Skip to main content

OlinData's aws cli Extras

Project description

Akinaka

This is a general all-purpose tool for managing things in AWS that Terraform is not responsible for -- you can think of it as an extension to the aws CLI.

At the moment it only does three things; blue/green deploys for plugging into Gitlab, AMI cleanups, and RDS copies to other accounts.

Installation

pip3 install akinaka

Requirements and Presumptions

Format of ASG names: "whatever-you-like*-blue/green*" — the part in bold is necessary, i.e. you must have two ASGs, one ending with "-blue" and one ending with "-green".

The following permissions are necessary for the IAM role / user that will be running Akinaka:

sts:AssumeRole

The following permissions are necessary for the IAM role that the above role /user will be assuming, if you wish to use every single feature:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "2018121701",
            "Effect": "Allow",
            "Action": [
                "ec2:AuthorizeSecurityGroupIngress",
                "ec2:DescribeInstances",
                "ec2:CreateKeyPair",
                "ec2:CreateImage",
                "ec2:CopyImage",
                "ec2:DescribeSnapshots",
                "elasticloadbalancing:DescribeLoadBalancers",
                "ec2:DeleteVolume",
                "ec2:ModifySnapshotAttribute",
                "autoscaling:DescribeAutoScalingGroups",
                "ec2:DescribeVolumes",
                "ec2:DetachVolume",
                "ec2:DescribeLaunchTemplates",
                "ec2:CreateTags",
                "ec2:RegisterImage",
                "autoscaling:DetachLoadBalancerTargetGroups",
                "ec2:RunInstances",
                "ec2:StopInstances",
                "ec2:CreateVolume",
                "autoscaling:AttachLoadBalancerTargetGroups",
                "elasticloadbalancing:DescribeLoadBalancerAttributes",
                "ec2:GetPasswordData",
                "elasticloadbalancing:DescribeTargetGroupAttributes",
                "elasticloadbalancing:DescribeAccountLimits",
                "ec2:DescribeImageAttribute",
                "elasticloadbalancing:DescribeRules",
                "ec2:DescribeSubnets",
                "ec2:DeleteKeyPair",
                "ec2:AttachVolume",
                "autoscaling:DescribeAutoScalingInstances",
                "ec2:DeregisterImage",
                "ec2:DeleteSnapshot",
                "ec2:DescribeRegions",
                "ec2:ModifyImageAttribute",
                "elasticloadbalancing:DescribeListeners",
                "ec2:CreateSecurityGroup",
                "ec2:CreateSnapshot",
                "elasticloadbalancing:DescribeListenerCertificates",
                "ec2:ModifyInstanceAttribute",
                "elasticloadbalancing:DescribeSSLPolicies",
                "ec2:TerminateInstances",
                "elasticloadbalancing:DescribeTags",
                "ec2:DescribeTags",
                "ec2:DescribeLaunchTemplateVersions",
                "ec2:DescribeSecurityGroups",
                "ec2:DescribeImages",
                "ec2:DeleteSecurityGroup",
                "elasticloadbalancing:DescribeTargetHealth",
                "elasticloadbalancing:DescribeTargetGroups"
            ],
            "Resource": "*"
        },
        {
            "Sid": "2018121702",
            "Effect": "Allow",
            "Action": [
                "ssm:PutParameter",
                "ssm:GetParameter",
                "autoscaling:UpdateAutoScalingGroup",
                "ec2:ModifyLaunchTemplate",
                "ec2:CreateLaunchTemplateVersion",
                "autoscaling:AttachLoadBalancerTargetGroups"
            ],
            "Resource": [
                "arn:aws:autoscaling:*:*:autoScalingGroup:*:autoScalingGroupName/*",
                "arn:aws:ssm:eu-west-1:[YOUR_ACCOUNT]:parameter/deploying-status-*",
                "arn:aws:ec2:*:*:launch-template/*"
            ]
        }
    ]
}

A Note on Role Assumption

Akinaka uses IAM roles to gain access into multiple accounts. Most commands require you to specify a list of roles you wish to perform a task for, and that role must have the sts:AssumeRole permission. This is not only good security, it's helpful for ensuring you're doing things to the accounts you think you're doing things for ;)

Deploys

Done with the update parent command, and then the asg and targetgroup subcommands (update targetgroup is only needed for blue/green deploys).

Example:

# For standalone ASGs (not blue/green)
akinaka.py update \
  --region eu-west-1 \
  --role-arn arn:aws:iam::123456789100:role/management_assumable \
asg \
  --asg workers \
  --ami ami-000000

# For blue/green ASGs
akinaka.py update \
  --region eu-west-1 \
  --role-arn arn:aws:iam::123456789100:role/management_assumable \
asg \
  --lb lb-asg-ext \
  --ami ami-000000

# For blue/green ASGs with multiple Target Groups behind the same ALB
akinaka.py update \
  --region eu-west-1 \
  --role-arn arn:aws:iam::123456789100:role/management_assumable \
asg \
  --target-group application-1a \
  --ami ami-000000

For blue/green deploys, the next step is to check the health of your new ASG. For the purposes of Gitlab CI/CD pipelines, this will be printed out as the only output, so that it can be used in the next job.

Once the new ASG is confirmed to be working as expected:

akinaka.py update --region eu-west-1 --role-arn arn:aws:iam::123456789100:role/management_assumable asg --new blue

The value of --role-arn is used to assume a role in the target account with enough permissions to perform the actions of modifying ASGs and Target Groups. As such, akinaka is able to do cross-account deploys. It will deliberately error if you do not supply an IAM Role ARN, in order to ensure you are deploying to the account you think you are.

Cleanups

Currently AMI and EBS cleanups are supported.

Common option:

--role-arns is a space separated list of IAM ARNs that can be assumed by the token you are using to run this command. The AMIs for the running instances found in these accounts will not be deleted. Not to be confused with --role-arn, accepted for the update parent command, for deploys.

AMIs

Cleans up AMIs and their snapshots based on a specified retention period, and deduced AMI usage (will not delete AMIs that are currently in use). You can optionally specify an AMI name pattern, and it will keep the latest version of all the AMIs it finds for it.

Usage:

akinaka.py cleanup \
    --region eu-west-1 \
    --role-arns "arn:aws:iam::198765432100:role/management_assumable arn:aws:iam::123456789100:role/management_assumable" \
    ami \
        --exceptional-amis cib-base-image-*
        --retention 7

The above will delete all AMIs and their snapshots, except for those which:

  1. Are younger than 7 days AND
  2. Are not in use by AWS accounts "123456789100" or "198765432100" AND
  3. WHERE the AMI name matches the pattern "cib-base-image-*", there is more than one match AND it is the oldest one

--exceptional-amis is a space seperated list of exact names or patterns for which to keep the latest version of an AMI for. For example, the pattern "cib-base-image-*" will match with normal globbing, and if there is more than one match, only the latest one will not be deleted (else there is no effect).

--retention is the retention period you want to exclude from deletion. For example; --retention 7 will keep all AMIs found within 7 days, if they are not in the --exceptional-amis list.

EBS Volumes

Delete all EBS volumes that are not attached to an instance (stopped or not):

akinaka.py cleanup \
    --region eu-west-1 \
    --role-arns "arn:aws:iam::198765432100:role/management_assumable arn:aws:iam::123456789100:role/management_assumable" \
    ebs

RDS

Perform often necessary but complex tasks with RDS.

Copy

Copy encrypted RDS instances between accounts:

akinaka.py copy --region eu-west-1 \
    rds \
        --source-role-arn arn:aws:iam::198765432100:role/management_assumable \
        --target-role-arn arn:aws:iam::123456789100:role/management_assumable \
        --snapshot-style running_instance \
        --source-instance-name DB_FROM_ACCOUNT_198765432100 \
        --target-instance-name DB_FROM_ACCOUNT_123456789100 \
        --target-security-group SECURITY_GROUP_OF_TARGET_RDS \
        --target-db-subnet SUBNET_OF_TARGET_RDS \

--region is optional because it will default to the environment variable AWS_DEFAULT_REGION.

Container

Limited functionality for interactive with EKS and ECR. At the moment it's just getting a docker login via an assumed role to another assumed role:

akinaka.py container --region eu-west-1 --role-arn arn:aws:iam::0123456789:role/registry-rw get-ecr-login --registry 0123456789

The above will assume the role arn:aws:iam::0123456789:role/registry-rw in the account with the registry, and spit out a docker login line for you to use — exactly like aws ecr get-login, but working for assumed roles.

Billing

Get a view of your daily AWS estimated bill for the x number of days. Defaults to today's estimated bill.

akinaka.py reporting --region us-east-1 \
  --role-arn arn:aws:iam::1234567890:role/billing_assumerole \
  bill-estimates --from-days-ago 1

Example output:

Today's estimated bill
+------------+-----------+
| Date       | Total     |
|------------+-----------|
| 2019-03-14 | USD 13.93 |
+------------+-----------+

You can specify any integer value to the --days-ago flag. It's optional. Default value set for today (current day).

You can specify any region to the --region flag.

Contributing

Modules can be added easily by simply dropping them in and adding an entry into akinaka.py to include them, and some click code in their __init__ (or elsewhere that's loaded, but this is the cleanest way).

For example, given a module called akinaka_moo, and a single command and file called moo, add these two lines in the appropriate places of akinaka.py:

from akinaka_update.commands import moo as moo_commands
cli.add_command(moo_commands)

and the following in the module's commands.py:

@click.group()
@click.option("--make-awesome", help="The way in which to make moo awesome")
def moo(make_awesome):
    import .moo
    # YOUR CODE USING THE MOO MODULE

Adding commands that need subcommands isn't too different, but you might want to take a look at the already present examples of update and cleanup.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

akinaka-0.2.14.tar.gz (20.0 kB view hashes)

Uploaded Source

Built Distribution

akinaka-0.2.14-py3-none-any.whl (39.6 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page