Automatically tags AWS resources on creation with creator ARN, creation time, and invoked service for cost allocation and governance.
AutoTag is an open-source solution that automatically applies tags to AWS resources immediately upon creation. It uses CloudTrail events delivered via CloudWatch Events to trigger a Lambda function, which tags the resource with metadata like the creator's ARN, creation timestamp, and the invoking AWS service. This enables better cost allocation, governance, and resource management across AWS environments.
AWS administrators, cloud engineers, and DevOps teams responsible for managing multi-account AWS environments who need automated resource tagging for cost tracking and compliance.
Developers choose AutoTag for its lightweight, AWS-native architecture that integrates seamlessly with CloudTrail and Lambda, offering cost-efficient operation through event filtering and flexible custom tagging via JSON-based variable substitution from CloudTrail events.
Automatically tag AWS resources on creation, for cost assignment
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Leverages CloudTrail events via CloudWatch to trigger tagging immediately upon resource creation, ensuring automatic application without manual intervention for supported AWS services.
Supports JSON-based variable substitution to extract values from CloudTrail events, allowing tags like creator ARN, timestamps, and custom metadata from event fields.
Facilitates deployment across all active AWS regions using provided scripts or CloudFormation StackSets, enabling consistent tagging in global AWS environments.
Uses CloudWatch Event rules with pattern filtering to minimize Lambda invocations, reducing operational costs compared to continuous polling solutions.
The supported resource types table shows gaps, with services like Data Pipeline and DynamoDB lacking IAM deny tag support, and some entries marked as untested or unknown, limiting comprehensive governance.
Relies entirely on CloudTrail events; if CloudTrail is disabled, misconfigured, or experiences latency, tagging fails or is delayed, impacting real-time cost allocation and compliance.
Deployment scripts require meticulous IAM policy configuration and cross-account S3 bucket management, which can be error-prone and time-consuming for teams without deep AWS expertise.