Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

This article instructs on adding an AWS account to Cloudaware using access and secret keys. Make sure you have a Cloudaware account and the necessary level of access to the AWS console before proceeding.

  1. Log in to your Cloudaware account → Admin.

Screenshot 2024-09-11 at 6.02.01 PM.png
  1. Find Amazon Organizations & Accounts. Click +N Configured → Add Amazon Account.

Screenshot 2024-09-11 at 6.02.41 PM.png
  1. Type AWS account name in the form. Select ‘Access & Secret Keys’ as authentication type by clicking the corresponding tile.

  1. Click Cloudaware IAM Policies → download all Collector policies (Part #1, Part #2, Part #3, Part #4).

add aws account - using access and secret keys - collector policies.png

The rest of the IAM Policies are optional, depending on the functionality you will use.
CloudTrail (all accounts)
Billing (all accounts)
CloudAware Monitoring
Backups
Tagging (Part #1)
Instance Scheduler
Conflux

  1. Sign in to your AWS console

a. Go to All Services → the section 'Security, Identity, & Compliance' → IAM

b. Select 'Users'. Choose the user to assign permissions to. (to create a user from scratch - use the guide https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html)

c. Add the Cloudaware collector policies to this user. Select the tab 'Permissions' and click Add Inline policy. Select the tab 'JSON' on the next page.

d. Open the previously downloaded file in any text editor, copy the policy code, and paste it into the Policy Document. Click Review Policy. Fill in the name and click Create policy.

  1. Go back to Cloudaware. Insert the Access key and Secret key. Click Check.

add aws account - using access and secret keys - check.png

Once validation is passed, click Add.

Your AWS account will be added automatically. Please allow some time for Cloudaware to collect data about your AWS account based on the provided permissions.

  • No labels