Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe and Steampipe.
Is your feature request related to a problem? Please describe.
After running powerpipe we are creating automatic reports out of the outcome. For keeping the results as small as possible we are focussing on the controls in combination with resource.
We observed that in SSM controls findings are reported with the same resource and we have to parse the corresponding instance id from description.
Describe the solution you'd like
I would like to simply access the instance id for automatic reporting.
A suggestion would be for ssm_2:
Instead of resource:
python3-urllib3.amd64
Also report the instanceid in the resource field
python3-urllib3.amd64/i-1234fce2334412
Describe alternatives you've considered
Currently the only way is to parse the instance id from description.
Is your feature request related to a problem? Please describe. After running powerpipe we are creating automatic reports out of the outcome. For keeping the results as small as possible we are focussing on the controls in combination with resource. We observed that in SSM controls findings are reported with the same resource and we have to parse the corresponding instance id from description.
Describe the solution you'd like I would like to simply access the instance id for automatic reporting.
A suggestion would be for ssm_2: Instead of resource: python3-urllib3.amd64 Also report the instanceid in the resource field python3-urllib3.amd64/i-1234fce2334412
Describe alternatives you've considered Currently the only way is to parse the instance id from description.