Skip to main content

Runs collector plugins and sends the result to fixcore.

Project description

fix-plugin-aws

An AWS collector plugin for Fix.

Usage

For details on how to edit configuration, please see the documentation.

When the collector is enabled (fixworker.collector = [aws]) it will automatically collect any accounts the AWS boto3 SDK can authenticate for. By default it will check for environment variables like AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY or AWS_SESSION_TOKEN.

If Fix should assume an IAM role that role can be given via fixworker.aws.role = SomeRoleName.

The collector will scrape resources in all regions unless regions are specified using e.g. fixworker.aws.region = [us-east-1, us-west-2].

Scraping multiple accounts

If the given credentials are allowed to assume the specified role in other accounts of your AWS organisation, Fix can collect multiple accounts at the same time. To do so provide the account IDs to the fixworker.aws.account configuration.

Scraping the entire organisation

Instead of giving a list of account IDs manually you could also specify fixworker.aws.scrape_org, which will make Fix try to get the list of all accounts using the ListAccounts API.

If certain accounts are to be excluded from that list they can be specified using the fixworker.aws.scrape_exclude_account config option.

Miscellaneous Options

When collecting multiple accounts Fix by default will collect the accounts it finds in the org as well as the one it is currently authenticated as. If you do not want it to scrape the account that was used to get the list of all org accounts (e.g. your root account) you can specify fixworker.aws.dont_scrape_current.

If instead of using the current credentials you would like Fix to assume the specified role (fixworker.aws.role) even for the current account you can specify the options fixworker.aws.assume_current and fixworker.aws.dont_scrape_current. This would make it so that Fix does not scrape the current account using default credentials but instead assume the specified IAM role even for the current account.

License

See LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fixinventory_plugin_aws-4.2.0.tar.gz (364.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fixinventory_plugin_aws-4.2.0-py3-none-any.whl (427.2 kB view details)

Uploaded Python 3

File details

Details for the file fixinventory_plugin_aws-4.2.0.tar.gz.

File metadata

  • Download URL: fixinventory_plugin_aws-4.2.0.tar.gz
  • Upload date:
  • Size: 364.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for fixinventory_plugin_aws-4.2.0.tar.gz
Algorithm Hash digest
SHA256 13a8e95df74f8ea387f9abc5f2d16a907b996e5e3c007cb547560f0e325ff711
MD5 02f3279e8933da6633f5cd1b9d0f661f
BLAKE2b-256 e1239fe2b40bbbed14eac5e19a94acc8f757251edd7838525ab0430ef1da09f2

See more details on using hashes here.

File details

Details for the file fixinventory_plugin_aws-4.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for fixinventory_plugin_aws-4.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 8f39070493b1d2ba3acc427c882b7671617be32679c262abe9e8b8faa7484b72
MD5 de88ef3eeb8658d08351e4a131cbffa1
BLAKE2b-256 629b0bda1fa1b6718caf8a5d1cb9731e95239e8dbe9c01de18b70b8871ec58aa

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page