Use SQL to query vulnerabilities, configurations, and security findings from Upwind.
Clone and build the plugin locally:
git clone https://github.com/tektite-io/steampipe-plugin-upwind.git
cd steampipe-plugin-upwind
make install-devConfigure your credentials in ~/.steampipe/config/upwind.spc:
connection "upwind" {
plugin = "tektite-io/upwind"
# Upwind API credentials (required)
# Get your credentials from: https://console.upwind.io/settings/api-keys
client_id = "your-client-id"
client_secret = "your-client-secret"
org_id = "your-organization-id"
# Optional: Number of results per page (default: 100, max: 10000)
# per_page = 100
}Run a query to find critical vulnerabilities:
select
id,
vulnerability_name,
vulnerability_cvss_v3_severity,
resource_name,
resource_type
from
upwind_vulnerability_findings
where
vulnerability_cvss_v3_severity = 'CRITICAL';git clone https://github.com/tektite-io/steampipe-plugin-upwind.git
cd steampipe-plugin-upwindBuild for development (installs to local plugin path):
make install-devBuild for production (linux/amd64):
make install-prodcp config/upwind.spc ~/.steampipe/config/upwind.spc
vi ~/.steampipe/config/upwind.spcsteampipe query
> .inspect upwind
> select * from upwind_vulnerability_findings limit 5;The plugin version is managed in upwind/version.go. To check the current version:
make versionThis project is licensed under the Mozilla Public License 2.0.
Contributions are welcome! Please feel free to submit a Pull Request.