::EC2::VolumeSnapshot')
find_usage_snapshots
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Getting usage for EBS snapshots')\n snaps = paginate_dict(self.conn.describe_snapshots, OwnerIds=['self'],\n alc_marker_path=['NextToken'], alc_data_path=['Snapshots'],\n alc_marker_param='NextToken')\n self.limits['Active snapshots']._add_current_usage(len(snaps[\n 'Snapshots']), aws_type='AWS::EC2::VolumeSnapshot')\n", "role": "user" }, { "content": "find_usage_snapshots", "role": "assistant" } ]
def x(self): if self.limits != {}: return self.limits limits = {} limits.update(self._get_limits_ebs()) self.limits = limits return limits
get_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.limits != {}:\n return self.limits\n limits = {}\n limits.update(self._get_limits_ebs())\n self.limits = limits\n return limits\n", "role": "user" }, { "content": "get_limits", "role": "assistant" } ]
def x(self): limits = {} limits['Provisioned IOPS'] = AwsLimit('Provisioned IOPS', self, 200000, self.warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume', limit_subtype='io1') limits['Provisioned IOPS (SSD) storage (GiB)'] = AwsLimit( 'Provisioned IOPS (SSD) storage (GiB)', self, 102400, self. warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume', limit_subtype='io1') limits['General Purpose (SSD) volume storage (GiB)'] = AwsLimit( 'General Purpose (SSD) volume storage (GiB)', self, 102400, self. warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume', limit_subtype='gp2', ta_limit_name= 'General Purpose SSD (gp2) volume storage (GiB)') limits['Magnetic volume storage (GiB)'] = AwsLimit( 'Magnetic volume storage (GiB)', self, 20480, self. warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume', limit_subtype='standard', ta_limit_name= 'Magnetic (standard) volume storage (GiB)') limits['Throughput Optimized (HDD) volume storage (GiB)'] = AwsLimit( 'Throughput Optimized (HDD) volume storage (GiB)', self, 307200, self.warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume', limit_subtype='st1') limits['Cold (HDD) volume storage (GiB)'] = AwsLimit( 'Cold (HDD) volume storage (GiB)', self, 307200, self. warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume', limit_subtype='sc1') limits['Active snapshots'] = AwsLimit('Active snapshots', self, 10000, self.warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::VolumeSnapshot') limits['Active volumes'] = AwsLimit('Active volumes', self, 5000, self. warning_threshold, self.critical_threshold, limit_type= 'AWS::EC2::Volume') return limits
get_limits_ebs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n limits = {}\n limits['Provisioned IOPS'] = AwsLimit('Provisioned IOPS', self, 200000,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='io1')\n limits['Provisioned IOPS (SSD) storage (GiB)'] = AwsLimit(\n 'Provisioned IOPS (SSD) storage (GiB)', self, 102400, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='io1')\n limits['General Purpose (SSD) volume storage (GiB)'] = AwsLimit(\n 'General Purpose (SSD) volume storage (GiB)', self, 102400, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='gp2', ta_limit_name=\n 'General Purpose SSD (gp2) volume storage (GiB)')\n limits['Magnetic volume storage (GiB)'] = AwsLimit(\n 'Magnetic volume storage (GiB)', self, 20480, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='standard', ta_limit_name=\n 'Magnetic (standard) volume storage (GiB)')\n limits['Throughput Optimized (HDD) volume storage (GiB)'] = AwsLimit(\n 'Throughput Optimized (HDD) volume storage (GiB)', self, 307200,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='st1')\n limits['Cold (HDD) volume storage (GiB)'] = AwsLimit(\n 'Cold (HDD) volume storage (GiB)', self, 307200, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume', limit_subtype='sc1')\n limits['Active snapshots'] = AwsLimit('Active snapshots', self, 10000,\n self.warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::VolumeSnapshot')\n limits['Active volumes'] = AwsLimit('Active volumes', self, 5000, self.\n warning_threshold, self.critical_threshold, limit_type=\n 'AWS::EC2::Volume')\n return limits\n", "role": "user" }, { "content": "get_limits_ebs", "role": "assistant" } ]
def x(self, verbose=False): checker = AwsLimitChecker() checker.set_threshold_overrides(AWS_THRESHOLD_OVERRIDES) checker.set_limit_overrides(AWS_LIMIT_OVERRIDES) print( 'Checking AWS resource usage; WARNING threshold {w}% of limit, CRITICAL threshold {c}% of limit' .format(w=checker.warning_threshold, c=checker.critical_threshold)) checker.check_thresholds() warnings = [] criticals = [] for service, svc_limits in sorted(checker.get_limits().items()): for limit_name, limit in sorted(svc_limits.items()): have_alarms = False for warn in limit.get_warnings(): warnings.append(colored( "{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})" .format(service=service, limit_name=limit_name, u=str( warn), l=limit.get_limit()), 'yellow')) have_alarms = True for crit in limit.get_criticals(): criticals.append(colored( "{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})" .format(service=service, limit_name=limit_name, u=str( crit), l=limit.get_limit()), 'red')) have_alarms = True if not have_alarms and verbose: print("{service} '{limit_name}' OK: {u} (limit={l})".format (service=service, limit_name=limit_name, u=limit. get_current_usage_str(), l=limit.get_limit())) if verbose: print('\n\n') return warnings, criticals
check_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, verbose=False):\n checker = AwsLimitChecker()\n checker.set_threshold_overrides(AWS_THRESHOLD_OVERRIDES)\n checker.set_limit_overrides(AWS_LIMIT_OVERRIDES)\n print(\n 'Checking AWS resource usage; WARNING threshold {w}% of limit, CRITICAL threshold {c}% of limit'\n .format(w=checker.warning_threshold, c=checker.critical_threshold))\n checker.check_thresholds()\n warnings = []\n criticals = []\n for service, svc_limits in sorted(checker.get_limits().items()):\n for limit_name, limit in sorted(svc_limits.items()):\n have_alarms = False\n for warn in limit.get_warnings():\n warnings.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds warning threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n warn), l=limit.get_limit()), 'yellow'))\n have_alarms = True\n for crit in limit.get_criticals():\n criticals.append(colored(\n \"{service} '{limit_name}' usage ({u}) exceeds critical threshold (limit={l})\"\n .format(service=service, limit_name=limit_name, u=str(\n crit), l=limit.get_limit()), 'red'))\n have_alarms = True\n if not have_alarms and verbose:\n print(\"{service} '{limit_name}' OK: {u} (limit={l})\".format\n (service=service, limit_name=limit_name, u=limit.\n get_current_usage_str(), l=limit.get_limit()))\n if verbose:\n print('\\n\\n')\n return warnings, criticals\n", "role": "user" }, { "content": "check_limits", "role": "assistant" } ]
def x(self, error_on_warning=False, verbose=False): warnings, criticals = self.check_limits(verbose=verbose) if len(warnings) > 0: print('\nWARNING:\n') for w in warnings: print(w) if len(criticals) > 0: print('\nCRITICAL:\n') for c in criticals: print(c) if len(warnings) > 0 or len(criticals) > 0: print( '\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold' .format(c=len(criticals), w=len(warnings))) else: print('All limits are within thresholds.') if len(warnings) > 0 and error_on_warning or len(criticals) > 0: raise SystemExit(1)
run
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, error_on_warning=False, verbose=False):\n warnings, criticals = self.check_limits(verbose=verbose)\n if len(warnings) > 0:\n print('\\nWARNING:\\n')\n for w in warnings:\n print(w)\n if len(criticals) > 0:\n print('\\nCRITICAL:\\n')\n for c in criticals:\n print(c)\n if len(warnings) > 0 or len(criticals) > 0:\n print(\n '\\n{c} limit(s) above CRITICAL threshold; {w} limit(s) above WARNING threshold'\n .format(c=len(criticals), w=len(warnings)))\n else:\n print('All limits are within thresholds.')\n if len(warnings) > 0 and error_on_warning or len(criticals) > 0:\n raise SystemExit(1)\n", "role": "user" }, { "content": "run", "role": "assistant" } ]
def x(self, limit_name, value, override_ta=True): try: self.limits[limit_name].set_limit_override(value, override_ta= override_ta) logger.debug('Overriding %s limit %s; default=%d override=%d', self .service_name, limit_name, value, self.limits[limit_name]. default_limit) except KeyError: raise ValueError("{s} service has no '{l}' limit".format(s=self. service_name, l=limit_name))
set_limit_override
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, limit_name, value, override_ta=True):\n try:\n self.limits[limit_name].set_limit_override(value, override_ta=\n override_ta)\n logger.debug('Overriding %s limit %s; default=%d override=%d', self\n .service_name, limit_name, value, self.limits[limit_name].\n default_limit)\n except KeyError:\n raise ValueError(\"{s} service has no '{l}' limit\".format(s=self.\n service_name, l=limit_name))\n", "role": "user" }, { "content": "set_limit_override", "role": "assistant" } ]
def x(self, limit_name, value): try: self.limits[limit_name]._set_ta_limit(value) logger.debug('Setting %s limit %s TA limit to %d', self. service_name, limit_name, value) except KeyError: raise ValueError("{s} service has no '{l}' limit".format(s=self. service_name, l=limit_name))
set_ta_limit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, limit_name, value):\n try:\n self.limits[limit_name]._set_ta_limit(value)\n logger.debug('Setting %s limit %s TA limit to %d', self.\n service_name, limit_name, value)\n except KeyError:\n raise ValueError(\"{s} service has no '{l}' limit\".format(s=self.\n service_name, l=limit_name))\n", "role": "user" }, { "content": "set_ta_limit", "role": "assistant" } ]
def x(self, limit_name, warn_percent=None, warn_count=None, crit_percent= None, crit_count=None): try: self.limits[limit_name].set_threshold_override(warn_percent= warn_percent, warn_count=warn_count, crit_percent=crit_percent, crit_count=crit_count) except KeyError: raise ValueError("{s} service has no '{l}' limit".format(s=self. service_name, l=limit_name))
set_threshold_override
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, limit_name, warn_percent=None, warn_count=None, crit_percent=\n None, crit_count=None):\n try:\n self.limits[limit_name].set_threshold_override(warn_percent=\n warn_percent, warn_count=warn_count, crit_percent=crit_percent,\n crit_count=crit_count)\n except KeyError:\n raise ValueError(\"{s} service has no '{l}' limit\".format(s=self.\n service_name, l=limit_name))\n", "role": "user" }, { "content": "set_threshold_override", "role": "assistant" } ]
def x(self): if not self._have_usage: self.find_usage() ret = {} for name, limit in self.limits.items(): if limit.check_thresholds() is False: ret[name] = limit return ret
check_thresholds
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._have_usage:\n self.find_usage()\n ret = {}\n for name, limit in self.limits.items():\n if limit.check_thresholds() is False:\n ret[name] = limit\n return ret\n", "role": "user" }, { "content": "check_thresholds", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect() for lim in self.limits.values(): lim._reset_usage() self._find_cluster_manual_snapshots() self._find_cluster_subnet_groups() self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_cluster_manual_snapshots()\n self._find_cluster_subnet_groups()\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(docname, ref_to, title): txt = Text(title, rawsource=title) newchild = inline(':ref:`%s`' % ref_to, '', txt, classes=['xref', 'std', 'std-ref']) newnode = pending_xref(':ref:`%s`' % ref_to, newchild, reftype='ref', refwarn='True', reftarget=ref_to, refexplicit='False', refdomain= 'std', refdoc=docname) return newnode
label_ref_node
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(docname, ref_to, title):\n txt = Text(title, rawsource=title)\n newchild = inline(':ref:`%s`' % ref_to, '', txt, classes=['xref', 'std',\n 'std-ref'])\n newnode = pending_xref(':ref:`%s`' % ref_to, newchild, reftype='ref',\n refwarn='True', reftarget=ref_to, refexplicit='False', refdomain=\n 'std', refdoc=docname)\n return newnode\n", "role": "user" }, { "content": "label_ref_node", "role": "assistant" } ]
def x(_, doctree): docname = os.path.splitext(os.path.basename(doctree.attributes['source']))[ 0] if docname == 'changes': ref_mapping = { 'http://awslimitchecker.readthedocs.io/en/latest/limits.html#ec2': [label_ref_node, docname, 'limits.ec2', 'the EC2 limit documentation'], 'https://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.limit.html#awslimitchecker.limit.AwsLimit.get_limit' : [meth_ref_node, docname, 'awslimitchecker.limit.AwsLimit.get_limit'], 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor' : [label_ref_node, docname, 'getting_started.trusted_advisor', 'Getting Started - Trusted Advisor'], 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.check_thresholds' : [meth_ref_node, docname, 'awslimitchecker.checker.AwsLimitChecker.check_thresholds'], 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.find_usage' : [meth_ref_node, docname, 'awslimitchecker.checker.AwsLimitChecker.find_usage'], 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.get_limits' : [meth_ref_node, docname, 'awslimitchecker.checker.AwsLimitChecker.get_limits']} doctree.walk(LinkToRefVisitor(doctree, ref_mapping)) if docname == 'index': ref_mapping = { 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html' : [label_ref_node, docname, 'getting_started', 'Getting Started'], 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#credentials' : [label_ref_node, docname, 'getting_started.credentials', 'Credentials'], 'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html' : [label_ref_node, docname, 'getting_help', 'Getting Help'], 'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html#enterprise-support-agreements-and-contract-development' : [label_ref_node, docname, 'getting_help.paid_support', 'Enterprise Support Agreements and Contract Development'], 'http://awslimitchecker.readthedocs.io/en/latest/changes.html': [label_ref_node, docname, 'changes', 'Changelog'], 'http://awslimitchecker.readthedocs.io/en/latest/development.html#agpl-license' : [label_ref_node, docname, 'development.agpl', 'Development / AGPL'], 'http://awslimitchecker.readthedocs.org/en/latest/development.html#pull-requests' : [label_ref_node, docname, 'development.pull_requests', 'development documentation'], 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor' : [label_ref_node, docname, 'getting_started.trusted_advisor', 'Getting Started - Trusted Advisor']} doctree.walk(LinkToRefVisitor(doctree, ref_mapping))
on_doctree_read
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(_, doctree):\n docname = os.path.splitext(os.path.basename(doctree.attributes['source']))[\n 0]\n if docname == 'changes':\n ref_mapping = {\n 'http://awslimitchecker.readthedocs.io/en/latest/limits.html#ec2':\n [label_ref_node, docname, 'limits.ec2',\n 'the EC2 limit documentation'],\n 'https://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.limit.html#awslimitchecker.limit.AwsLimit.get_limit'\n : [meth_ref_node, docname,\n 'awslimitchecker.limit.AwsLimit.get_limit'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor'\n : [label_ref_node, docname, 'getting_started.trusted_advisor',\n 'Getting Started - Trusted Advisor'],\n 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.check_thresholds'\n : [meth_ref_node, docname,\n 'awslimitchecker.checker.AwsLimitChecker.check_thresholds'],\n 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.find_usage'\n : [meth_ref_node, docname,\n 'awslimitchecker.checker.AwsLimitChecker.find_usage'],\n 'http://awslimitchecker.readthedocs.io/en/latest/awslimitchecker.checker.html#awslimitchecker.checker.AwsLimitChecker.get_limits'\n : [meth_ref_node, docname,\n 'awslimitchecker.checker.AwsLimitChecker.get_limits']}\n doctree.walk(LinkToRefVisitor(doctree, ref_mapping))\n if docname == 'index':\n ref_mapping = {\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html'\n : [label_ref_node, docname, 'getting_started',\n 'Getting Started'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#credentials'\n : [label_ref_node, docname, 'getting_started.credentials',\n 'Credentials'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html'\n : [label_ref_node, docname, 'getting_help', 'Getting Help'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_help.html#enterprise-support-agreements-and-contract-development'\n : [label_ref_node, docname, 'getting_help.paid_support',\n 'Enterprise Support Agreements and Contract Development'],\n 'http://awslimitchecker.readthedocs.io/en/latest/changes.html':\n [label_ref_node, docname, 'changes', 'Changelog'],\n 'http://awslimitchecker.readthedocs.io/en/latest/development.html#agpl-license'\n : [label_ref_node, docname, 'development.agpl',\n 'Development / AGPL'],\n 'http://awslimitchecker.readthedocs.org/en/latest/development.html#pull-requests'\n : [label_ref_node, docname, 'development.pull_requests',\n 'development documentation'],\n 'http://awslimitchecker.readthedocs.io/en/latest/getting_started.html#trusted-advisor'\n : [label_ref_node, docname, 'getting_started.trusted_advisor',\n 'Getting Started - Trusted Advisor']}\n doctree.walk(LinkToRefVisitor(doctree, ref_mapping))\n", "role": "user" }, { "content": "on_doctree_read", "role": "assistant" } ]
def x(self, node): if self.lastref is None: return if self.lastref.attributes['name'].lower() not in node.attributes['names' ] and self.lastref.attributes['name'].lower() not in node.attributes[ 'dupnames']: return if node.attributes['refuri'] not in self.replacements: return params = self.replacements[node.attributes['refuri']] meth = params[0] args = params[1:] node.parent.remove(node) self.lastref.parent.replace(self.lastref, meth(*args))
visit_target
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, node):\n if self.lastref is None:\n return\n if self.lastref.attributes['name'].lower() not in node.attributes['names'\n ] and self.lastref.attributes['name'].lower() not in node.attributes[\n 'dupnames']:\n return\n if node.attributes['refuri'] not in self.replacements:\n return\n params = self.replacements[node.attributes['refuri']]\n meth = params[0]\n args = params[1:]\n node.parent.remove(node)\n self.lastref.parent.replace(self.lastref, meth(*args))\n", "role": "user" }, { "content": "visit_target", "role": "assistant" } ]
def x(self): logger.debug('Checking usage for service %s', self.service_name) self.connect() self.connect_resource() for lim in self.limits.values(): lim._reset_usage() self._find_usage_instances() self._find_usage_networking_sgs() self._find_usage_networking_eips() self._find_usage_networking_eni_sg() self._find_usage_spot_instances() self._find_usage_spot_fleets() self._have_usage = True logger.debug('Done checking usage.')
find_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Checking usage for service %s', self.service_name)\n self.connect()\n self.connect_resource()\n for lim in self.limits.values():\n lim._reset_usage()\n self._find_usage_instances()\n self._find_usage_networking_sgs()\n self._find_usage_networking_eips()\n self._find_usage_networking_eni_sg()\n self._find_usage_spot_instances()\n self._find_usage_spot_fleets()\n self._have_usage = True\n logger.debug('Done checking usage.')\n", "role": "user" }, { "content": "find_usage", "role": "assistant" } ]
def x(self): inst_usage = self._instance_usage() res_usage = self._get_reserved_instance_count() logger.debug('Reserved instance count: %s', res_usage) total_ris = 0 running_ris = 0 ondemand_usage = defaultdict(int) for az in inst_usage: if az not in res_usage: for i_type, count in inst_usage[az].items(): ondemand_usage[i_type] += count continue for i_type, count in inst_usage[az].items(): if i_type not in res_usage[az]: ondemand_usage[i_type] += count continue od = count - res_usage[az][i_type] total_ris += res_usage[az][i_type] if count < res_usage[az][i_type]: running_ris += count else: running_ris += res_usage[az][i_type] if od < 0: continue ondemand_usage[i_type] += od logger.debug('Found %d total RIs and %d running/used RIs', total_ris, running_ris) total_instances = 0 for i_type, usage in ondemand_usage.items(): key = 'Running On-Demand {t} instances'.format(t=i_type) self.limits[key]._add_current_usage(usage, aws_type= 'AWS::EC2::Instance') total_instances += usage key = 'Running On-Demand EC2 instances' self.limits[key]._add_current_usage(total_instances, aws_type= 'AWS::EC2::Instance')
find_usage_instances
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n inst_usage = self._instance_usage()\n res_usage = self._get_reserved_instance_count()\n logger.debug('Reserved instance count: %s', res_usage)\n total_ris = 0\n running_ris = 0\n ondemand_usage = defaultdict(int)\n for az in inst_usage:\n if az not in res_usage:\n for i_type, count in inst_usage[az].items():\n ondemand_usage[i_type] += count\n continue\n for i_type, count in inst_usage[az].items():\n if i_type not in res_usage[az]:\n ondemand_usage[i_type] += count\n continue\n od = count - res_usage[az][i_type]\n total_ris += res_usage[az][i_type]\n if count < res_usage[az][i_type]:\n running_ris += count\n else:\n running_ris += res_usage[az][i_type]\n if od < 0:\n continue\n ondemand_usage[i_type] += od\n logger.debug('Found %d total RIs and %d running/used RIs', total_ris,\n running_ris)\n total_instances = 0\n for i_type, usage in ondemand_usage.items():\n key = 'Running On-Demand {t} instances'.format(t=i_type)\n self.limits[key]._add_current_usage(usage, aws_type=\n 'AWS::EC2::Instance')\n total_instances += usage\n key = 'Running On-Demand EC2 instances'\n self.limits[key]._add_current_usage(total_instances, aws_type=\n 'AWS::EC2::Instance')\n", "role": "user" }, { "content": "find_usage_instances", "role": "assistant" } ]
def x(self): logger.debug('Getting spot instance request usage') try: res = self.conn.describe_spot_instance_requests() except botocore.exceptions.ClientError as e: if e.response['Error']['Code'] == 'UnsupportedOperation': return raise count = 0 for req in res['SpotInstanceRequests']: if req['State'] in ['open', 'active']: count += 1 logger.debug('Counting spot instance request %s state=%s', req[ 'SpotInstanceRequestId'], req['State']) else: logger.debug('NOT counting spot instance request %s state=%s', req['SpotInstanceRequestId'], req['State']) self.limits['Max spot instance requests per region']._add_current_usage( count, aws_type='AWS::EC2::SpotInstanceRequest')
find_usage_spot_instances
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Getting spot instance request usage')\n try:\n res = self.conn.describe_spot_instance_requests()\n except botocore.exceptions.ClientError as e:\n if e.response['Error']['Code'] == 'UnsupportedOperation':\n return\n raise\n count = 0\n for req in res['SpotInstanceRequests']:\n if req['State'] in ['open', 'active']:\n count += 1\n logger.debug('Counting spot instance request %s state=%s', req[\n 'SpotInstanceRequestId'], req['State'])\n else:\n logger.debug('NOT counting spot instance request %s state=%s',\n req['SpotInstanceRequestId'], req['State'])\n self.limits['Max spot instance requests per region']._add_current_usage(\n count, aws_type='AWS::EC2::SpotInstanceRequest')\n", "role": "user" }, { "content": "find_usage_spot_instances", "role": "assistant" } ]
def x(self): logger.debug('Getting spot fleet request usage') try: res = self.conn.describe_spot_fleet_requests() except botocore.exceptions.ClientError as e: if e.response['Error']['Code'] == 'UnsupportedOperation': return raise if 'NextToken' in res: logger.error( 'Error: describe_spot_fleet_requests() response includes pagination token, but pagination not configured in awslimitchecker.' ) active_fleets = 0 total_target_cap = 0 lim_cap_per_fleet = self.limits['Max target capacity per spot fleet'] lim_launch_specs = self.limits['Max launch specifications per spot fleet'] for fleet in res['SpotFleetRequestConfigs']: _id = fleet['SpotFleetRequestId'] if fleet['SpotFleetRequestState'] != 'active': logger.debug('Skipping spot fleet request %s in state %s', _id, fleet['SpotFleetRequestState']) continue active_fleets += 1 cap = fleet['SpotFleetRequestConfig']['TargetCapacity'] launch_specs = len(fleet['SpotFleetRequestConfig'][ 'LaunchSpecifications']) total_target_cap += cap lim_cap_per_fleet._add_current_usage(cap, resource_id=_id, aws_type ='AWS::EC2::SpotFleetRequest') lim_launch_specs._add_current_usage(launch_specs, resource_id=_id, aws_type='AWS::EC2::SpotFleetRequest') self.limits['Max active spot fleets per region']._add_current_usage( active_fleets, aws_type='AWS::EC2::SpotFleetRequest') self.limits['Max target capacity for all spot fleets in region' ]._add_current_usage(total_target_cap, aws_type= 'AWS::EC2::SpotFleetRequest')
find_usage_spot_fleets
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n logger.debug('Getting spot fleet request usage')\n try:\n res = self.conn.describe_spot_fleet_requests()\n except botocore.exceptions.ClientError as e:\n if e.response['Error']['Code'] == 'UnsupportedOperation':\n return\n raise\n if 'NextToken' in res:\n logger.error(\n 'Error: describe_spot_fleet_requests() response includes pagination token, but pagination not configured in awslimitchecker.'\n )\n active_fleets = 0\n total_target_cap = 0\n lim_cap_per_fleet = self.limits['Max target capacity per spot fleet']\n lim_launch_specs = self.limits['Max launch specifications per spot fleet']\n for fleet in res['SpotFleetRequestConfigs']:\n _id = fleet['SpotFleetRequestId']\n if fleet['SpotFleetRequestState'] != 'active':\n logger.debug('Skipping spot fleet request %s in state %s', _id,\n fleet['SpotFleetRequestState'])\n continue\n active_fleets += 1\n cap = fleet['SpotFleetRequestConfig']['TargetCapacity']\n launch_specs = len(fleet['SpotFleetRequestConfig'][\n 'LaunchSpecifications'])\n total_target_cap += cap\n lim_cap_per_fleet._add_current_usage(cap, resource_id=_id, aws_type\n ='AWS::EC2::SpotFleetRequest')\n lim_launch_specs._add_current_usage(launch_specs, resource_id=_id,\n aws_type='AWS::EC2::SpotFleetRequest')\n self.limits['Max active spot fleets per region']._add_current_usage(\n active_fleets, aws_type='AWS::EC2::SpotFleetRequest')\n self.limits['Max target capacity for all spot fleets in region'\n ]._add_current_usage(total_target_cap, aws_type=\n 'AWS::EC2::SpotFleetRequest')\n", "role": "user" }, { "content": "find_usage_spot_fleets", "role": "assistant" } ]
def x(self): reservations = defaultdict(int) az_to_res = {} logger.debug('Getting reserved instance information') res = self.conn.describe_reserved_instances() for x in res['ReservedInstances']: if x['State'] != 'active': logger.debug('Skipping ReservedInstance %s with state %s', x[ 'ReservedInstancesId'], x['State']) continue if 'AvailabilityZone' not in x: x['AvailabilityZone'] = RI_NO_AZ if x['AvailabilityZone'] not in az_to_res: az_to_res[x['AvailabilityZone']] = deepcopy(reservations) az_to_res[x['AvailabilityZone']][x['InstanceType']] += x[ 'InstanceCount'] for x in az_to_res: az_to_res[x] = dict(az_to_res[x]) return az_to_res
get_reserved_instance_count
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n reservations = defaultdict(int)\n az_to_res = {}\n logger.debug('Getting reserved instance information')\n res = self.conn.describe_reserved_instances()\n for x in res['ReservedInstances']:\n if x['State'] != 'active':\n logger.debug('Skipping ReservedInstance %s with state %s', x[\n 'ReservedInstancesId'], x['State'])\n continue\n if 'AvailabilityZone' not in x:\n x['AvailabilityZone'] = RI_NO_AZ\n if x['AvailabilityZone'] not in az_to_res:\n az_to_res[x['AvailabilityZone']] = deepcopy(reservations)\n az_to_res[x['AvailabilityZone']][x['InstanceType']] += x[\n 'InstanceCount']\n for x in az_to_res:\n az_to_res[x] = dict(az_to_res[x])\n return az_to_res\n", "role": "user" }, { "content": "get_reserved_instance_count", "role": "assistant" } ]
def x(self): ondemand = {} for t in self._instance_types(): ondemand[t] = 0 az_to_inst = {} logger.debug('Getting usage for on-demand instances') for inst in self.resource_conn.instances.all(): if inst.spot_instance_request_id: logger.info( 'Spot instance found (%s); skipping from Running On-Demand Instances count' , inst.id) continue if inst.state['Name'] in ['stopped', 'terminated']: logger.debug('Ignoring instance %s in state %s', inst.id, inst. state['Name']) continue if inst.placement['AvailabilityZone'] not in az_to_inst: az_to_inst[inst.placement['AvailabilityZone']] = deepcopy(ondemand) try: az_to_inst[inst.placement['AvailabilityZone']][inst.instance_type ] += 1 except KeyError: logger.error("ERROR - unknown instance type '%s'; not counting", inst.instance_type) return az_to_inst
instance_usage
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n ondemand = {}\n for t in self._instance_types():\n ondemand[t] = 0\n az_to_inst = {}\n logger.debug('Getting usage for on-demand instances')\n for inst in self.resource_conn.instances.all():\n if inst.spot_instance_request_id:\n logger.info(\n 'Spot instance found (%s); skipping from Running On-Demand Instances count'\n , inst.id)\n continue\n if inst.state['Name'] in ['stopped', 'terminated']:\n logger.debug('Ignoring instance %s in state %s', inst.id, inst.\n state['Name'])\n continue\n if inst.placement['AvailabilityZone'] not in az_to_inst:\n az_to_inst[inst.placement['AvailabilityZone']] = deepcopy(ondemand)\n try:\n az_to_inst[inst.placement['AvailabilityZone']][inst.instance_type\n ] += 1\n except KeyError:\n logger.error(\"ERROR - unknown instance type '%s'; not counting\",\n inst.instance_type)\n return az_to_inst\n", "role": "user" }, { "content": "instance_usage", "role": "assistant" } ]
def x(self): if self.limits != {}: return self.limits limits = {} limits.update(self._get_limits_instances()) limits.update(self._get_limits_networking()) limits.update(self._get_limits_spot()) self.limits = limits return self.limits
get_limits
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.limits != {}:\n return self.limits\n limits = {}\n limits.update(self._get_limits_instances())\n limits.update(self._get_limits_networking())\n limits.update(self._get_limits_spot())\n self.limits = limits\n return self.limits\n", "role": "user" }, { "content": "get_limits", "role": "assistant" } ]
def x(self): self.connect() self.connect_resource() logger.info('Querying EC2 DescribeAccountAttributes for limits') attribs = self.conn.describe_account_attributes() for attrib in attribs['AccountAttributes']: aname = attrib['AttributeName'] val = attrib['AttributeValues'][0]['AttributeValue'] lname = None if aname == 'max-elastic-ips': lname = 'Elastic IP addresses (EIPs)' elif aname == 'max-instances': lname = 'Running On-Demand EC2 instances' elif aname == 'vpc-max-elastic-ips': lname = 'VPC Elastic IP addresses (EIPs)' elif aname == 'vpc-max-security-groups-per-interface': lname = 'VPC security groups per elastic network interface' if lname is not None: if int(val) == 0: continue self.limits[lname]._set_api_limit(int(val)) logger.debug('Done setting limits from API')
update_limits_from_api
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.connect()\n self.connect_resource()\n logger.info('Querying EC2 DescribeAccountAttributes for limits')\n attribs = self.conn.describe_account_attributes()\n for attrib in attribs['AccountAttributes']:\n aname = attrib['AttributeName']\n val = attrib['AttributeValues'][0]['AttributeValue']\n lname = None\n if aname == 'max-elastic-ips':\n lname = 'Elastic IP addresses (EIPs)'\n elif aname == 'max-instances':\n lname = 'Running On-Demand EC2 instances'\n elif aname == 'vpc-max-elastic-ips':\n lname = 'VPC Elastic IP addresses (EIPs)'\n elif aname == 'vpc-max-security-groups-per-interface':\n lname = 'VPC security groups per elastic network interface'\n if lname is not None:\n if int(val) == 0:\n continue\n self.limits[lname]._set_api_limit(int(val))\n logger.debug('Done setting limits from API')\n", "role": "user" }, { "content": "update_limits_from_api", "role": "assistant" } ]
def x(self): default_limits = 20, 20, 5 special_limits = {'c4.4xlarge': (10, 20, 5), 'c4.8xlarge': (5, 20, 5), 'c5.4xlarge': (10, 20, 5), 'c5.9xlarge': (5, 20, 5), 'c5.18xlarge': (5, 20, 5), 'cg1.4xlarge': (2, 20, 5), 'cr1.8xlarge': (2, 20, 5), 'd2.4xlarge': (10, 20, 5), 'd2.8xlarge': (5, 20, 5), 'g2.2xlarge': (5, 20, 5), 'g2.8xlarge': (2, 20, 5), 'g3.4xlarge': (1, 20, 5), 'g3.8xlarge': (1, 20, 5), 'g3.16xlarge': (1, 20, 5), 'h1.8xlarge': (10, 20, 5), 'h1.16xlarge': (5, 20, 5), 'hi1.4xlarge': (2, 20, 5), 'hs1.8xlarge': (2, 20, 0), 'i2.2xlarge': (8, 20, 0), 'i2.4xlarge': (4, 20, 0), 'i2.8xlarge': (2, 20, 0), 'i2.xlarge': (8, 20, 0), 'i3.2xlarge': (2, 20, 0), 'i3.4xlarge': (2, 20, 0), 'i3.8xlarge': ( 2, 20, 0), 'i3.16xlarge': (2, 20, 0), 'i3.large': (2, 20, 0), 'i3.xlarge': (2, 20, 0), 'm4.4xlarge': (10, 20, 5), 'm4.10xlarge': (5, 20, 5), 'm4.16xlarge': (5, 20, 5), 'm5.4xlarge': (10, 20, 5), 'm5.12xlarge': (5, 20, 5), 'm5.24xlarge': (5, 20, 5), 'p2.8xlarge': (1, 20, 5), 'p2.16xlarge': (1, 20, 5), 'p2.xlarge': (1, 20, 5), 'p3.2xlarge': (1, 20, 5), 'p3.8xlarge': (1, 20, 5), 'p3.16xlarge': (1, 20, 5), 'p3dn.24xlarge': (1, 20, 5), 'r3.4xlarge': (10, 20, 5), 'r3.8xlarge': (5, 20, 5), 'r4.4xlarge': (10, 20, 5), 'r4.8xlarge': (5, 20, 5), 'r4.16xlarge': (1, 20, 5)} limits = {} for i_type in self._instance_types(): key = 'Running On-Demand {t} instances'.format(t=i_type) lim = default_limits[0] if i_type in special_limits: lim = special_limits[i_type][0] limits[key] = AwsLimit(key, self, lim, self.warning_threshold, self .critical_threshold, limit_type='On-Demand instances', limit_subtype=i_type, ta_limit_name='On-Demand instances - %s' % i_type) key = 'Running On-Demand EC2 instances' limits[key] = AwsLimit(key, self, default_limits[0], self. warning_threshold, self.critical_threshold, limit_type= 'On-Demand instances') return limits
get_limits_instances
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n default_limits = 20, 20, 5\n special_limits = {'c4.4xlarge': (10, 20, 5), 'c4.8xlarge': (5, 20, 5),\n 'c5.4xlarge': (10, 20, 5), 'c5.9xlarge': (5, 20, 5), 'c5.18xlarge':\n (5, 20, 5), 'cg1.4xlarge': (2, 20, 5), 'cr1.8xlarge': (2, 20, 5),\n 'd2.4xlarge': (10, 20, 5), 'd2.8xlarge': (5, 20, 5), 'g2.2xlarge':\n (5, 20, 5), 'g2.8xlarge': (2, 20, 5), 'g3.4xlarge': (1, 20, 5),\n 'g3.8xlarge': (1, 20, 5), 'g3.16xlarge': (1, 20, 5), 'h1.8xlarge':\n (10, 20, 5), 'h1.16xlarge': (5, 20, 5), 'hi1.4xlarge': (2, 20, 5),\n 'hs1.8xlarge': (2, 20, 0), 'i2.2xlarge': (8, 20, 0), 'i2.4xlarge':\n (4, 20, 0), 'i2.8xlarge': (2, 20, 0), 'i2.xlarge': (8, 20, 0),\n 'i3.2xlarge': (2, 20, 0), 'i3.4xlarge': (2, 20, 0), 'i3.8xlarge': (\n 2, 20, 0), 'i3.16xlarge': (2, 20, 0), 'i3.large': (2, 20, 0),\n 'i3.xlarge': (2, 20, 0), 'm4.4xlarge': (10, 20, 5), 'm4.10xlarge':\n (5, 20, 5), 'm4.16xlarge': (5, 20, 5), 'm5.4xlarge': (10, 20, 5),\n 'm5.12xlarge': (5, 20, 5), 'm5.24xlarge': (5, 20, 5), 'p2.8xlarge':\n (1, 20, 5), 'p2.16xlarge': (1, 20, 5), 'p2.xlarge': (1, 20, 5),\n 'p3.2xlarge': (1, 20, 5), 'p3.8xlarge': (1, 20, 5), 'p3.16xlarge':\n (1, 20, 5), 'p3dn.24xlarge': (1, 20, 5), 'r3.4xlarge': (10, 20, 5),\n 'r3.8xlarge': (5, 20, 5), 'r4.4xlarge': (10, 20, 5), 'r4.8xlarge':\n (5, 20, 5), 'r4.16xlarge': (1, 20, 5)}\n limits = {}\n for i_type in self._instance_types():\n key = 'Running On-Demand {t} instances'.format(t=i_type)\n lim = default_limits[0]\n if i_type in special_limits:\n lim = special_limits[i_type][0]\n limits[key] = AwsLimit(key, self, lim, self.warning_threshold, self\n .critical_threshold, limit_type='On-Demand instances',\n limit_subtype=i_type, ta_limit_name='On-Demand instances - %s' %\n i_type)\n key = 'Running On-Demand EC2 instances'\n limits[key] = AwsLimit(key, self, default_limits[0], self.\n warning_threshold, self.critical_threshold, limit_type=\n 'On-Demand instances')\n return limits\n", "role": "user" }, { "content": "get_limits_instances", "role": "assistant" } ]