unSkript Documentation
Free SandboxBlogGitHubSlack Community
  • What is unSkript?
  • Guides
    • Contribute to Open Source
    • Getting started
      • Sign Up/Install
      • Authentication
        • Okta configuration
          • Okta Groups Sync
      • Create a Proxy
      • Add Credentials to Connect your Resources
      • Key Terms
  • RunBooks
    • Prebuilt xRunBooks
      • xRunBooks for CloudOps
      • xRunBooks for Cost Optimization
      • xRunBooks for DevOps
      • xRunBooks for IAM
      • xRunBooks for SecOps
      • xRunBooks for SRE
      • xRunBooks for Troubleshooting
    • Creating RunBooks
      • Importing unSkript xRunBooks
      • Create a xRunBook
      • Add an Action
      • Connecting Actions
      • Create a RunBook Input Parameter
      • Create a Credential
      • Writing Notes
      • Running XRunBooks
        • Running RunBooks with Approvals
      • Schedules
      • xRunBook Executions
      • Alarms
        • Create an Alarm Webhook
          • Webhooks for onprem installations
        • Create a Grafana Alert
        • Attaching runbooks to alarms
      • Folders
      • RunBook Outputs
  • Actions
    • What is an Action?
    • Create Custom Actions
    • Create Actions with AI
    • Actions
      • Action Configuration
        • Configure Action Inputs
        • Add Action Inputs
        • Action Output
        • Action Iterator
          • Using Iterators
        • Action Poll
        • Action Start Condition
      • Anatomy of an Action
    • Prebuilt Actions
  • Healthchecks
    • What is a HealthCheck?
    • Create a HealthCheck
      • Create a HealthCheck Folder
      • Adding Checks
    • HealthCheck Parameters
    • Running HealthChecks
    • HealthCheck Remediation
  • Workflows
    • What is a Workflow?
  • Connnecting
    • Connectors
      • Airflow
        • Airflow Actions
      • AWS
        • AWS Actions
          • AWS Cloudwatch Actions
          • AWS EC2 Actions
          • AWS ECS Actions
          • AWS EKS Actions
          • AWS ELB Actions
          • AWS IAM Actions
          • AWS Postgres Actions
          • AWS RDS Actions
          • AWS RedShift Actions
          • AWS S3 Actions
          • AWS VPC Actions
      • Azure
        • Azure Actions
      • ChatGPT
        • ChatGPT Actions
      • Datadog
        • Configuring webhook in Datadog
        • Datadog Actions
          • Datadog Alert Actions
          • Datadog Metrics Actions
          • Datadog Monitor Actions
      • Elasticsearch
        • Elasticsearch Actions
      • GCP
        • GCP Actions
          • GCP Bucket Actions
          • GCP GKE Actions
          • GCP IAM Actions
          • GCP VM Actions
      • Github
        • Github Actions
      • Grafana
        • Grafana Actions
      • Hadoop
        • Hadoop Actions
      • Jenkins
        • Jenkins Actions
      • Jira
        • Jira Actions
      • Kafka
        • Kafka Actions
      • Kubernetes
        • K8s Actions
      • MongoDB
        • MongoDB Actions
      • MS SQL
        • MSSQL Actions
      • MySQL
        • MySQL Actions
      • Netbox
        • Netbox Actions
      • Nomad
        • Nomad Actions
      • OpenSearch
        • opensearch Actions
      • Pingdom
        • Pingdom Actions
      • Postgres
        • Postgres Actions
      • Prometheus
        • Prometheus Actions
      • Redis
        • Redis Actions
      • REST
        • REST Actions
      • SalesForce
        • SalesForce Actions
      • Slack
        • Slack Actions
      • Snowflake
        • Snowflake Actions
      • Splunk
        • Splunk Actions
      • SSH
        • SSH Actions
      • Stripe
        • Stripe Actions
      • Terraform
        • Terraform Actions
      • Zabbix
    • Proxies
      • Environment
        • RunBooks Across Environments: ServiceIDs
      • unSkript Proxy
      • AWS Proxy
      • GCP Proxy
    • Secret store
      • Vault
  • Tooling
    • Role Based Access Control
      • RBAC Roles
    • API reference
      • Authentication
      • Endpoints
        • Executions
        • RunBooks
        • Schedules
    • Command Line Tool
    • Notifications
  • Fundamentals
    • Jupyter Notebook 101
  • Use Cases
    • DevOps
    • SRE
  • Open source
    • Runbooks.sh
    • Contribute to Open Source
  • Lists
    • AWS Service Quota list
Powered by GitBook
On this page
  • Listing of all AWS XRunBooks
  • Listing of all AWS Actions
  • Authentication
  • Access Key
  • Creating AWS Access Keys
  • Assume Role
  • Create an AWS Cloudwatch Webhook

Was this helpful?

  1. Connnecting
  2. Connectors

AWS

PreviousAirflow ActionsNextAWS Actions

Last updated 1 year ago

Was this helpful?

Authentication

For the Docker version, we support Access Key based credential. In the SAAS version, we accept either the Access Key or Role based authentication:

Access Key

Adding an AWS Access Key to unSkript. When adding a credential to an Action, a dialogue will open to insert your Access Key details.

Name
Explanation

Access Key

Access key ID

Secret Access Key

Secret Access Key for the above Access Key ID

Creating AWS Access Keys

  1. Once you are logged in, go to Identity and Access Management (search for IAM in the top search bar)

  2. If you do not yet have a Group or User with the permissions for unSkript, create this user, and add the required permissions.

3. Click on the user. This will open a new browser window with a summary of the user.

4. This will open a new window. Select the "Security credentials" tab in the middle of the screen:

5. Click "Create access key" . This will generate your key/secret key. Copy them from the page, and insert them into your unSkript credentials.

Assume Role

Name
Explanation

Role ARN

ARN of the role to be assumed

Role Session Name

Unique identifier for the session when the above role is assumed

External ID

A unique identifier that might be required when you assume a role

Create an AWS Cloudwatch Webhook

Your AWS Cloudwatch alerts can be used to start RunBooks or Workflows. This requires a webhook listener in your unSkript installation. These instructions assume you have already created a credential into your Grafana instance.

  1. In your unSkript installation, click *Proxies* from the top menu.

  2. Find the Environment where your AWS credential is stored, and open this proxy.

  3. In your list of credentials, find your AWS credential:

<figure><img src="../../../.gitbook/assets/image (13) (3).png" alt=""><figcaption></figcaption></figure>
  1. In the "webhook URL" column, Click the Generate button.

  2. Copy your url/Username and password. These will be available on this page if you need them again.

If you do not have an Access Key or a Secret Access Key, you will need to create this in your .

AWS dashboard
Listing of all AWS XRunBooks
Listing of all AWS Actions
List of users on the AWS IAM service
IAM user summary with the security credentials tab selected
Screenshot of the key creation window