OpenSRE uses AWS to map your environment: Lambda functions, EKS clusters, S3 buckets, and more. It reads infrastructure state to build investigation context when cloud-related alerts fire.Documentation Index
Fetch the complete documentation index at: https://opensre.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
- AWS account with IAM permissions
- Either a role ARN (recommended) or static access keys
Setup
Option 1: Interactive CLI
Option 2: Environment variables (IAM role)
Option 3: Environment variables (static keys)
| Variable | Default | Description |
|---|---|---|
AWS_ROLE_ARN | — | IAM role to assume (recommended) |
AWS_EXTERNAL_ID | — | External ID for role assumption |
AWS_REGION | us-east-1 | AWS region |
AWS_ACCESS_KEY_ID | — | Static access key (if not using role) |
AWS_SECRET_ACCESS_KEY | — | Static secret key |
AWS_SESSION_TOKEN | — | Session token for temporary credentials |
Either
AWS_ROLE_ARN or AWS_ACCESS_KEY_ID + AWS_SECRET_ACCESS_KEY is required.IAM permissions
OpenSRE requires read-only access. Attach the following managed policies to the IAM role or user:ReadOnlyAccess(AWS managed) — or a custom policy scoped to the services you want OpenSRE to inspect
Verify
Troubleshooting
| Symptom | Fix |
|---|---|
| AccessDenied on STS | Ensure the caller has sts:AssumeRole permission on the target role |
| InvalidClientTokenId | Check that AWS_ACCESS_KEY_ID is correct and the key is active |
| Could not connect to endpoint | Check AWS_REGION and network connectivity |
| ExpiredTokenException | Refresh your session token or rotate the access key |
Security best practices
- Use IAM roles instead of static keys wherever possible.
- Scope IAM permissions to only the AWS services OpenSRE needs to inspect.
- Rotate static access keys regularly.
- Enable CloudTrail so all OpenSRE API calls are auditable.
Tracer