Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Next »

This article instructs on adding an AWS account to Cloudaware using access and secret keys. Ensure you have a Cloudaware account and the necessary level of access to the AWS console before proceeding.

  1. Log in to your Cloudaware account → Admin.

new admin.png
  1. Find Amazon Organizations & Accounts. Click +N Configured → Add Amazon Account.

admin - N configured.pngadmin - add amazon account.png
  1. Type AWS account name in the form. Select 'Access & Secret Keys' as authentication type by clicking the corresponding tile.

  2. Click Cloudaware IAM Policies → download all Collector policies (Part #1, Part #2, Part #3, Part #4).

add aws account - using access and secret keys - collector policies.png

The rest of the IAM Policies are optional, depending on the functionality you will use, such as:
CloudTrail (all accounts)
Billing (all accounts)
CloudAware Monitoring
Backups
Tagging (Part #1)
Instance Scheduler
Conflux

  1. Sign in to your AWS console

a. Go to All Services → the section 'Security, Identity, & Compliance' → IAM

b. Select 'Users'. Choose the user to assign permissions to. (to create a user from scratch - use the guide https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html)

c. Add the Cloudaware collector policies to this user. Select the tab 'Permissions' and click Add Inline policy. Select the tab 'JSON' on the next page.

d. Open the previously downloaded file in any text editor, copy the policy code, and paste it into the Policy Document. Click Review Policy. Fill in the name and click Create policy.

  1. Go back to Cloudaware. Insert the Access key and Secret key. Click Check.

add aws account - using access and secret keys - check.png

Once validation is passed, click Add.

Your AWS account will be added automatically. Please allow some time for Cloudaware to gather data from your AWS account based on the granted permissions.

  • No labels