Skip to main content

AWS cli trace recorder and player

Project description

AWS CLI Tracer

"A poor man's Cloud Formation utility" --me

Example Terminal Session

Introduction

awstracer consists of two small utitilities which hook into the aws command-line interface internal event mechanism. Using it you can record a sequence of aws commands to a trace-file. The player will allow you to replay that sequence of commands under for example a different configured AWS profile or against a different AWS region. Think of it as a set of poor man's Cloud Formation utilities. It's useful for when you have to re-run a set of commands or quickly test a bunch of things without having to switch back to the console the entire time. And it's also a whole lot quicker than having to write your own awscli and botocore logic.

Under normal circumstances these utilities would barely be more useful than using a simple shell-script which wraps around aws commands. However, the player features some logic that allows it to derive relationships between subsequent calls. This way it can automatically determine that the return value of one command should be supplied to the next request. Think for example of using a command which creates a resource and returns an ARN and the next command then using that specific ARN again. The player has the ability to do a dry run of the sequence of commands in the trace file. It will then colorize the output and highlight the replaced variables to show where the substitutions in a sequence of requests will appear.

Limitations

Very complex traces with a set of similar commands might end up yielding unpredictable results. If one for example does an aws iam create-user call twice then the second call's parameters will be automatically substituted for the ones of the first one. To inspect what would happen it's advisable to look at the output of a dryrun first. The examples below should make clearer what appropriate use-cases are and how one can use awstracer.

Installation

Please note that this tool requires at least Python >= 3.6. To install from source simply clone the repository and run:

$ python3 setup.py sdist
$ pip3 install dist/awstracer-<version>.tar.gz

Usage

First run awstrace-rec to run a recording of aws commands. There is the ability, enabled via a command-line switch, to also support arbitrary shell commands. These will NOT be replayed or even captured in the trace. However this can be useful when you want to make sure a call to AWS IAM for example has settled. You can then execute for example a sleep command before executing the next call to aws.

After the trace has been recorded you can replay it with awstrace-play. There are several switches to enable debugging, force a continuation of a trace execution when one intermediate command fails and so on. For more information simply run awstrace-play -h. To replay a trace against a different region or profile simply use the --profile or --region switches.

Please note that both awstrace-play and awstrace-rec are very light wrappers around the standard aws cli. This means that it will automatically import your profiles from ~/.aws/credentials or load IAM access keys from the environment. From that perspective everything works exactly like usual.

Overriding request parameters can be done via -p or --param. Request parameters tend to be similarly cased to how the aws cli styles them. That means that even if the request and response use for example UserName you specify it on the commandline with --user-name. For awstrace-play that means you would use something like -p user-name test-user to override the value in the trace.

Usage Example 1: Creating a DynamoDB table and adding data to it

This is the example that can also be seen in the recorded terminal session above. Let's create a tracefile that creates a DynamoDB table named Music and inserts a song in the table. The commands are taken directly from the Amazon DynamoDB Developer Guide. This looks something like this. Please note that the output is truncated.

$ awstrace-rec --trace-file create_table.trace
(rec) aws dynamodb create-table \
>     --table-name Music \
>     --attribute-definitions \
>         AttributeName=Artist,AttributeType=S \
>         AttributeName=SongTitle,AttributeType=S \
>     --key-schema \
>         AttributeName=Artist,KeyType=HASH \
>         AttributeName=SongTitle,KeyType=RANGE \
> --provisioned-throughput \
>         ReadCapacityUnits=10,WriteCapacityUnits=5
[...]
Add command to trace cache? [y/N]: y
(rec) aws dynamodb put-item \
> --table-name Music  \
> --item \
>     '{"Artist": {"S": "No One You Know"}, "SongTitle": {"S": "Call Me Today"}, "AlbumTitle": {"S": "Somewhat Famous"}, "Awards": {"N": "1"}}'
Add command to trace cache? [y/N]: y
(rec)
Save cached trace to create_table.trace? [y/N]: y

Now we can simply replay our trace. If we play it we get the following error as the table already exists:

$ awstrace-play --trace-file create_table.trace
(play) aws dynamodb create-table --attribute-definitions '[{"AttributeName": "Artist", "AttributeType": "S"}, {"AttributeName": "SongTitle", "AttributeType": "S"}]' --key-schema '[{"AttributeName": "Artist", "KeyType": "HASH"}, {"AttributeName": "SongTitle", "KeyType": "RANGE"}]' --provisioned-throughput '{"ReadCapacityUnits": 10, "WriteCapacityUnits": 5}' --table-name Music

An error occurred (ResourceInUseException) when calling the CreateTable operation: Table already exists: Music

We can immediately run the trace against a different region, profile or endpoint. To do so we simply use the --region, --profile or --endpoint parameters similarly to how this works with the AWS CLI. For example to run the same trace under the admin-profile against the endpoint https://beta-service-url.com we can do the following:

$ awstrace-play --trace-file create_table.trace --profile admin-profile --endpoint https://beta-service-url.com

The player has the ability to automatically derive relationships between subsequent commands. This means that we have the ability to override a parameter inside a trace file without having to edit the trace file or edit any of the commands themselves. For example if we want to create a table with a different name but still want to get the data inserted to that new table we simply do this:

$ awstrace-play --trace-file create_table.trace -p table-name test-table
[...]
$ aws dynamodb list-tables
{
    "TableNames": [
        "Music",
        "test-table",
    ]
}

We can see that test-table was created. To check if the data actually got inserted we can use the following to see if we can get an item returned from the table. If that works it means the player did its job correctly and it replayed the trace with the overridden parameters properly.

$ aws dynamodb get-item --consistent-read --table-name test-table --key '{ "Artist": {"S": "No One You Know"}, "SongTitle": {"S": "Call Me Today"}}
{
    "Item": {
        "AlbumTitle": {
            "S": "Somewhat Famous"
        },
        "Awards": {
            "N": "1"
        },
        "Artist": {
            "S": "No One You Know"
        },
        "SongTitle": {
            "S": "Call Me Today"
        }
    }
}

Usage Example 2: Creating AWS users and policies

We start a recording session. First we create user test-user1. We then create a policy from file://policy.json named test-policy1 and subsequently attach the policy to the user.

$ awstrace-rec --trace-file create_user.trace
(rec) aws iam create-user --user-name test-user-1
[...]
(rec) aws iam create-policy --policy-name test-policy-1 --policy-document file://policy.json
{
    "Policy": {
    [...]
        "Arn": "arn:aws:iam::111111111111:policy/policy1",
    [...]
    }
}
(rec) aws iam attach-user-policy --user-name test-user-1 --policy-arn arn:aws:iam::111111111111:policy/policy1
[...]
aws iam list-attached-user-policies --user-name test-user-1
{
    "AttachedPolicies": [
        {
            "PolicyName": "policy1",
            "PolicyArn": "arn:aws:iam::111111111111:policy/policy1"
        }
    ]
}

To now create a different user with a different policy all we have to do is edit the policy.json file and then rerun the trace. We can do a dry-run first by specifying --dryrun to see if the appropiate relations between the traces has been properly derived. This will look something like this:

$ awstrace-play --trace-file create-user.trace -p user-name tu -p policy-name tp policy-document file://policy.json --dryrun
(play) aws iam create-user --user-name tu
(play) aws iam create-policy --policy-document file://policy.json --policy-name tp
(play) aws iam attach-user-policy --policy-arn arn:aws:iam::111111111111:policy/tp --user-name tu
(play) aws iam list-attached-user-policies --user-name tu

If we now run it without the --dryrun option we will ultimately see the output of the last request which was the call to list-attached-user-policies.

$ awstrace-play --trace-file create-user.trace -p user-name tu -p policy-name tp -p policy-document file://policy.json
[...]
(play) aws iam list-attached-user-policies --user-name tu
{
    "AttachedPolicies": [
        {
            "PolicyName": "tp",
            "PolicyArn": "arn:aws:iam::111111111111:policy/tp"
        }
    ]
}
[...]

Bugs, comments, suggestions

Shoot in a pull-request via github, post an issue in the issue tracker or simply shoot an email to gvb@anvilventures.com.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

awstracer-1.1.tar.gz (43.2 kB view details)

Uploaded Source

File details

Details for the file awstracer-1.1.tar.gz.

File metadata

  • Download URL: awstracer-1.1.tar.gz
  • Upload date:
  • Size: 43.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.7.3 pkginfo/1.5.0.1 requests/2.22.0 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.8.5

File hashes

Hashes for awstracer-1.1.tar.gz
Algorithm Hash digest
SHA256 3a2ea33f8287ff38cac5b0a0f5c059876a1ab728700ee6bf6fb17f9e92fbd366
MD5 d9aff2d334fda2015e4ada98de4ac204
BLAKE2b-256 4f281e8af295d41b7b219525843f55d9d16b8f0075a518113a3bf582822dad0e

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page