AWS ARN Parser
Examples:
About the AWS ARN Parser
The AWS ARN Parser is a free, open-source, and fully client-side web utility developed by AxelBase this tool was created to solve a common pain point in AWS development: validating and understanding Amazon Resource Names (ARNs) without risking data exposure.
ARNs are the universal identifiers used across AWS services — from IAM policies to CloudFormation templates, Lambda triggers, and EventBridge rules. A single malformed ARN can cause access denied errors, deployment failures, or unintended privilege escalation. This parser eliminates guesswork by instantly validating syntax, extracting components, and providing structured JSON output.
Built with SvelteKit, TypeScript, and Bootstrap 5, the entire application runs in your browser. No backend. No API calls. No cookies. No analytics. Your ARNs never leave your device. The source code is MIT-licensed and available on GitHub, allowing full customization, forking, and offline deployment.
The parser supports all standard AWS partitions (aws, aws-cn, aws-us-gov, etc.), handles global services (S3, IAM), parses resource qualifiers (Lambda :prod, :1), and validates wildcards in IAM policies. It’s designed for developers, DevOps engineers, security auditors, and cloud architects who demand precision and privacy.
Whether you're writing IAM roles, debugging CloudTrail logs, or building CI/CD pipelines, this tool ensures your ARNs are correct before they hit production. It’s part of a broader mission at AxelBase to create lightweight, privacy-first developer tools that work anywhere — even offline.
Accuracy. Privacy. Speed. Built for the modern AWS practitioner.
How to Use the ARN Parser
Using the AWS ARN Parser is straightforward and designed for instant feedback. Follow these steps to validate and decode any ARN in seconds:
- Enter Your ARN: Paste or type a full ARN into the input field. Examples include S3 buckets, EC2 instances, Lambda functions, IAM roles, or DynamoDB tables. The parser supports both standard and wildcard formats.
- Try Example ARNs: Not sure where to start? Click any of the pre-loaded example links (e.g., S3 Bucket, Lambda Function, IAM Role) to auto-populate the field with real-world ARNs.
- Click “Parse ARN”: Hit the green button or press Enter. The parser runs instantly using deterministic logic in
arnParser.ts. Results appear in under 100ms. - Review the Breakdown: A color-coded table displays:
- Partition:
aws,aws-cn, etc. - Service:
s3,lambda, etc. - Region & Account ID: Empty for global services
- Resource Type & ID: Split intelligently using
/or: - Full Resource Path: Reconstructed for clarity
- Partition:
- Export Results: On success, a Copy JSON button appears. Click to copy the structured object to your clipboard — perfect for documentation, testing, or IaC integration.
- Handle Errors: Invalid ARNs trigger a red alert with specific feedback (e.g., “Missing colon after service”, “Unknown partition”). Fix and re-parse.
Pro Tip: Bookmark this page or deploy it locally via GitHub Pages for offline use during security reviews or on air-gapped systems.
Frequently Asked Questions
arn:partition:service:region:account-id:resource. ARNs are required in IAM policies, API operations, CloudFormation, and cross-account access. They ensure unambiguous resource targeting across regions and accounts.index.html in any browser. Or deploy to GitHub Pages, Netlify, or Vercel. The app is static and works without internet after initial load.aws, aws-cn, aws-us-gov, aws-iso, aws-iso-b. Future partitions can be added by editing one line in arnParser.ts.