# AWS

### [Listing of all AWS XRunBooks](https://github.com/unskript/docs/blob/main/connnecting/connectors/aws/broken-reference/README.md)

### [Listing of all AWS Actions](https://docs.unskript.com/unskript-documentation/connnecting/connectors/aws/action_aws)

### Authentication

For the Docker version, we support Access Key based credential.\
In the SAAS version, we accept either the Access Key or Role based authentication:

## Access Key

Adding an AWS Access Key to unSkript. When adding a credential to an Action, a dialogue will open to insert your Access Key details.

<figure><img src="https://491011674-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fm4p7lGuBAXN5jCVyoF7P%2Fuploads%2FStG2M7k1WfotFv5wQ8Fg%2FScreen%20Shot%202022-10-02%20at%204.32.22%20PM.png?alt=media&#x26;token=c4566f8e-2fe4-406b-9b18-81054b329301" alt=""><figcaption></figcaption></figure>

| Name              | Explanation                                   |
| ----------------- | --------------------------------------------- |
| Access Key        | Access key ID                                 |
| Secret Access Key | Secret Access Key for the above Access Key ID |

### **Creating AWS Access Keys**

If you do not have an Access Key or a Secret Access Key, you will need to create this in your [AWS dashboard](https://aws.amazon.com/).

1. Once you are logged in, go to Identity and Access Management (search for IAM in the top search bar)
2. If you do not yet have a Group or User with the permissions for unSkript, create this user, and add the required permissions.

<figure><img src="https://491011674-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fm4p7lGuBAXN5jCVyoF7P%2Fuploads%2FQUjs0OWAFy0gFrVEn42s%2FScreenshot%202022-11-02%20at%2011.01.30%20AM.png?alt=media&#x26;token=f69b2700-c653-4fac-a3d2-0d74ccf709ec" alt=""><figcaption><p>List of users on the AWS IAM service</p></figcaption></figure>

3\. Click on the user. This will open a new browser window with a summary of the user.

4\. This will open a new window. Select the "Security credentials" tab in the middle of the screen:

<figure><img src="https://491011674-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fm4p7lGuBAXN5jCVyoF7P%2Fuploads%2FyWt4aYH52eQxJ7tZuWPQ%2FScreenshot%202022-11-02%20at%2011.12.37%20AM.jpg?alt=media&#x26;token=71279558-516c-4db9-8b0d-72b0fc4e5cf3" alt=""><figcaption><p>IAM user summary with the security credentials tab selected</p></figcaption></figure>

5\. Click "Create access key" . This will generate your key/secret key. Copy them from the page, and insert them into your unSkript credentials.

<figure><img src="https://491011674-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fm4p7lGuBAXN5jCVyoF7P%2Fuploads%2FETbRM8v341Gd0IiltFub%2FScreenshot%202022-11-02%20at%2011.16.06%20AM.jpg?alt=media&#x26;token=47adfc4d-8727-42b1-ba3f-35bde6fc7807" alt=""><figcaption><p>Screenshot of the key creation window</p></figcaption></figure>

## **Assume Role**

<figure><img src="https://491011674-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fm4p7lGuBAXN5jCVyoF7P%2Fuploads%2FMosjAIU11QjitftqrOR2%2FScreen%20Shot%202022-10-02%20at%204.30.48%20PM.png?alt=media&#x26;token=89e74756-90b5-4ba4-a73b-a66330131dba" alt=""><figcaption></figcaption></figure>

| Name              | Explanation                                                       |
| ----------------- | ----------------------------------------------------------------- |
| Role ARN          | ARN of the role to be assumed                                     |
| Role Session Name | Unique identifier for the session when the above role is assumed  |
| External ID       | A unique identifier that might be required when you assume a role |

## Create an AWS Cloudwatch Webhook

Your AWS Cloudwatch alerts can be used to start RunBooks or Workflows. This requires a webhook listener in your unSkript installation. These instructions assume you have already created a credential into your Grafana instance.

1. In your unSkript installation, click \*Proxies\* from the top menu.
2. Find the Environment where your AWS credential is stored, and open this proxy.
3. In your list of credentials, find your AWS credential:
4.

```
<figure><img src="../../../.gitbook/assets/image (13) (3).png" alt=""><figcaption></figcaption></figure>
```

5. In the "webhook URL" column, Click the Generate button.
6. Copy your url/Username and password. These will be available on this page if you need them again.
