Use case
You are in charge of several AWS accounts within an AWS Organisation and need to check the resources across these accounts. E.g., to check which are the configured runtimes for the lambdas.
Approach with Steampipe
Steampipe is a tool to query data from different providers. Among others, there is a plugin for AWS.
The big plus is that Steampipe provides the ability to query more than one account with a query with aggregator connection
This is how the result will look like for my AWS SSO accounts.
More about Steampipe and AWS: https://dev.to/aws-builders/easily-query-your-cloud-inventory-with-steampipe-2af3
Setup
It’s necessary to have a link between AWS CLI profiles and Steampipe connection for the AWS SSO accounts that can be recreated without any effects on the local setup, which is created inside a docker image. This docker image is based on Steampipe with additional installation of some tools, the AWS CLI and the AWS steampipe plugin.
Docker
The Steampipe docu is here: https://steampipe.io/docs/managing/containers
After creating the image with docker build -t steampipe-query .
. The container can be created with the following command.
These are the commands to use the container again docker start -a steampipe-query
and docker exec -it steampipe-query /bin/bash
.
Queries
One of the mount points was the folder queries, which contain, in this example, the SQL to check the lambda runtime.
The command to run this query is steampipe query queries/lambda-runtime.sql
. This will work after the scripts have created the profiles and connections config.
Scripts
The other mount points are scripts and the env file. The first step is to set the needed env variable values and then run the script ./scripts/create-aws-config.sh
inside the container, which creates the file ~/.aws/config with SS0 session values.
As next step source the env file with source .env
to get the value for the session name. Than run the login to aws sso with the command aws sso login --sso-session $SSO_SESSION_NAME
.
It will look like this.
Open the link in the browser and put in the code.
Then, allow the access.
After it’s confirmed, you can create profiles with the script ./scripts/create-aws-profiles.sh
inside the container. This will create a profile for each account in the aws config file ~/.aws/config (after confirmation) with a suffix of the assigned roles for the accounts.
The scipt is adapted from this gist: https://gist.github.com/lukeplausin/3cfedc29755e184ef526b504c77ffe70
The last step for the setup is to create the connections for Steampipe with the script ./scripts/create-aws-connections.sh
inside the container. This will create a connection for each profile in the AWS config file ~/.aws/config.
Not every role is allowed to query the data, so it’s necessary to set the env variable ALLOWED_ROLES
with the roles allowed to query the data. The roles are comma-separated. E.g.
ALLOWED_ROLES="AWSReadOnlyAccess,AWSAdministratorAccess"
And now it’s possible to run the queries with steampipe 🥳