Info |
---|
This article instructs on adding an AWS account explains how to add AWS accounts to Cloudaware using the an AWS IAM role. Ensure you have a Cloudaware account and the necessary level of access to the AWS console before proceedingpermissions in AWS. |
Log in to your Cloudaware account → Admin.
...
Find Amazon Organizations & Accounts. Click +N Configured →+Add Amazon Account.
...
ADD AMAZON ACCOUNT:
...
Type AWS account name in the form. Select ‘AWS 'AWS IAM role’ role' as authentication type by clicking the corresponding tile.
a. Select AWS Partition.:
...
b. Click Generate Random (crossed arrows button) to generate External ID:
...
Copy and save External ID required for Cloudaware IAM Role creation in AWS console.
c. Select the preferable integration type for IAM role creation by clicking the corresponding tile.
...
CloudFormation Stack
...
CloudFormation Template
...
option for CloudFormation stack creation:
Quick launch | Manual creation |
---|---|
This option allows launching AWS CloudFormation stack with a pre-generated Cloudaware template. Click Launch Stack to be redirected to AWS Console: 'CloudFormation Template' | This option allows the manual creation of and setting up of a stack for the Cloudaware IAM roleAWS CloudFormation stack. Click Template to download* the CloudFormation template: *Download populated with account data - the template will contain your Cloudaware account-specific data with AWS Account data auto-populated, e.g. billing buckets Replace the default placeholders of |
"ParameterLabels": {
"AccessRoleArn": {
"default": "CloudAware Role ARN"
},
"AccessRoleName": {
"default": "CloudAware Role Name"
},
"AccessExternalId": {
"default": "External ID" |
4
...
4. In AWS console, if you chose:
...
CloudFormation Stack
...
. Log in to AWS console:
Quick launch | Manual creation |
---|---|
Note that Amazon S3 URL is pre-selected as Template source in Step 1. The URL for Cloudaware template is auto-populated. Click Next. | Go to All Services → the section 'Management & Governance' → CloudFormation. Click Create Stack → Stack → With new resources (standard). At the 'Step 1 - Create Stack'* selectSelect Upload a template file →click Choose file* to upload the template. Click Next. * - upload the Cloudaware template. |
At the 'Step 2 - 5. Specify stack details' in AWS:
a. Provide Stack name (or leave it as is, e.g. cloudaware-iam-role-stack)
...
CloudAware Role ARN: leave it as is
CloudAware Role Name: Replace replace auto-generate with a meaningful name, e.g. Cloudaware IAM _Role
External ID: paste External ID generated in the Cloudaware console (see step 3.b)
c. In the section 'Policies', select preferable features. Click Next.
At the 'Step 3 - Configure stack options' in AWS: set 6. Set up tags and permissions, stack failure options, and advanced options if necessary. Click Next.
At the 'Step 4 - Review and create' in AWS: check 7. Review the stack details and check . Check the box I acknowledge that AWS CloudFormation might create IAM resources with custom names. Click Submit.
...
Note |
---|
Please allow some time for the stack to be created. |
8. Open the tab 'Outputs' for the created stack. Copy the IAM Role ARN value.
59. Go back to Cloudaware. Paste Role ARN in the form. Click Check:
...
Once validation is passed,click Add Save.
Your AWS account will be added automatically. Please allow some time for Cloudaware to gather data from your AWS account based on the granted permissionscollect AWS data.