Cloudlist Providers
Supported cloud providers
This guide offers insights into each supported provider, enabling you to leverage Cloudlist’s capabilities to their fullest extent for comprehensive asset visibility and control.
Major Cloud Providers
AWS (Amazon Web Services)
Supported AWS Services:
Example Config: Amazon Web Services can be integrated by using the following configuration block.
aws_access_key
and aws_secret_key
can be generated in the IAM console. We recommend creating a new IAM user with Read Only
permissions and providing the access token for the user.
Scopes Required:
The following scopes can directly be provided to the IAM user.
To also support other services, a custom policy document is provided which can directly be copy-pasted to the role to allow correct and minimal permissions.
References:
- https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_iam_read-only-console.html
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
-
Aws Assume Role:
GCP (Google Cloud Platform)
Supported GCP Services:
Example Config:
Google Cloud Platform can be integrated by using the following configuration block.
gcp_service_account_key
can be retrieved by creating a new service account. To do so, create service account with Read Only access to cloudresourcemanager
and dns
scopes in IAM. Next, generate a new account key for the Service Account by following steps in Reference 2. This should give you a json which can be pasted in a single line in the gcp_service_account_key
.
Scopes Required: Cloud DNS, GKE
References:
Azure
Supported Azure Services:
- Virtual Machines
Example Config:
Microsoft Azure can be integrated by using the following configuration block.
tenant_id
, client_id
, client_secret
can be obtained/generated from All services
> Azure Active Directory
> App registrations
subscription_id
can be retrieved from All services
> Subscriptions
To use cli auth set use_cli_auth
value to true
and run az login
in the terminal
References:
- https://docs.microsoft.com/en-us/cli/azure/create-an-azure-service-principal-azure-cli
- https://docs.microsoft.com/en-us/cli/azure/ad/sp?view=azure-cli-latest#az_ad_sp_create_for_rbac
- https://docs.microsoft.com/en-us/cli/azure/authenticate-azure-cli
Alibaba Cloud
Suppoted Alibaba Cloud Services:
- ECS Instances
Example Config:
Alibaba Cloud can be integrated by using the following configuration block.
Alibaba Cloud Access Key ID and Secret can be created by visiting https://ram.console.aliyun.com/manage/ak
References:
- https://www.alibabacloud.com/help/faq-detail/142101.htm
- https://www.alibabacloud.com/help/doc-detail/53045.htm
VPS & PaaS Hosting Providers
DO (DigitalOcean)
Supported DigitalOcean Services:
- Instances
Example Config:
Digitalocean can be integrated by using the following configuration block.
digitalocean_token
can be generated from the Digitalocean Control Panel. We recommend only giving Read Access to the token.
References:
SCW (Scaleway)
Supported Scaleway Services:
- Instances
Example Config:
Scaleway can be integrated by using the following configuration block.
scaleway_access_key
and scaleway_access_token
can be generated from the Credentials Options in scaleway console.
References -
Heroku
Supported Heroku Services:
- Applications
Example Config:
Heroku can be integrated by using the following configuration block.
heroku_api_token
can be generated from https://dashboard.heroku.com/account/applications/authorizations/new
It can also be created with the Heroku CLI by running:
References:
Linode
Supported Linode Services:
- Instances
Example Config:
Linode can be integrated by using the following configuration block.
linode_personal_access_token
can be created from https://cloud.linode.com/id/tokens. Minimum scope needed is Read Only
for Linodes
resource.
References:
CDN & DNS Management
Fastly
Supported Fastly Services:
- Services
Example Config:
Fastly can be integrated by using the following configuration block.
fastly_api_key
can be generated from https://manage.fastly.com/account/personal/tokens
References -
Namecheap
Supported Namecheap Services:
- Domain List
Example Config:
Namecheap can be integrated by using the following configuration block.
Namecheap API Access can be enabled by visiting https://ap.www.namecheap.com/settings/tools/apiaccess/ and then:
- Toggle ON API Access switch
- Add your public IP to Whitelistted IPs
References:
- https://www.namecheap.com/support/api/intro/
- Enabling API Access
- Whitelisting IP
Cloudflare
Supported Cloudflare Services:
- DNS
Example Config:
Cloudflare can be integrated by using the following configuration block.
api_key
can be generated from Cloudflare API Key manager. It needs to be Global API Key due to limitation of cloudflare new API tokens.
References:
Hetzner Cloud
Supported Hetzner Cloud Services:
- Instances
Example Config:
Hetzner Cloud can be integrated by using the following configuration block.
References:
Infrastructure Automation & Management
Kubernetes (K8s)
Supported Kubernetes Services:
- Services
- Ingresses
Example Config:
To integrate Kubernetes, utilize the configuration block outlined below. This block allows you to specify Kubernetes connection details either through a file path or directly by providing the encoded kubeconfig content. If both kubeconfig_file and kubeconfig_encoded are specified, the kubeconfig_encoded will take precedence.
References:
- https://www.redhat.com/sysadmin/kubeconfig
- https://docs.aws.amazon.com/eks/latest/userguide/create-kubeconfig.html
- https://learn.microsoft.com/en-us/azure/aks/control-kubeconfig-access#get-and-verify-the-configuration-information
- https://cloud.google.com/kubernetes-engine/docs/how-to/cluster-access-for-kubectl#store_info
Hashicorp Tools
With Cloudlist you can get assets from nomad, consul and terraform. Cloudlist can query Nomad and Consul directly, and will use the Terraform state file to list Terraform created assets.
Nomad
Hashicorp Nomad can be integrated by using the following configuration block.
Example Config:
Specifying https in the nomad_url
automatically turns SSL to on. All the fields are optional except the nomad_url
.
References:
Consul
Hashicorp Consul can be integrated by using the following configuration block.
Example Config:
Specifying https in the consul_url
automatically turns SSL to on. All the fields are optional except the consul_url
.
References:
Terraform
Example Config:
Terraform can be integrated by using the following configuration block.
OpenStack
Supported OpenStack Services:
- Instances
Example Config: