Skip to main content

Resoto AWS Collector Plugin

Project description

resoto-plugin-aws

An AWS collector plugin for Resoto.

Usage

For details on how to edit configuration, please see the documentation.

When the collector is enabled (resotoworker.collector = [aws]) it will automatically collect any accounts the AWS boto3 SDK can authenticate for. By default it will check for environment variables like AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY or AWS_SESSION_TOKEN.

If Resoto should assume an IAM role that role can be given via resotoworker.aws.role = SomeRoleName.

The collector will scrape resources in all regions unless regions are specified using e.g. resotoworker.aws.region = [us-east-1, us-west-2].

Scraping multiple accounts

If the given credentials are allowed to assume the specified role in other accounts of your AWS organisation, Resoto can collect multiple accounts at the same time. To do so provide the account IDs to the resotoworker.aws.account configuration.

Scraping the entire organisation

Instead of giving a list of account IDs manually you could also specify resotoworker.aws.scrape_org, which will make Resoto try to get the list of all accounts using the ListAccounts API.

If certain accounts are to be excluded from that list they can be specified using the resotoworker.aws.scrape_exclude_account config option.

Miscellaneous Options

When collecting multiple accounts Resoto by default will collect the accounts it finds in the org as well as the one it is currently authenticated as. If you do not want it to scrape the account that was used to get the list of all org accounts (e.g. your root account) you can specify resotoworker.aws.dont_scrape_current.

If instead of using the current credentials you would like Resoto to assume the specified role (resotoworker.aws.role) even for the current account you can specify the options resotoworker.aws.assume_current and resotoworker.aws.dont_scrape_current. This would make it so that Resoto does not scrape the current account using default credentials but instead assume the specified IAM role even for the current account.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

resoto-plugin-aws-3.0.0a0.tar.gz (105.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

resoto_plugin_aws-3.0.0a0-py3-none-any.whl (143.0 kB view details)

Uploaded Python 3

File details

Details for the file resoto-plugin-aws-3.0.0a0.tar.gz.

File metadata

  • Download URL: resoto-plugin-aws-3.0.0a0.tar.gz
  • Upload date:
  • Size: 105.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.9.15

File hashes

Hashes for resoto-plugin-aws-3.0.0a0.tar.gz
Algorithm Hash digest
SHA256 787c7f747678ec702640c278304874a9be78f0ed8e14da853f988e10d83b9c4c
MD5 a26100334e585acefe1e7d76081b296b
BLAKE2b-256 9a6f28bdd155a703a110e763502fe358f39ac3eb416efca66463d5f59b5e3e86

See more details on using hashes here.

File details

Details for the file resoto_plugin_aws-3.0.0a0-py3-none-any.whl.

File metadata

File hashes

Hashes for resoto_plugin_aws-3.0.0a0-py3-none-any.whl
Algorithm Hash digest
SHA256 f9ee2d70b4c19d3fdda7a04d77a1cf6dfbc3a4f7ba9b3970a443fa521dd63904
MD5 0a47dd2fdda2d9054016ff6f4d0189bc
BLAKE2b-256 e435ae3eb29c4b5248462809c603fe49ed444341a92b48d6296e9eecb2aba795

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page