You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently PMM supports two ways of discovering RDS instances: through the Instance attached role and through static credentials.
.
There is no way to attach cross-account IAM policy directly to an instance role. The usual recommended method in AWS to access cross account resources is to create a cross-account role and give the resource (in this case the EC2 instance running PMM) permission to attach to that role.
Suggested solution
In addition to static IAM access key and secret credentials, PMM should offer the option of providing an IAM role arn and use STS to assume that role and allow adding RDS instances using those credentials.
Additional context
No response
Code of Conduct
I agree to follow this project's Code of Conduct
The text was updated successfully, but these errors were encountered:
Description
Currently PMM supports two ways of discovering RDS instances: through the Instance attached role and through static credentials.
.
There is no way to attach cross-account IAM policy directly to an instance role. The usual recommended method in AWS to access cross account resources is to create a cross-account role and give the resource (in this case the EC2 instance running PMM) permission to attach to that role.
Suggested solution
In addition to static IAM access key and secret credentials, PMM should offer the option of providing an IAM role arn and use STS to assume that role and allow adding RDS instances using those credentials.
Additional context
No response
Code of Conduct
The text was updated successfully, but these errors were encountered: