I haven’t been a fan of the UI for a while, although admittedly it’s a tough job - there’s a lot to cram in there! I started building a simpler alternative, where everything is just a simple, sortable, exportable table (details in profile). It’s been fun to build, but the sheer number of services has been a slog.
It's essentially a simpler, read-only, AWS dashboard where everything is a filterable, searchable, exportable-to-CSV table, with some extra features like multi-region mode, saved notes, and a debugger for access denied errors.
It uses the AWS SDK for JavaScript, so everything is run client-side from your browser. I'm not 100% sure what direction I'm taking it yet, but it's been fun to hack on!
Thankfully programmatic. It’s a common UI table widget, essentially, and I’ve written some custom code to handle multi-region support, updating the AWS credential handler, pagination, and response processing. From there, it’s a matter of plugging in some common options for each AWS service: the service name, SDK method to call, pagination property (annoyingly, AWS API has numerous ways of paginating responses), etc. Takes about five minutes to add a new service.
I'm using ag-grid for my project too. I did a bunch of work to make configuring it more declarative... so you can have pinned rows that read from a different data source for summary stats, so you can specify custom renderers for each column. how have you found ag-grid to use?
Oh, that's neat! I've found it to be really flexible, although some of the really nice features are (understandably) locked behind the expensive "Pro" version (like right-click context menus, etc.). Will check out your examples!
Expect to see more of this, especially when the audience is local/US. IIRC, some newspapers are already doing region blocks. Why should website owners targeting US visitors spend _any_ amount of money making their content comply with asinine regulations (like cookie banners)?
Based on "GetMetricData", you're not paying for services, but rather something with access to your account is making API requests to CloudWatch. Do you have any third-party monitoring tools (Splunk, Datadog, etc.) in use? Can you check your IAM portal to see if you have any users/roles with recent access?
I’ve been working on https://console.wut.dev as an alternative, simpler AWS console. Given that AWS has recently started embedding Q (their AI tool) into their UI, I’ll likely keep Wut AI-free.
That being said, there are a few features I’ve been thinking of where AI could theoretically make sense (like summarizing recent changes to cloud resources from CloudTrail logs) but if I build that, I’m going to focus on the feature/use case and not try to just “jam AI into it.”
• AWS Resource Explorer - a lighter-weight version of the AWS console where everything is just a sortable/filterable/searchable table.
• Access Denied Debugger - paste an "AccessDenied" message and get back a stack-trace style UI showing all the resources involved, reason for the error (e.g., which policy is missing a permission), recent changes via CloudTrail, etc.
• AWS Organizations / SCP Viewer - generates a tree-diagram style UI showing all your AWS accounts, which policies apply to them, etc.
Still working on merging these into a cohesive application (mostly just been scratching my own itches so far). I'm trying to consider privacy/security carefully, so everything is client-side, using the AWS JavaScript SDK, and creds/data are only stored locally.
This is awesome, I work at AWS and might use this when the console load times get on my last nerve and I just want to check some IAM policies. The Access Denied debugger sounds like a massive timesaver too.
Oh that’s so nice to hear! It’s quite an early alpha, but I’ve working to expand support for more resource types and details. Feedback is very welcomed.
I’ve been working on a tool for managing AWS Organizations, SCPs, and IAM policies. At the moment it’s more a collection of scratch-my-own-itch features (interactive tree view for accounts, access denied debugger, and a few tools related to seeing how SCPs are inherited through the OU structure). Hosting it at wut.dev if this sounds interesting to you.
One neat thing (although makes it more challenging to build) is that I’m using the AWS JS SDK to do everything client side. So the whole app is basically a single HTML/JS page with no API, creds are only stored locally, etc.