Name | resoto-plugin-aws JSON |
Version |
3.9.0
JSON |
| download |
home_page | |
Summary | Runs collector plugins and sends the result to resotocore. |
upload_time | 2024-02-20 18:26:59 |
maintainer | |
docs_url | None |
author | Some Engineering Inc. |
requires_python | >=3.9 |
license | AGPLv3 |
keywords |
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
# resoto-plugin-aws
An AWS collector plugin for Resoto.
## Usage
For details on how to edit configuration, please see [the documentation](https://resoto.com/docs/getting-started/configuring-resoto).
When the collector is enabled (`resotoworker.collector = [aws]`) it will automatically collect any accounts the AWS boto3 SDK can authenticate for.
By default it will check for environment variables like `AWS_ACCESS_KEY_ID`, `AWS_SECRET_ACCESS_KEY` or `AWS_SESSION_TOKEN`.
If Resoto should assume an IAM role that role can be given via `resotoworker.aws.role = SomeRoleName`.
The collector will scrape resources in all regions unless regions are specified using e.g. `resotoworker.aws.region = [us-east-1, us-west-2]`.
## Scraping multiple accounts
If the given credentials are allowed to assume the specified role in other accounts of your AWS organisation, Resoto
can collect multiple accounts at the same time. To do so provide the account IDs to the `resotoworker.aws.account` configuration.
## Scraping the entire organisation
Instead of giving a list of account IDs manually you could also specify `resotoworker.aws.scrape_org`, which will make Resoto try to get the list of all accounts using the [ListAccounts](https://docs.aws.amazon.com/organizations/latest/APIReference/API_ListAccounts.html) API.
If certain accounts are to be excluded from that list they can be specified using the `resotoworker.aws.scrape_exclude_account` config option.
## Miscellaneous Options
When collecting multiple accounts Resoto by default will collect the accounts it finds in the org as well as the one it is currently authenticated as.
If you do not want it to scrape the account that was used to get the list of all org accounts (e.g. your root account) you can specify `resotoworker.aws.dont_scrape_current`.
If instead of using the current credentials you would like Resoto to assume the specified role (`resotoworker.aws.role`) even for the current account you can specify the options
`resotoworker.aws.assume_current` and `resotoworker.aws.dont_scrape_current`. This would make it so that Resoto does not scrape the current account using default credentials but instead assume the specified IAM role even for the current account.
## License
See [LICENSE](../../LICENSE) for details.
Raw data
{
"_id": null,
"home_page": "",
"name": "resoto-plugin-aws",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.9",
"maintainer_email": "",
"keywords": "",
"author": "Some Engineering Inc.",
"author_email": "",
"download_url": "https://files.pythonhosted.org/packages/94/dc/8be46f890bb2bf60f59e8935e61162fd96963890a02a830b9d32416eebcc/resoto-plugin-aws-3.9.0.tar.gz",
"platform": null,
"description": "# resoto-plugin-aws\nAn AWS collector plugin for Resoto.\n\n## Usage\nFor details on how to edit configuration, please see [the documentation](https://resoto.com/docs/getting-started/configuring-resoto).\n\nWhen the collector is enabled (`resotoworker.collector = [aws]`) it will automatically collect any accounts the AWS boto3 SDK can authenticate for.\nBy default it will check for environment variables like `AWS_ACCESS_KEY_ID`, `AWS_SECRET_ACCESS_KEY` or `AWS_SESSION_TOKEN`.\n\nIf Resoto should assume an IAM role that role can be given via `resotoworker.aws.role = SomeRoleName`.\n\nThe collector will scrape resources in all regions unless regions are specified using e.g. `resotoworker.aws.region = [us-east-1, us-west-2]`.\n\n\n## Scraping multiple accounts\nIf the given credentials are allowed to assume the specified role in other accounts of your AWS organisation, Resoto\ncan collect multiple accounts at the same time. To do so provide the account IDs to the `resotoworker.aws.account` configuration.\n\n## Scraping the entire organisation\nInstead of giving a list of account IDs manually you could also specify `resotoworker.aws.scrape_org`, which will make Resoto try to get the list of all accounts using the [ListAccounts](https://docs.aws.amazon.com/organizations/latest/APIReference/API_ListAccounts.html) API.\n\nIf certain accounts are to be excluded from that list they can be specified using the `resotoworker.aws.scrape_exclude_account` config option.\n\n## Miscellaneous Options\nWhen collecting multiple accounts Resoto by default will collect the accounts it finds in the org as well as the one it is currently authenticated as.\nIf you do not want it to scrape the account that was used to get the list of all org accounts (e.g. your root account) you can specify `resotoworker.aws.dont_scrape_current`.\n\nIf instead of using the current credentials you would like Resoto to assume the specified role (`resotoworker.aws.role`) even for the current account you can specify the options\n`resotoworker.aws.assume_current` and `resotoworker.aws.dont_scrape_current`. This would make it so that Resoto does not scrape the current account using default credentials but instead assume the specified IAM role even for the current account.\n\n## License\nSee [LICENSE](../../LICENSE) for details.\n",
"bugtrack_url": null,
"license": "AGPLv3",
"summary": "Runs collector plugins and sends the result to resotocore.",
"version": "3.9.0",
"project_urls": {
"Documentation": "https://resoto.com",
"Source": "https://github.com/someengineering/resoto/tree/main/plugins/aws"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "d40652a81f01b35aa20e50f3d5eb5ed3ee5a4f885b9858e844f48a6ffd623350",
"md5": "4bb7b8880df66a7d724950c38057b2d9",
"sha256": "afad3f7fd4551e2178082ac4086bf4cea3ecc4b9d708ed25405b8e28f7b88ec0"
},
"downloads": -1,
"filename": "resoto_plugin_aws-3.9.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "4bb7b8880df66a7d724950c38057b2d9",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.9",
"size": 331771,
"upload_time": "2024-02-20T18:26:56",
"upload_time_iso_8601": "2024-02-20T18:26:56.361539Z",
"url": "https://files.pythonhosted.org/packages/d4/06/52a81f01b35aa20e50f3d5eb5ed3ee5a4f885b9858e844f48a6ffd623350/resoto_plugin_aws-3.9.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "94dc8be46f890bb2bf60f59e8935e61162fd96963890a02a830b9d32416eebcc",
"md5": "e921fac10703654f80aba4feaee22f42",
"sha256": "7f2d489e8552aa766e519df53e562e626304c67ae0ba95e6ba4423b85befeea3"
},
"downloads": -1,
"filename": "resoto-plugin-aws-3.9.0.tar.gz",
"has_sig": false,
"md5_digest": "e921fac10703654f80aba4feaee22f42",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.9",
"size": 275701,
"upload_time": "2024-02-20T18:26:59",
"upload_time_iso_8601": "2024-02-20T18:26:59.248358Z",
"url": "https://files.pythonhosted.org/packages/94/dc/8be46f890bb2bf60f59e8935e61162fd96963890a02a830b9d32416eebcc/resoto-plugin-aws-3.9.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-02-20 18:26:59",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "someengineering",
"github_project": "resoto",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [],
"lcname": "resoto-plugin-aws"
}