StackState/Agent IAM role: EC2

StackState Self-hosted v5.0.x

This page describes StackState version 5.0.

Go to the documentation for the latest StackState release.

Overview

If StackState and/or StackState Agent are running within an AWS environment on an EC2 instance, an IAM role can be attached to the EC2 instance for authentication. When this role is available it can be used for authentication by StackState or StackState Agent running on the same EC2 instance.

Note: If the AWS Data Collection Account and the Monitor Account are not a part of the same AWS organization, it is not possible to authenticate using the attached IAM role in this way. For details see the AWS documentation on AWS organizations (docs.aws.amazon.com).

Set up IAM role for StackState/StackState Agent on EC2

To set up an IAM role for StackState or StackState Agent to use, follow the instructions below.

  1. If you did not do so already, create a policy that allows the AssumeRole action for the resource arn:aws:iam::*:role/StackStateAwsIntegrationRole. Take note of the policy name.

  2. Create an EC2 instance role and attach the policy from the previous step.

  3. Attach the newly created EC2 instance role to the EC2 instance where StackState or the StackState Agent is running.

  4. Configure the StackPack instance or Agent AWS check to authenticate using the attached IAM role.

See also

Last updated