Wombat presents view at AWS services. I created it to learn Tauri and Svelte... and make my life easier 😎
This project is no longer generic tool to use AWS.
- Displaying ECS services across clusters with assosiated RDS instance
- Proxing to ECS/RDS instance
- Proxing to ECS can be configured to inject custom headers, authorize with jepsen/basic auth
- Searching through cloudwatch logs
- Finding password to RDS
- DBs that have the password stored in Secrets Manager result in a temporary connection in Dbeaver
- DBs that have the password stored in SSM result in a permanent connection in Dbeaver (probably you'll need to fix the user/database name)
- After you run the app on MacOS you need to trust it in the "Privacy and Security" tab
- AWS CLI
- Session manager plugin
- Configured aws cli
Install caching wrapper: brew install sccache
Export environment variable: RUSTC_WRAPPER=sccache
[profile <profile>]
sso_start_url =
sso_region =
sso_account_id =
sso_role_name =
region =
[profile <service1>]
role_arn = arn:aws:iam::123567890:role/<service1>-infra
source_profile = <profile>
[profile <service2>]
role_arn = arn:aws:iam::123567890:role/<service2>-infra
source_profile = <profile>
[profile <profile>]
sso_start_url =
sso_region =
sso_account_id =
sso_role_name =
region =
[profile <service1>-dev]
role_arn = arn:aws:iam::123567890:role/<service1>-infra
source_profile = <profile>
[profile <service2>-dev]
role_arn = arn:aws:iam::123567890:role/<service2>-infra
source_profile = <profile>
[profile <service2>-demo]
role_arn = arn:aws:iam::123567890:role/<service2>-infra
source_profile = <profile>
Use this for multiple AWS accounts
[profile <profile>-dev]
sso_start_url =
sso_region =
sso_account_id =
sso_role_name =
region =
[profile <service1>-dev]
role_arn = arn:aws:iam::123567890:role/<service1>-infra
source_profile = <profile>-dev
[profile <service2>-dev]
role_arn = arn:aws:iam::123567890:role/<service2>-infra
source_profile = <profile>-dev
[profile <profile>-demo]
sso_start_url =
sso_region =
sso_account_id =
sso_role_name =
region =
[profile <service1>-demo]
role_arn = arn:aws:iam::123567890:role/<service1>-infra
source_profile = <profile>-demo
[profile <service2>-demo]
role_arn = arn:aws:iam::123567890:role/<service2>-infra
source_profile = <profile>-demo