cloudquery exposes your cloud configuration and metadata as sql tables, providing powerful analysis and monitoring without writing code.
- Homepage: https://cloudquery.io
- Releases: https://github.com/cloudquery/cloudquery/releases
- Documentation: https://docs.cloudquery.io
You can download the precompiled binary from releases, or using CLI:
export VERSION=v0.2.0
export OS=Darwin # Possible values: Linux,Windows,Darwin
curl -L https://github.com/cloudquery/cloudquery/releases/download/${VERSION}/cloudquery_${OS}_x86_64 -o cloudquery
chmod a+x cloudquery
./cloudquery --helpCurrently, cloudquery only supports AWS and GCP (Azure and DigitalOcean are on the roadmap). The number of AWS and GCP resources is actively expanding.
You should be authenticated with an AWS account with correct permission with either option (see full documentation):
AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY~/.aws/credentialscreated viaaws configure
You should be authenticated with a GCP that has correct permissions for the data you want to pull.
You should set GOOGLE_APPLICATION_CREDENTIALS to point to your downloaded credential file.
Run the following commands:
cp example.config.yml config.yml
# uncomment resource of interest in config.yml
./cloudqueryIf you uncommented images (it may take up to 30 seconds to fetch all images),
you can now run the following basic query in your sqlite3 console (sqlite3 ./cloudquery.db):
SELECT * FROM aws_ec2_images;Full Documentation, resources and SQL schema definitions are available here
SELECT gcp_storage_buckets.name
FROM gcp_storage_buckets
JOIN gcp_storage_bucket_policy_bindings ON gcp_storage_bucket_policy_bindings.bucket_id = gcp_storage_buckets.id
JOIN gcp_storage_bucket_policy_bindings_members ON gcp_storage_bucket_policy_bindings_members.bucket_policy_binding_id = gcp_storage_bucket_policy_bindings.id
WHERE gcp_storage_bucket_policy_bindings_members.name = 'allUsers' AND gcp_storage_bucket_policy_bindings.role = 'roles/storage.objectViewer';SELECT * FROM aws_elbv2_load_balancers WHERE scheme = 'internet-facing';SELECT * from aws_rds_clusters where storage_encrypted = 0;SELECT * from aws_s3_buckets
JOIN aws_s3_bucket_encryption_rules ON aws_s3_buckets.id != aws_s3_bucket_encryption_rules.bucket_id;More examples are available here
By contributing to cloudquery you agree that your contributions will be licensed as defined on the LICENSE file.
go build .
./cloudquery # --help to see all options
cloudquery currently support GCP and AWS. Azure and DigitalOcean are on the near roadmap and we are actively expanding number of supported resource with AWS and GCP.
