Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/basti-app/basti
โจ Securely connect to RDS, Elasticache, and other AWS resources in VPCs with no idle cost
https://github.com/basti-app/basti
automation aws cdk cicd cli cost-optimization hacktoberfest networking nodejs rds security vpc
Last synced: 6 days ago
JSON representation
โจ Securely connect to RDS, Elasticache, and other AWS resources in VPCs with no idle cost
- Host: GitHub
- URL: https://github.com/basti-app/basti
- Owner: basti-app
- License: mit
- Created: 2022-06-13T17:46:09.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-10-24T03:46:11.000Z (20 days ago)
- Last Synced: 2024-10-24T20:55:04.191Z (19 days ago)
- Topics: automation, aws, cdk, cicd, cli, cost-optimization, hacktoberfest, networking, nodejs, rds, security, vpc
- Language: TypeScript
- Homepage: https://www.basti.app
- Size: 4.31 MB
- Stars: 339
- Watchers: 2
- Forks: 18
- Open Issues: 16
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
Basti
Basti (from Bastion Host) is a CLI tool for securely accessing your DB instances and other AWS resources in private networks at almost no cost.
๐ต No idle costs. ๐ No SSH keys. ๐ Fully IAM-driven.
## Table of contents
- [๐ก Why Basti?](#-why-basti)
- [โ๏ธ How it works](#๏ธ-how-it-works)
- [๐ป Installation](#-installation)
- [๐ Basic usage](#-basic-usage)
- [โ๏ธ Initialize connection target](#๏ธ-initialize-connection-target)
- [โ๏ธ Connect to the target](#๏ธ-connect-to-the-target)
- [๐ Use the target on _localhost_](#-use-the-target-on-localhost)
- [Cleanup (optional)](#cleanup-optional)
- [๐งถ Reference documentation](#-reference-documentation)
- [๐ Custom connection targets](#-custom-connection-targets)
- [๐๏ธ Advanced initialization options](#๏ธ-advanced-initialization-options)
- [Resource tags](#resource-tags)
- [Bastion instance type](#bastion-instance-type)
- [Assign public IP address](#assign-public-ip-address)
- [๐ฆพ Automatic mode](#-automatic-mode)
- [๐ Configuration file](#-configuration-file)
- [๐ซ Infrastructure as code (IaC)](#-infrastructure-as-code-iac)
- [๐ข Basti in teams and organizations](#-basti-in-teams-and-organizations)
- [Minimal IAM permissions](#minimal-iam-permissions)
- [Usage audit](#usage-audit)
- [Shared configuration](#shared-configuration)
- [๐ Security](#-security)
- [Network](#network)
- [Access control](#access-control)
- [Software](#software)
- [โค๏ธ Development](#๏ธ-development)
- [Build](#build)
- [Run](#run)
- [Test](#test)
- [License](#license)
## ๐ก Why Basti?
With [Basti](https://github.com/basti-app/basti), you can securely connect to RDS, Aurora, Elasticache, or any other AWS resources in private VPC subnets from a local machine or a CI/CD pipeline almost for free!
[AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html) is a fantastic tool! But Basti makes it even better:
- ๐ฆพ With Session Manager, you need to oversee an EC2 bastion instance for connecting to managed resources such as RDS or Elasticache. Basti handles bastion instance setup, shutdown, and updates for you!
- ๐ Basti provides a convenient way to store and reuse connection configuration across your team.
- ๐ถ Basti improves stability of the Session Manager sessions by automatically restarting failed or expired sessions.
## โ๏ธ How it works
- ๐ฐ Basti sets up a so called _bastion EC2 instance_ in the connection target's VPC.
- ๐งโ๐ป The bastion instance is used with [AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html) port forwarding capability to make the target available on your _localhost_.
- ๐ต Basti takes care of keeping the bastion instance stopped when it's not used to make the solution cost as low as **โ 0.01 USD** per hour of connection plus **โ 0.80 USD** per month of maintaining the instance in a stopped state.
- ๐ [Security](#security) completely relies on AWS Session Manager and IAM policies. The bastion instance is not accessible from the Internet and no SSH keys are used.
## ๐ป Installation
Using homebrew
```sh
brew install basti
```Using npm
```sh
npm install --global basti
```Other, NodeJS-independent, installation options are coming soon!
## ๐ Basic usage
Basti uses AWS SDK and relies on credentials to be configured in your system. You can use any of [the methods](https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/setting-credentials-node.html) supported by AWS SDK to configure credentials.
> ๐ก You can expect Basti to work if you can use AWS CLI in your terminal.
### โ๏ธ Initialize connection target
First, initialize your connection target. It could be an RDS instance, an Elasticache cluster or any other target residing in a VPC. The following command will set up all the infrastructure required to start a connection. _You only need to do this once_.
```sh
basti init
```You will be prompted for a target to initialize and a **public** VPC subnet to create the bastion EC2 instance in.
### โ๏ธ Connect to the target
Now, you can start the connection. This command will establish a secure port forwarding session and make the target available on your _localhost_.
```sh
basti connect
```You will be prompted for the target to connect to as well as the local port to forward the connection to.
### ๐ Use the target on _localhost_
Finally, you can use the target same way as it was running on your _localhost_ and port you specified in the previous step.
```sh
psql -h localhost -p 5432
```> ๐ก _psql_, the PostgreSQL client, is used as an example here. Basti can be used to connect to any type of database or other services as long as the communication is done over TCP.
### Cleanup (optional)
You can remove all the resources created by Basti in you AWS account.
```sh
basti cleanup
```The list of resources will be displayed and you will be prompted to confirm the cleanup.
## ๐งถ Reference documentation
Please, refer to the [reference documentation](https://github.com/basti-app/basti/tree/main/docs/reference) for the full description of Basti CLI options and the configuration file.
## ๐ Custom connection targets
Basti provides first class support for RDS instances, Aurora clusters, and Elasticache clusters. However, you can use Basti to connect to any other target in your AWS VPC (e.g. DocumentDB instance, EC2 instance, etc.).
To connect to a custom target, select the `Custom` option when prompted for a target to initialize or connect to. You will be prompted for the target's VPC, IP address and port.
> ๐ค Feel free to open an issue or a pull request if you want to extend the list of natively supported targets
## ๐๏ธ Advanced initialization options
The `basti init` command has a number of advanced options that can be used to customize the bastion instance and other resources created by Basti.
> ๐ก Please, refer to the [reference documentation](https://github.com/basti-app/basti/blob/main/docs/reference/cli.md#basti-init-command) for the full list of options.
### Resource tags
You can specify tags to be applied to the bastion instance and other resources created by Basti. This can be done in three ways:
1. By entering the tags in the advanced options section of the interactive mode.
2. By passing the `--tag` option. This option accepts tag name and value separated by an equal sign. For example, `--tag Project=my-project` This option can be used multiple times to specify multiple tags.
3. By passing the `--tags-file` option. This option accepts a path to a JSON file with tags. The option can be used multiple times to specify multiple files.Example of a tags file:
```json
{
"Project": "my-project",
"Environment": "production"
}
```Tags with the same name will be overwritten in the order they are specified. Tags specified with the `--tag` option will always overwrite tags specified in the tags file.
> ๐ก If your tags contain special characters, it might be easier to use interactive mode or the `--tags-file` command than escaping the characters in the `--tag` option.
### Bastion instance type
You can specify the EC2 instance type to be used for the bastion instance using the `--bastion-instance-type` option or by entering it in the advanced options section of the interactive mode. The default instance type is `t2.micro`, but it's subject to change in the future.
### Assign public IP address
By default, the bastion instance is created with a public IP address to enable seamless **outbound-only** connection to AWS services from a public VPC subnet. Please, refer to the [AWS documentation](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-prerequisites.html) for more details on the Session Manager requirements.
You can disable the public IP address using the `--bastion-assign-public-ip false` option or in the advanced options section of the interactive mode.
> โ๏ธ When the public IP address is disabled, you will need to manually ensure that the AWS Session Manager [connectivity requirements](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-prerequisites.html) are met. This can be done with the help of VPC endpoints, NAT gateways, or other means.
> ๐ก Disabling public IP address can be useful when setting up the bastion instance in a private subnet.
## ๐ฆพ Automatic mode
Using interactive mode is convenient when you're getting used to Basti. However, in Continuous Integration and Continuous Delivery (CI/CD) pipelines, you will probably want to disable interactivity and pass all the options as command line arguments:
```sh
basti connect --rds-instance your-instance-id --local-port your-port
```Use `basti --help` to see all the available options for `basti connect` and other commands.
To continue executing the script after the connection is established, you can use Basti in conjunction with the [wait-on utility](https://www.npmjs.com/package/wait-on) and the `&` shell operator:
```sh
basti connect --rds-instance your-instance-id --local-port your-port &
wait-on tcp:localhost:your-port
```## ๐ Configuration file
When working with multiple connection targets, it becomes convenient to store their configurations
and other Basti settings in a dedicated configuration file. To facilitate this, Basti automatically
searches for the configuration file in the current directory and its parent directories.
The supported file names are `.basti.yaml`, `.basti.yml`, and `.basti.json`.You can quickly start a connection defined in the configuration file by passing its
name to the `basti connect` command:```sh
basti connect your-connection
```Configuration file example
This example uses YAML format. The same configuration can be written in JSON.
```yaml
# - Connections are used with the `basti connect ` command
# - Targets' fields are the same as the options for the `basti connect` command
connections:
database-dev:
target:
rdsInstance: my-dev-database
awsProfile: dev
localPort: 5432database-prod:
target:
rdsInstance: my-prod-database
awsProfile: prod
localPort: 5432# Default AWS profile and region are used if not specified in the target
redis-cache-dev:
target:
elasticacheRedisCluster: my-dev-cache
localPort: 6379# Same target but with different local port
custom-target-local:
target: custom-target
localPort: 4646# Targets can be extracted and reused in multiple connections
# with different local ports
targets:
custom-target:
customTargetVpc: vpc-1234567890
customTargetHost: 10.0.1.1
customTargetPort: 4646
awsProfile: prod
awsRegion: us-east-1
```> ๐ก Please, refer to the [reference documentation](https://github.com/basti-app/basti/blob/main/docs/reference/configuration-file.md) for the full list of configuration options.
## ๐ซ Infrastructure as code (IaC)
Introducing, [Basti CDK](https://github.com/basti-app/basti/tree/main/packages/basti-cdk), an [AWS CDK](https://aws.amazon.com/cdk/) construct library that allows you to integrate Basti with your existing CDK-managed infrastructure.
Feel free to open an issue if you want to see Basti in Terraform or other IaC tools. Contributions are welcome ๐ค
## ๐ข Basti in teams and organizations
Basti was designed with organizational usage patterns in mind. The bastion instance and other infrastructure created by Basti is reused across all the users in your organization.
### Minimal IAM permissions
Basti commands require different sets of IAM permissions. `basti init` needs broad permissions to set up all the infrastructure required to start a connection. `basti connect`, on the other hand, requires only minimal permissions to start a connection. This means that the AWS account administrator can run the `basti init` command once and then grant the minimal permissions to the IAM users who need to start connections.
Minimal IAM policy for connection
The following command is optimized for minimal permissions required to start a connection. It doesn't need to retrieve the target information as it's passed as command line arguments.
```sh
basti connect --custom-target-vpc your-vpc-id --custom-target-host your-target-host --custom-target-port your-target-port --local-port your-local-port
```Minimal policy:
```json
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "ec2:DescribeInstances",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "ec2:StartInstances",
"Resource": "arn:aws:ec2:::instance/"
},
{
"Effect": "Allow",
"Action": "ec2:CreateTags",
"Resource": "arn:aws:ec2:::instance/"
},
{
"Effect": "Allow",
"Action": "ssm:StartSession",
"Resource": [
"arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost",
"arn:aws:ec2:::instance/"
],
"Condition": {
"BoolIfExists": {
"ssm:SessionDocumentAccessCheck": "true"
}
}
}
]
}
```### Usage audit
Since Basti uses IAM for access control, the connection history, along with the _responsible IAM user_ and all the connection details, can be audited using AWS CloudTrail by filtering on the "StartSession" event. Please, refer to the [AWS CloudTrail documentation](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html) for more details.
A simple connections history can also be found in the AWS Session Manager history. See [AWS Session Manager documentation](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-working-with-view-history.html) for more details.
### Shared configuration
The [Basti configuration file](#basti-configuration-file) file can be shared across your organization, making it easy for all developers to connect to the project's cloud infrastructure. A recommended practice is to store the configuration file in the root of your project's repository. This ensures that the configuration is readily accessible to all team members, enabling quick and seamless connections to the required cloud resources.
## ๐ Security
Security is a top priority for Basti. The following sections describe the security measures taken by Basti.
### Network
The bastion EC2 instance reachability from the Internet is completely disabled with AWS Security Groups configuration. _No ports are open for inbound traffic._ The bastion instance is only accessible through [AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html).
Basti automatically adjusts the target's Security Group to allow inbound traffic from the bastion instance's Security Group.
### Access control
[AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html), which is used by Basti to establish a port forwarding session, doesn't use SSH keys for access control. Instead, it relies on [AWS IAM](https://aws.amazon.com/iam/) users and their permissions in your AWS account. This also means that [AWS CloudTrail](https://aws.amazon.com/cloudtrail/) could be used to _audit Basti usage_.
### Software
Basti uses the latest Amazon Linux 2 - Kernel 5.10 AMI available at the initialization time (`basti init` command) for the bastion instance.
The bastion instance EBS volume is encrypted by default.
The bastion instance is being stopped when it's not used for some short period of time. These shutdowns are also used to _update the bastion instance's software packages and OS kernel_. By default, the updates happen once a day but not more often than the bastion instance is used.
## โค๏ธ Development
First of all, thank you for your interest in contributing to Basti! ๐
The following section describes how to run your local version of Basti CLI
as you make changes to the code. Please, feel free to open an issue if you want to see Basti CDK development guide!### Build
Before proceeding to development, it's recommended to run the _full build_.
This requires Docker to be installed on your machine and may take a couple of minutes.```sh
npm run build
```Full Basti build consists of two parts:
1. Compiling Basti TypeScript code. The code has to be compiled after each change.
```sh
npm run build-src# Or, if you want to automatically recompile on each change:
npm run build-src-watch
```2. Building non-NodeJS dependencies (AWS session-manger-plugin).
This step is only required after the first checkout or in a rare
case when the dependencies are updated.
```sh
npm run build-deps
```### Run
After the build is complete, you can run Basti:
```sh
npm run start --
```Alternatively, you can link-install the local version of Basti in your system
and use it as you would usually use Basti:```sh
# Link-install the local version of Basti
npm link# Run Basti
basti
```### Test
Before submitting a pull request, please make sure that all the tests and
checks pass:```sh
npm run test
```## License
Usage is provided under the MIT License. See [LICENSE](https://github.com/basti-app/basti/blob/main/LICENSE) for the full details.