AWS Thrifty
A tool to identify unused and underutilized resources in AWS environments to optimize cloud spend.
Category | Cost Security & FinOps |
---|---|
Last Commit | 1 year ago |
Last page update | 19 days ago |
Pricing Details | Free to use under Open Source license. |
Target Audience | AWS users looking to optimize cloud spend. |
The AWS Thrifty mod, powered by Steampipe and Powerpipe, manages resource underutilization and waste in AWS environments. This tool integrates with your AWS accounts to identify unused and underutilized resources, helping to optimize cloud spend.
Technically, the mod leverages Steampipe as the data source, utilizing its SQL-like query capabilities to scan AWS resources. The installation involves setting up Powerpipe and Steampipe with the AWS plugin, which can be automated using Brew commands. Once installed, the mod can be run via the powerpipe
command, allowing you to list and execute benchmarks specific to resources like EC2, RDS, and CloudFront.
Operationally, the mod offers flexibility in configuring benchmarks through variables, which can be set via files, command-line arguments, or environment variables. This customization enables tailored checks that align with your specific environment and requirements. For example, you can set the maximum age for running EC2 instances or define tag dimensions to filter resources.
Key considerations include the need for proper configuration of AWS credentials, which can be managed for multiple accounts. The mod's performance is generally robust, but it may require adjustments in large-scale environments where the number of resources and accounts is high. Additionally, the use of interactive dashboards provided by Powerpipe allows for real-time monitoring and detailed reporting, but this may incur additional costs related to data retention and processing.
In terms of technical details, the mod supports various output formats and allows for drilling down into specific resource configurations, including network settings, encryption status, and access controls. This granular visibility is crucial for both cost optimization and security compliance.