Table: aws_eks_addon - Query AWS EKS Add-Ons using SQL
The AWS EKS Add-Ons are additional software components that enhance the functionality of your Amazon Elastic Kubernetes Service (EKS) clusters. They provide a way to deploy and manage Kubernetes applications, improve cluster security, and simplify cluster management. Using AWS EKS Add-Ons, you can automate time-consuming tasks such as patching, updating, and scaling.
Table Usage Guide
The aws_eks_addon
table in Steampipe provides you with information about add-ons associated with each Amazon EKS cluster. This table allows you, as a DevOps engineer, to query add-on-specific details, including add-on versions, status, and associated metadata. You can utilize this table to gather insights on add-ons, such as the current version of each add-on, the health of add-ons, and more. The schema outlines the various attributes of the EKS add-on for you, including the add-on name, add-on version, service account role ARN, and associated tags.
Examples
Basic info
Explore the status of various add-ons within your AWS EKS clusters to understand their versions and associated roles. This can be beneficial for assessing the current configuration and ensuring the optimal functionality of your clusters.
select addon_name, arn, addon_version, cluster_name, status, service_account_role_arnfrom aws_eks_addon;
select addon_name, arn, addon_version, cluster_name, status, service_account_role_arnfrom aws_eks_addon;
List add-ons that are not active
Identify instances where certain add-ons in the AWS EKS service are not active. This can help in monitoring and managing resources effectively by pinpointing inactive add-ons that may need attention or removal.
select addon_name, arn, cluster_name, statusfrom aws_eks_addonwhere status <> 'ACTIVE';
select addon_name, arn, cluster_name, statusfrom aws_eks_addonwhere status != 'ACTIVE';
Get count of add-ons by cluster
Determine the total number of add-ons per cluster within your AWS EKS environment to better manage resources and understand utilization.
select cluster_name, count(addon_name) as addon_countfrom aws_eks_addongroup by cluster_name;
select cluster_name, count(addon_name) as addon_countfrom aws_eks_addongroup by cluster_name;
Schema for aws_eks_addon
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The AWS Account ID in which the resource is located. |
addon_name | text | = | The name of the add-on. |
addon_version | text | The version of the add-on. | |
akas | jsonb | Array of globally unique identifier strings (also known as) for the resource. | |
arn | text | The Amazon Resource Name (ARN) of the add-on. | |
cluster_name | text | = | The name of the cluster. |
configuration_values | text | The configuration values that you provided. | |
created_at | timestamp with time zone | The date and time that the add-on was created. | |
health_issues | jsonb | An object that represents the add-on's health issues. | |
marketplace_information | jsonb | TInformation about an Amazon EKS add-on from the Amazon Web Services Marketplace. | |
modified_at | timestamp with time zone | The date and time that the add-on was last modified. | |
owner | text | The owner of the add-on. | |
partition | text | The AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov). | |
publisher | text | The publisher of the add-on. | |
region | text | The AWS Region in which the resource is located. | |
service_account_role_arn | text | The Amazon Resource Name (ARN) of the IAM role that is bound to the Kubernetes service account used by the add-on. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
status | text | The status of the add-on. | |
tags | jsonb | The metadata that you apply to the cluster to assist with categorization and organization. | |
title | text | Title of the resource. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws
You can pass the configuration to the command with the --config
argument:
steampipe_export_aws --config '<your_config>' aws_eks_addon