I manage between 10 and 15 different Amazon AWS accounts for different companies.
When I needed to find out information about a particular instance, it was a pain to have log into the web interface each time. Amazon do provide an API that allows you query data about instances, but to use that, you need to store an Access Key and Secret on your local computer, which isn’t very safe when you’re dealing with multiple account.
To overcome, this I patched together Tim Kay’s excellent aws tool with GPG and a little PHP, to create a tool which allows you query the status of all instances in a specific region in an Amazon EC2 account, using access credentials that are locally encrypted, so that storing them locally isn’t an issue.
Output from the tool is presented on a line by line basis, so you can use grep to filter the results.
Sample output:
ec2sitrep.sh aws.account1 us-east-1 "logs-use" running m1.medium us-east-1a i-b344b7cb 172.32.1.172 59.34.113.133 "adb2-d-use" running m1.small us-east-1d i-07d3e963 172.32.3.54 67.45.139.235 "pms-a-use" running m1.medium us-east-1a i-90852ced 172.32.1.27 67.45.108.146 "s2-sc2-d-use" running m1.medium us-east-1d i-3d40b442 172.32.3.26 67.45.175.244 "ks2-sc3-d-use" running m1.small us-east-1d i-ed2ed492 172.32.3.184 67.45.163.141 "ks1-sc3-c-use" running m1.small us-east-1c i-6efb9612 172.32.2.195 67.45.159.221 "adb1-c-use" running m1.small us-east-1c i-98cf44e4 172.32.2.221 67.45.139.196 "s1-sc1-c-use" running m1.medium us-east-1c i-956a76e8 172.32.2.96 67.45.36.97 "sms2-d-use" running m1.medium us-east-1d i-a86ef686 172.32.3.102 34.90.28.159 "uatpms-a-use" running m1.small us-east-1a i-b8cf5399 172.32.1.25 34.90.163.110 "uatks1-sc3-c-use" running t1.micro us-east-1c i-de336dfe 172.32.2.26 34.90.99.226 "uats1-sc1-c" running m1.medium us-east-1c i-35396715 172.32.2.217 34.90.183.23 "uatadb1-c-use" running t1.micro us-east-1c i-4d316f6d 172.32.2.29 34.90.109.171 "sms1-c-use" running m1.medium us-east-1c i-31b29611 172.32.2.163 34.90.100.25 (Note that public ips have been changed in this example)
You can obtain the tool from Bitbucket: