Skip to main content

Query AWS resources with SQL

Project description

aq allows you to query your AWS resources (EC2 instances, S3 buckets, etc.) with plain SQL.

https://travis-ci.org/lebinh/aq.svg?branch=master https://asciinema.org/a/79468.png

But why?

Fun, mostly fun. But see sample queries below for useful queries that can be performed with aq.

Usage

Usage:
    aq [options]
    aq [options] <query>

Options:
    --table-cache-ttl=<seconds>  number of seconds to cache the tables
                                 before we update them from AWS again [default: 300]
    -v, --verbose  enable verbose logging

Running aq without specifying any query will start a REPL to run your queries interactively.

Sample queries

One of the most important benefit of being able to query which SQL is aggregation and join, which can be very complicated or even impossible to do with AWS CLI.

To count how many running instances per instance type

> SELECT instance_type, count(*) count
  FROM ec2_instances
  WHERE state->'Name' = 'running'
  GROUP BY instance_type
  ORDER BY count DESC
+-----------------+---------+
| instance_type   |   count |
|-----------------+---------|
| m4.2xlarge      |      15 |
| m4.xlarge       |       6 |
| r3.8xlarge      |       6 |
+-----------------+---------+

Find instances with largest attached EBS volumes size

> SELECT i.id, i.tags->'Name' name, count(v.id) vols, sum(v.size) size, sum(v.iops) iops
  FROM ec2_instances i
  JOIN ec2_volumes v ON v.attachments -> 0 -> 'InstanceId' = i.id
  GROUP BY i.id
  ORDER BY size DESC
  LIMIT 3
+------------+-----------+--------+--------+--------+
| id         | name      |   vols |   size |   iops |
|------------+-----------+--------+--------+--------|
| i-12345678 | foo       |      4 |   2000 |   4500 |
| i-12345679 | bar       |      2 |    332 |   1000 |
| i-12345687 | blah      |      1 |    320 |    960 |
+------------+-----------+--------+--------+--------+

Find instances that allows access to port 22 in their security groups

> SELECT i.id, i.tags->'Name' name, sg.group_name
  FROM ec2_instances i
  JOIN ec2_security_groups sg ON instr(i.security_groups, sg.id)
  WHERE instr(sg.ip_permissions, '"ToPort": 22,')
+------------+-----------+---------------------+
| id         | name      | group_name          |
|------------+-----------+---------------------|
| i-foobar78 | foobar    | launch-wizard-1     |
| i-foobar87 | blah      | launch-wizard-2     |
+------------+-----------+---------------------+

AWS Credential

aq relies on boto3 for AWS API access so all the credential configuration mechanisms of boto3 will work. If you are using the AWS CLI then you can use aq without any further configurations.

Available tables

AWS resources are specified as table names in <resource>_<collection> format with:

resource

one of the resources defined in boto3: ec2, s3, iam, etc.

collection

one of the resource’s collections defined in boto3: instances, images, etc.

An optional schema (i.e. database) name can be used to specify the AWS region to query. If you don’t specify the schema name then boto’s default region will be used.

-- to count the number of ec2 instances in AWS Singapore region
SELECT count(*) FROM ap_southeast_1.ec2_instances

Note that the region name is specified using underscore (ap_southeast_1) instead of dash (ap-southeast-1).

At the moment the full table list for AWS us_east_1 region is

cloudformation_stacks

cloudwatch_alarms

cloudwatch_metrics

dynamodb_tables

ec2_classic_addresses

ec2_dhcp_options_sets

ec2_images

ec2_instances

ec2_internet_gateways

ec2_key_pairs

ec2_network_acls

ec2_network_interfaces

ec2_placement_groups

ec2_route_tables

ec2_security_groups

ec2_snapshots

ec2_subnets

ec2_volumes

ec2_vpc_addresses

ec2_vpc_peering_connections

ec2_vpcs

glacier_vaults

iam_groups

iam_instance_profiles

iam_policies

iam_roles

iam_saml_providers

iam_server_certificates

iam_users

iam_virtual_mfa_devices

opsworks_stacks

s3_buckets

sns_platform_applications

sns_subscriptions

sns_topics

sqs_queues

Query with structured value

Quite a number of resource contain structured value (e.g. instance tags) that cannot be use directly in SQL. We keep and present these values as JSON serialized string and add a new operator -> to make querying on them easier. The -> (replaced to json_get before execution) can be used to access an object field, object->'fieldName', or access an array item, array->index:

> SELECT '{"foo": "bar"}' -> 'foo'
+-------------------------------------+
| json_get('{"foo": "bar"}', 'foo')   |
|-------------------------------------|
| bar                                 |
+-------------------------------------+
> SELECT '["foo", "bar", "blah"]' -> 1
+--------------+
| json_get('   |
|--------------|
| bar          |
+--------------+

Install

pip install aq

Tests (with nose)

nosetests

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aq-0.1.1.tar.gz (12.6 kB view details)

Uploaded Source

Built Distribution

aq-0.1.1-py2.py3-none-any.whl (17.2 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file aq-0.1.1.tar.gz.

File metadata

  • Download URL: aq-0.1.1.tar.gz
  • Upload date:
  • Size: 12.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for aq-0.1.1.tar.gz
Algorithm Hash digest
SHA256 fed0c2f633007faee1653c23f144b86672c328c4d71c83509fab789c77591ebc
MD5 b8bb5b42993a6f2d9c7d42acefe30598
BLAKE2b-256 0bf62ad1a9e110c5f2860d55c920eda140bbdee5d7ed499d4e86233f1d39b758

See more details on using hashes here.

File details

Details for the file aq-0.1.1-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for aq-0.1.1-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 c4765080604c3a22f850ecf990b3585bd42e3fc03b23f1cac33ab5ca343ffcef
MD5 e8eb14d8a0957de5deae4c458a6896d4
BLAKE2b-256 16332b436faffd09b45b3f274fc1464b8a7e22acf01b658f3b5a904f38bfab12

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page