turbot / steampipe-mod-aws-tags

Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them effectively using Powerpipe and Steampipe.
https://hub.powerpipe.io/mods/turbot/aws_tags
Apache License 2.0
19 stars 8 forks source link

running control.s3_bucket_untagged against multiple aws accounts #6

Closed judell closed 2 years ago

judell commented 2 years ago

I have two AWS accounts, call them jon-personal and jon-public. I can query them both by their names in my aws.spc. For the mod, though, it seems I need to reduce the aws.spc to a single uncommented entry in order to run control.s3_bucket_untagged, is that expected?

e-gineer commented 2 years ago

Yes, it's expected. The mods are designed to run against the first schema in the search path. Suggestions:

It's important that mods are schema agnostic so they work for different people, which is why we use this search path approach.

cbruno10 commented 2 years ago

Closing issue as I believe it's been answered above, @judell , please re-open if not though, thanks!