StackState IAM role: EC2

StackState Self-hosted v4.5.x

This page describes StackState v4.5.x. The StackState 4.5 version range is End of Life (EOL) and no longer supported. We encourage customers still running the 4.5 version range to upgrade to a more recent release.

Go to the documentation for the latest StackState release.

Overview

If StackState is running within an AWS environment on an EC2 instance, it can have an IAM role attached to the EC2 instance. When this role is available, the AWS StackPack can be installed with the use-role option for IAM authentication (the AWS Access Key ID and AWS Secret Access Key). The attached role will then be used by the StackState CloudWatch plugin to retrieve metrics from CloudWatch.

Set up IAM role for StackState on EC2

To set up an IAM role for the AWS StackPack to use, follow the instructions below.

  1. Create a policy that allows the AssumeRole action for the resource arn:aws:iam::*:role/StackStateAwsIntegrationRole. This is the same policy as used for the Agent IAM role on EC2. Take note of the policy name.

  2. Create an EC2 instance role and attach the policy from the previous step. Policy for AssumeRole

  3. Attach the newly created EC2 instance role to the EC2 instance where StackState is running.

Attach role to EC2 instance

See also

Last updated