Skip to content

Latest commit

 

History

History
61 lines (58 loc) · 2.17 KB

trustedadvisor.md

File metadata and controls

61 lines (58 loc) · 2.17 KB

Trusted Advisor: trustedadvisor, ta, t

Example: cloudig get ta --rolearn arn:aws:iam::678910:role/cloudig

Output (JSON)

{
  "findings": [
    {
      "accountId": "123456",
      "category": "COST_OPTIMIZING",
      "name": "Low Utilization Amazon EC2 Instances",
      "description": "Checks the Amazon Elastic Compute Cloud (Amazon EC2) instances that were running at any time during the last 14 days and alerts you if the daily CPU utilization was 10% or less and network I/O was 5 MB or less on 4 or more days. Running instances generate hourly usage charges. Although some scenarios can result in low utilization by design, you can often lower your costs by managing the number and size of your instances.",
      "status": "warning",
      "resourcesSummary": {
        "ResourcesFlagged": 16,
        "ResourcesIgnored": 0,
        "ResourcesProcessed": 37,
        "ResourcesSuppressed": 0
      },
      "flaggedResources": [
        "i-0b18439757faf088a",
        "i-095d0079d8546fd8a",
        "i-0c5b586ec7e9d7eac",
        "i-0e83db48d6de8f40b",
        "i-008cceaa442471ec0",
        "i-00699354adf9984ad",
        "i-076d00ae185881b57",
        "i-06faf0349948904c2",
        "i-0baaf4989f05861aa",
        "i-05663b1bc7e34230f",
        "i-0928ccca5a6be3bab",
        "i-0bd17acfcd8fd0545",
        "i-0a23e343bb9fceb02",
        "i-05b2809ba8bdd0b2c",
        "i-04ebe8cc56724dda7",
        "i-00ea85d920e9dd8cf"
      ],
      "comments": "NEW_FINDING"
    },
    {
      "accountId": "678910",
      "category": "SECURITY",
      "name": "IAM Use",
      "description": "Checks for your use of AWS Identity and Access Management (IAM). You can use IAM to create users, groups, and roles in AWS, and you can use permissions to control access to AWS resources.",
      "status": "warning",
      "resourcesSummary": {
        "ResourcesFlagged": 1,
        "ResourcesIgnored": 0,
        "ResourcesProcessed": 1,
        "ResourcesSuppressed": 0
      },
      "flaggedResources": [
        "NA"
      ],
      "comments": "**EXCEPTION:** We use Federation and IAM roles to manage resources in AWS . No users/groups created in IAM"
    },
  ],
  "reportTime": "08 Oct 19 10:44 CDT"