Connect to Turbot Pipes from TablePlus
TablePlus is a SQL IDE to query, edit and manage your databases.
Steampipe provides a single interface to all your cloud, code, logs and more. Because it's built on Postgres, Steampipe provides an endpoint that any Postgres-compatible client -- including TablePlus -- can connect to.
You can get the information needed to connect to your Turbot Pipes database instance from the Query tab for your workspace. On the Query tab, click the info button at the top of the query window to show the connection information.
Once the connection to Turbot Pipes is established and tested, you can access the tables provided by the Steampipe plugins, run queries and build reports.
You can also connect TablePlus to
Steampipe CLI. To do that, run
steampipe service start --show-password
and use the displayed connection
details.
Steampipe service is running:
Database:
Host(s): localhost, 127.0.0.1, 192.168.29.204 Port: 9193 Database: steampipe User: steampipe Password: 99**_****_**8c Connection string: postgres://steampipe:99**_****_**8c@localhost:9193/steampipe
Getting started
TablePlus is available on the desktop and the free version can be used without any need for account creation. In this example we will create a Turbot Pipes connection with TablePlus and query the AWS EC2 SSL policies.
To establish a new connection click on Create a new connection
, select
PostgreSQL and click Create
. Enter the Turbot Pipes connection details, keep
the SSL mode (Preferred
), and click Test
to verify the connection.
Once you've connected to Turbot Pipes, you can access the AWS plugin and its tables from the namespace provided at the bottom left of the window.
Here we select the aws_ec2_ssl_policy
table. TablePlus displays the table's
schema and previews the data. You may also choose to export the data to CSV,
JSON or SQL.
Run your first custom query
TablePlus comes with a SQL query editor that you may use to write a custom query. For example, we can use this query in the editor to fetch the S3 buckets with default encryption disabled
select name, region, server_side_encryption_configurationfrom aws_s3_bucketwhere server_side_encryption_configuration is null;