SWAMP_EXTENSIONS
Draw new abilities from the depths
@dougschaefer/google-meet-hardware
Google Meet hardware device monitoring via Workspace Admin Reports API. Tracks device online/offline state, peripheral attach/detach (camera, mic, speaker, display, touch controller), call state (Meet, Teams, Webex, Zoom), power state, firmware updates, and restarts. Uses service account with domain-wide delegation — no interactive auth required.
@swamp/gcp/searchads360
Google Cloud searchads360 infrastructure models
@swamp/gcp/ondemandscanning
Google Cloud ondemandscanning infrastructure models
@swamp/gcp/networksecurity
Google Cloud networksecurity infrastructure models
@swamp/gcp/health
Google Cloud health infrastructure models
@swamp/gcp/groupssettings
Google Cloud groupssettings infrastructure models
@swamp/gcp/datalineage
Google Cloud datalineage infrastructure models
@swamp/gcp/contactcenterinsights
Google Cloud contactcenterinsights infrastructure models
@swamp/gcp/bigqueryreservation
Google Cloud bigqueryreservation infrastructure models
@swamp/gcp/bigquerydatapolicy
Google Cloud bigquerydatapolicy infrastructure models
@swamp/gcp/androidpublisher
Google Cloud androidpublisher infrastructure models
@swamp/gcp/aiplatform
Google Cloud aiplatform infrastructure models
@swamp/aws/neptunegraph
AWS NEPTUNEGRAPH infrastructure models
@webframp/aws/alarm-investigation
CloudWatch alarm investigation and triage model. Enriches CloudWatch alarms with metric activity, SNS subscription data, state-change history, and a verdict classifying each alarm as one of: healthy, stale, silent, noisy, orphaned, or unknown. ## Authentication Uses the default AWS credential chain (environment variables, shared config, instance profiles, ECS task roles). No credentials are stored in swamp. ## Required IAM Permissions ```json { "Effect": "Allow", "Action": [ "cloudwatch:DescribeAlarms", "cloudwatch:DescribeAlarmHistory", "cloudwatch:GetMetricStatistics", "sns:ListSubscriptionsByTopic" ], "Resource": "*" } ``` ## Methods ### investigate Deep-dive enrichment for a single alarm by name. Fetches metric activity for the last 24 hours, state-change history for the last 7 days, and SNS topic subscription counts. Assigns a verdict and writes one `alarm_detail` resource. ``` swamp model method run <name> investigate alarmName="MyAlarm" ``` ### triage Fan-out enrichment across all (or filtered) alarms in the account. Writes one `alarm_detail` resource per alarm plus a `triage_summary` resource with aggregate verdict and state counts. ``` swamp model method run <name> triage swamp model method run <name> triage stateFilter=ALARM limit=50 ``` ## Verdict Classifications | Verdict | Condition | |-----------|--------------------------------------------------------------| | orphaned | INSUFFICIENT_DATA for > 365 days | | silent | In ALARM with no alarm actions configured | | stale | In ALARM for > 180 days | | noisy | > 5 state changes in the last 7 days | | healthy | OK, has actions, and has recent metric data points | | unknown | None of the above patterns matched |
@webframp/aws/terraform-drift
Terraform drift detection for AWS — compares Terraform state against live AWS resources to find configuration drift. Orchestrates data collection from @webframp/terraform (state via CLI) and @webframp/aws/inventory + @webframp/aws/networking (live AWS via SDK), then produces a drift report highlighting missing, extra, and changed resources. ## Quick Start ```bash swamp extension pull @webframp/aws/terraform-drift swamp model create @webframp/terraform tf-infra \ --global-arg workDir=/path/to/terraform/repo swamp model create @webframp/aws/inventory aws-inventory \ --global-arg region=us-east-1 swamp model create @webframp/aws/networking aws-networking \ --global-arg region=us-east-1 swamp workflow run @webframp/terraform-drift ```
@webframp/terraform
Read Terraform and OpenTofu state via CLI and marshal into swamp data. Shells out to `terraform show -json` (or `tofu show -json`) to read state from any configured backend, then writes swamp resources keyed by Terraform resource address for CEL consumption in workflows and reports. Supports workspace selection and binary switching between Terraform and OpenTofu via global arguments. ## Quick Start ```bash swamp extension pull @webframp/terraform swamp model create @webframp/terraform tf-infra \ --global-arg workDir=/path/to/terraform/repo ```
@webframp/redmine
Redmine issue tracker integration - manage issues, projects, and workflows. Provides model methods for CRUD operations on Redmine issues (themes, stories, tasks), project queries, status/tracker/user lookups, and custom field access. Includes reports for flow metrics and sprint summaries, plus a scaffold-story workflow for creating stories with child tasks. ## Quick Start ```bash swamp extension pull @webframp/redmine swamp model create @webframp/redmine tracker \ --global-arg host=https://your-redmine.example.org \ --global-arg apiKey=YOUR_API_KEY \ --global-arg project=your-project ```
@hivemq/jenkins
@webframp/aws/alarms
Query and analyze CloudWatch Alarms for operational visibility and incident response. ## Authentication Uses the default AWS credential chain. Requires CloudWatch permissions. ## Required IAM Permissions - `cloudwatch:DescribeAlarms` - `cloudwatch:DescribeAlarmHistory` ## Usage ```bash # Create alarms model swamp model create @webframp/aws/alarms aws-alarms --global-arg region=us-east-1 # List all alarms swamp model method run aws-alarms list_alarms # List alarms in ALARM state swamp model method run aws-alarms list_alarms --input stateValue=ALARM # Get active alarms (convenience method) swamp model method run aws-alarms get_active # Get alarm history for last 24 hours swamp model method run aws-alarms get_history --input startTime=24h # Get history for a specific alarm swamp model method run aws-alarms get_history --input alarmName=my-alarm --input startTime=7d # Get alarm summary with state counts and recent changes swamp model method run aws-alarms get_summary --input historyHours=6 ``` ## Time Formats The `startTime` and `endTime` parameters accept: - Relative times: `30m`, `1h`, `2d` (minutes, hours, days ago) - ISO 8601 dates: `2026-03-30T12:00:00Z` ## Methods - **list_alarms** - List alarms with optional state and prefix filters - **get_active** - Get all alarms currently in ALARM state - **get_history** - Get alarm state change history - **get_summary** - Get summary with state counts and recent changes
@webframp/aws/inventory
Discover running AWS resources for cost estimation and inventory management. ## Authentication Uses the default AWS credential chain. Requires appropriate IAM permissions for each service being inventoried. ## Required IAM Permissions - `ec2:DescribeInstances` - `rds:DescribeDBInstances` - `dynamodb:ListTables`, `dynamodb:DescribeTable` - `lambda:ListFunctions` - `s3:ListBuckets` ## Usage ```bash # Create inventory model swamp model create @webframp/aws/inventory aws-inventory \ --global region=us-east-1 # List running EC2 instances swamp model method run aws-inventory list_ec2 # List RDS databases swamp model method run aws-inventory list_rds # Full inventory across all resource types swamp model method run aws-inventory inventory_all ``` ## Supported Resources - **EC2** - Instances with state, type, tags - **RDS** - Database instances with engine, storage, Multi-AZ - **DynamoDB** - Tables with billing mode, capacity, size - **Lambda** - Functions with runtime, memory, timeout - **S3** - Buckets (global listing)
@webframp/aws/cost-explorer
Query AWS Cost Explorer for actual spend analysis by service, usage type, and time period. Identifies top cost drivers and spend trends. ## Authentication Uses the default AWS credential chain. ## Required IAM Permissions - `ce:GetCostAndUsage` ## Usage ```bash swamp model create @webframp/aws/cost-explorer aws-costs \ --global region=us-east-1 # Spend breakdown by service (last 30 days) swamp model method run aws-costs get_cost_by_service # Drill into a service's usage types swamp model method run aws-costs get_cost_by_usage_type \ --input service=Amazon Elastic Compute Cloud - Compute # Daily cost trend swamp model method run aws-costs get_cost_trend --input days=30 # Top 20 cost drivers swamp model method run aws-costs get_top_cost_drivers ```
@webframp/aws-ops
AWS Operations Toolkit - Unified incident investigation and operational visibility. This extension provides a complete workflow for investigating AWS outages by gathering data from CloudWatch Logs, Metrics, Alarms, and X-Ray Traces, plus an incident report that summarizes all findings. ## Quick Start ```bash # Install the extension (auto-resolves dependencies) swamp extension pull @webframp/aws-ops # Create model instances for your region swamp model create @webframp/aws/logs aws-logs --global-arg region=us-east-1 swamp model create @webframp/aws/metrics aws-metrics --global-arg region=us-east-1 swamp model create @webframp/aws/alarms aws-alarms --global-arg region=us-east-1 swamp model create @webframp/aws/traces aws-traces --global-arg region=us-east-1 # Run the investigate-outage workflow swamp workflow run @webframp/investigate-outage ``` ## Required IAM Permissions - `logs:DescribeLogGroups` - `logs:StartQuery` - `logs:GetQueryResults` - `logs:FilterLogEvents` - `cloudwatch:ListMetrics` - `cloudwatch:GetMetricStatistics` - `cloudwatch:GetMetricData` - `cloudwatch:DescribeAlarms` - `cloudwatch:DescribeAlarmHistory` - `xray:GetServiceGraph` - `xray:GetTraceSummaries` ## Included Components ### Workflows - **@webframp/investigate-outage** - Unified incident investigation workflow that: - Gathers alarm summary and active alarms - Analyzes Lambda Duration and Errors metrics for anomalies - Gets X-Ray service dependency graph - Finds error traces and analyzes error patterns - Lists CloudWatch log groups - Gets alarm state change history - Generates an incident report summarizing all findings ### Reports - **@webframp/incident-report** - Workflow-scope report that aggregates findings into: - Alarm status and recent state changes - Metric anomaly highlights - Trace error analysis with top faulty services - Actionable recommendations ### Model Dependencies The workflow expects these model instances (create them before running): - `aws-logs` - @webframp/aws/logs - `aws-metrics` - @webframp/aws/metrics - `aws-alarms` - @webframp/aws/alarms - `aws-traces` - @webframp/aws/traces
@webframp/aws-cost-audit
AWS cost audit workflow — identifies infrastructure waste by combining Cost Explorer spend data, resource inventory, and networking inspection. Generates a report with savings recommendations. ## Quick Start ```bash swamp extension pull @webframp/aws-cost-audit swamp model create @webframp/aws/cost-explorer aws-costs --global-arg region=us-east-1 swamp model create @webframp/aws/networking aws-networking --global-arg region=us-east-1 swamp model create @webframp/aws/inventory aws-inventory --global-arg region=us-east-1 swamp workflow run @webframp/cost-audit ``` ## Required IAM Permissions - `ce:GetCostAndUsage` - `ec2:DescribeInstances`, `ec2:DescribeNatGateways`, `ec2:DescribeAddresses` - `rds:DescribeDBInstances` - `dynamodb:ListTables`, `dynamodb:DescribeTable` - `lambda:ListFunctions` - `s3:ListBuckets` - `elasticloadbalancing:DescribeLoadBalancers`, `elasticloadbalancing:DescribeTargetGroups`, `elasticloadbalancing:DescribeTargetHealth` - `cloudwatch:GetMetricStatistics`
@wendy/leaderboard
Fetch and parse the swamp.club leaderboard into structured JSON. Returns rank, username, score, and events count for 50 entries per page with support for pagination.
Showing 1–24 of 651 extensions