find last ami instance in region
aws --region eu-west-1 ec2 describe-images --owners amazon --filters 'Name=name,Values=amzn-ami-hvm-2017.??.?.????????-x86_64-gp2' 'Name=state,Values=available' | jq -r '.Images | sort_by(.CreationDate) | last(.[]).ImageId'
aws --profile ${PROFILE} ec2 describe-network-acls --region ap-southeast-1 --network-acl-ids acl-20dacc45 --output table --query 'NetworkAcls[*].Entries'
aws --region eu-west-1 --profile ${PROFILE} ec2 describe-instances --instance-ids "i-25a22f6a"
aws --region eu-west-1 --profile ${PROFILE} ec2 describe-instances --instance-ids "i-25a22f6a" | jq -r ".Reservations[].Instances[].SecurityGroups"
aws --region eu-west-1 --profile ${PROFILE} ec2 describe-instances --filters "Name=tag:Name,Values=FQDN" | jq '.Reservations[].Instances[].PrivateIpAddress'
aws --region eu-west-1 --profile ${PROFILE} ec2 describe-instances --filters "Name=tag:Name,Values=FQDN" | jq '.Reservations[].Instances[].PublicIpAddress'
list all instances while printing Name,InstanceId,VpcId,SubnetId,PrivateIp,PublicIp,SecurityGroup
aws --profile ${PROFILE} --region ap-southeast-1 ec2 describe-instances --query 'Reservations[*].Instances[*].[[Tags[?Key==`Name`].Value] [0][0],InstanceId,State.Name,VpcId,SubnetId,PrivateIpAddress,PublicIpAddress,[SecurityGroups[*].GroupName] [0][0]]' --output text | column -t
list all instances which has tag ENV=DEV
aws --profile ${PROFILE} --region eu-west-1 ec2 describe-instances --filter "Name=tag:ENV,Values=DEV" --query 'Reservations[*].Instances[*].{Name:Tags[?Key==`Name`].Value,ID:InstanceId,State:State.Name,Priv:PrivateIpAddress,Pub:PublicIpAddress}'
list instances
for item in $(aws ec2 describe-regions --query 'Regions[].{Name:RegionName}' --output text);do echo "<<< REGION ${item} >>> && ./list_instances_profile.py -c ${PROFILE} -z $item;done
aws --profile ${PROFILE} --region ap-southeast-1 ec2 describe-instances --query "Reservations[0].Instances[0].[InstanceId,PublicIpAddress,PrivateIpAddress,Tags[?Key=='Name'].Value]" --output table
list all sg which has 999 open to the world
aws --profile ${PROFILE} --region ap-southeast-1 ec2 describe-security-groups --filters Name=ip-permission.from-port,Values=999 Name=ip-permission.to-port,Values=999 Name=ip-permission.cidr,Values='0.0.0.0/0' --query 'SecurityGroups[*].{Name:GroupId}'
list all events for instances which has system-reboot events scheduled
aws --profile ${PROFILE} --region ap-southeast-1 ec2 describe-instance-status --filters "Name=event.code,Values=system-reboot" --query "InstanceStatuses[*].{Id:InstanceId,Status:[Events[*].Code] [0][0],Before:[Events[*].NotBefore] [0][0],After:[Events[*].NotAfter] [0][0]}" --output table
get console-output from instance
aws --profile ${PROFILE} --region us-east-1 ec2 get-console-output --instance-id i-d35bbb3c --query 'Output' --output text