Help Docs

Enable access to your AWS account with CloudFormation stack

For comprehensive AWS infrastructure monitoring, Site24x7 needs to automatically discover all instances of various supported services currently running in your account. For this to happen, you need to authenticate and authorize Site24x7 to access your resource. Previously, this was done by manually creating IAM user roles or by cross-account IAM roles.

Site24x7 uses an AWS CloudFormation template to automatically create an IAM role so that you can effortlessly integrate your AWS account with Site24x7. When you enable access to your AWS environment, you can use the CloudFormation template to automatically create the IAM role. 

Benefits of using AWS CloudFormation template

You can leverage the following benefits with Site24x7's CloudFormation template:

  • Automatic AWS account integration with single click action
  • Support for two different policy permissions for ease of use
  • Provision to choose the required AWS region for CloudFormation stack creation
  • Track the activities related to role creation using the CloudFormation stack events
  • Receive deletion protection for IAM role. The CloudFormation stack deletion does not affect the created role.

How does it work?

The AWS CloudFormation stack, created with the Site24x7 template, generates the IAM role with the provided configurations and a Lambda function. The Lambda function securely sends the generated role ARN for integration using Site24x7 API key.
Once the role ARN details are fetched,  you can configure settings (such as the default threshold profiles for each supported AWS service), mute resource termination alerts, and customize the Guidance Report using the Advanced Configuration option.

 

Pre-requisites

Make sure you have the following before you begin:

  • An AWS account.
  • The following IAM permissions to successfully run the CloudFormation template and create an IAM role
    • "cloudformation:CreateStack",
    • "cloudformation:ListStacks",
    • "cloudformation:GetTemplateSummary",
    • "iam:AttachRolePolicy",
    • "iam:CreatePolicy",
    • "iam:CreateRole",
    • "iam:PassRole",
    • "iam:GetRole",
    • "lambda:AddPermission",
    • "lambda:CreateFunction",
    • "lambda:GetFunction",
    • "lambda:InvokeFunction",
    • "logs:CreateLogGroup",
    • "logs:DescribeLogGroups"

Integrate your AWS account with Site24x7 using a CloudFormation template

To integrate your AWS account with Site24x7 using a CloudFormation template, follow the steps below:

  1. Login to Site24x7 web console.
  2. Navigate to AWS > Integrate AWS account.
  3. Select Register with CloudFormation.
  4. Select the AWS region in which CloudFormation stack needs to be created.
  5. Select the preferred Permissions to be attached with IAM role. Site24x7 provides two options for IAM role permissions:
    • AWS Managed ReadOnlyAccess Policy: The IAM role will be created with the ReadOnlyAccess policy, which is managed by AWS for all services.
    • Site24x7 Custom Policy: The IAM role will be created with the inline policy formulated with read-only permissions required for Site24x7-supported services. Learn more.
  6. Click Create CloudFormation Template.You will be redirected to the AWS console.

  7. In the AWS console, select the acknowledgement check boxes at the bottom of the Capabilities section and click Create stack. The IAM role template will be created via the stack after Site24x7 receives the Lambda API call. 
  8. After creating the IAM role, the CloudFormation stack sends the role ARN to Site24x7 via the Lambda function. Once the role ARN details are fetched,  you can configure settings (such as the default threshold profiles for each supported AWS service), mute resource termination alerts, and customize the Guidance Report using the Advanced Configuration option.
Note

Deletion of the CloudFormation stack will clear the Lambda function that was created. But the IAM role will remain intact even after stack deletion.

Was this document helpful?

Would you like to help us improve our documents? Tell us what you think we could do better.


We're sorry to hear that you're not satisfied with the document. We'd love to learn what we could do to improve the experience.


Thanks for taking the time to share your feedback. We'll use your feedback to improve our online help resources.

Shortlink has been copied!