AWS
Tutorials
How to Deploy CloudQuery into an AWS Organization
CloudQuery makes fetching resources from your entire organization simple, as long as you have the proper IAM trust relationships and permissions set up. In this blog post we will walk through one way of setting up these permissions so that you can have access to all of your configuration data in a single queryable database.
General Architecture #
We will be deploying a single CloudFormation template in an admin account and then relying on CloudFormation StackSets to propagate the configurations to all of the member accounts. In the admin account we will create an IAM role that is able to list all of the accounts in the organization as well as assume a role in the member accounts. In the member accounts we will be deploying a single IAM role that has a trust policy to only allow the role in the admin account to assume it. The permissions for the IAM role in the member account are locked down so that the role can only access metadata about the configuration and never has access to your code or data.
Prerequisites #
- CloudQuery binary installed and setup with a Postgresql database
- AWS CLI V2 installed and configured
- Admin access to the Root Account of your AWS Organization or an Account that is a Delegated Admin
Walk-through #
Step 1: Clone Solution Repository #
Clone the CloudQuery IAM-For-Orgs repository.
git clone https://github.com/cloudquery/iam-for-aws-orgs.git
cd iam-for-aws-orgs
Step 2: Deploy IAM Resources #
Prior to using the AWS CLI to execute the following command but make sure to replace
<ROOT_ORG_ID>
with your Organizational Unit (OU) of the root (if you want to deploy to your entire organization). Or a comma separated list of OUs if you want to deploy it only to a specific set of accounts:aws cloudformation create-stack \
--stack-name CloudQueryOrg-Deploy \
--template-body file://./template.yml \
--capabilities CAPABILITY_NAMED_IAM \
--parameters ParameterKey=OrganizationUnitList,ParameterValue=<ROOT_ORG_ID>
You can monitor the state of CloudFormation deployment by running this command:
aws cloudformation describe-stacks \
--stack-name CloudQueryOrg-Deploy \
--query 'Stacks[].StackStatus | [0]'
Step 3: Ensure you can Assume role #
Once the CloudFormation template has finished you will want to test out to make sure you can assume the role that was created in the Admin account. First you will get the ARN of that IAM role by running this command:
aws cloudformation describe-stacks \
--stack-name CloudQueryOrg-Deploy \
--query "Stacks[0].Outputs[?OutputKey=='AdminRoleArn'].OutputValue | [0]"
where the output should be a string like this:
"arn:aws:iam::<REDACTED>:role/cloudquery-ro"
Once you have the ARN of the role that was created you can test out assuming it by running this CLI command:
aws sts assume-role \
--role-arn arn:aws:iam::<REDACTED>:role/cloudquery-ro \
--role-session-name cloudquery-test
The output should look something like this:
{
"Credentials": {
"AccessKeyId": "ASIA...",
"SecretAccessKey": "...",
"SessionToken": "...",
"Expiration": "2022-07-12T17:38:11+00:00"
},
"AssumedRoleUser": {
"AssumedRoleId": "...",
"Arn": "arn:aws:sts::<REDACTED>:assumed-role/cloudquery-ro/cloudquery-test"
}
}
Step 4: Update your CloudQuery Configuration File #
Now that you have properly configured the IAM role in the Admin account you can take the 2 outputs from the CloudFormation stack and plug them into your CloudQuery configuration file
aws cloudformation describe-stacks \
--stack-name CloudQueryOrg-Deploy \
--query "Stacks[].Outputs"
Where the output should be in this form:
[
[
{
"OutputKey": "MemberRoleName",
"OutputValue": "cloudquery-ro"
},
{
"OutputKey": "AdminRoleArn",
"OutputValue": "arn:aws:iam::<REDACTED>:role/cloudquery-ro"
}
]
]
Here is an example configuration that makes use of the resources you just created
kind: source
spec:
name: aws-0
path: cloudquery/aws
registry: cloudquery
version: "v30.1.0"
tables: ['*']
destinations: ["postgresql"]
spec:
aws_debug: false
org:
admin_account:
role_arn: <AdminRoleArn>
member_role_name: <MemberRoleName>
regions:
- '*'
Step 5: Run Sync #
Now you are all set to be able to execute a fetch and grab resources from your whole AWS Organization
cloudquery sync
Summary #
In this walk-through we deployed a CloudFormation template that created the appropriate AWS IAM roles that CloudQuery needs in order to fetch resources from all accounts in an AWS Organization. Then you used the outputs from that template to configure CloudQuery to fetch resources from the member account.
After you have this working on your local machine you can check out our Terraform module for simplifying the deployment of CloudQuery into a production ready environment!
Ready to get started with CloudQuery? You can try out CloudQuery locally with our quick start guide or explore the CloudQuery Platform (currently in beta) for a more scalable solution.
Want help getting started? Join the CloudQuery community to connect with other users and experts, or message our team directly here if you have any questions.
Written by Ben Bernays
Ben is a Senior Software Engineer at CloudQuery with experience in Go, AWS, C++ and data analytics among many other things.