Table: aws_ec2_regional_settings - Query AWS EC2 Regional Settings using SQL
The AWS EC2 Regional Settings are configurations that apply to an entire region in the Amazon Elastic Compute Cloud (EC2) service. These settings include options such as default VPC, default subnet, and default security group. They allow for the customization and management of resources within a specific AWS region.
Table Usage Guide
The aws_ec2_regional_settings
table in Steampipe provides you with information about the regional settings of Amazon Elastic Compute Cloud (EC2). This table allows you, as a cloud administrator, security team member, or developer, to query regional settings, including default EBS encryption and the default EBS encryption KMS key. You can utilize this table to gather insights on regional settings, such as the default EBS encryption status, the default EBS encryption KMS key, and the region name. The schema outlines the various attributes of the regional settings for you, including the region, default EBS encryption, and default EBS encryption KMS key.
Examples
Basic settings info
Analyze the settings to understand the default encryption status and key for your AWS EC2 regional settings. This is useful for ensuring your data is secure and encrypted as per your organization's policies.
select default_ebs_encryption_enabled, default_ebs_encryption_key, title, regionfrom aws_ec2_regional_settings;
select default_ebs_encryption_enabled, default_ebs_encryption_key, title, regionfrom aws_ec2_regional_settings;
Settings info for a particular region
Determine the areas in which default encryption is enabled for a specific region. This query is beneficial for understanding the security configuration of your cloud storage in that particular region.
select default_ebs_encryption_enabled, default_ebs_encryption_key, title, regionfrom aws_ec2_regional_settingswhere region = 'ap-south-1';
select default_ebs_encryption_enabled, default_ebs_encryption_key, title, regionfrom aws_ec2_regional_settingswhere region = 'ap-south-1';
List the regions along with the key where default EBS encryption is enabled
Identify regions where the default EBS encryption is enabled. This is useful for maintaining data security and compliance by ensuring that encrypted storage is being utilized in those areas.
select region, default_ebs_encryption_enabled, default_ebs_encryption_keyfrom aws_ec2_regional_settingswhere default_ebs_encryption_enabled;
select region, default_ebs_encryption_enabled, default_ebs_encryption_keyfrom aws_ec2_regional_settingswhere default_ebs_encryption_enabled = 1;
Control examples
Schema for aws_ec2_regional_settings
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The AWS Account ID in which the resource is located. |
default_ebs_encryption_enabled | boolean | Indicates whether encryption by default is enabled. | |
default_ebs_encryption_key | text | The Amazon Resource Name (ARN) or alias of the default CMK for encryption by default. | |
partition | text | The AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov). | |
region | text | The AWS Region in which the resource is located. | |
snapshot_block_public_access_state | text | Gets the current state of block public access for snapshots setting for the account and Region. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
title | text | Title of the resource. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws
You can pass the configuration to the command with the --config
argument:
steampipe_export_aws --config '<your_config>' aws_ec2_regional_settings