Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: CloudWatch: Support multiple AWS Credentials #3080

Closed
b3cft opened this issue Oct 29, 2015 · 4 comments
Closed

Feature Request: CloudWatch: Support multiple AWS Credentials #3080

b3cft opened this issue Oct 29, 2015 · 4 comments
Milestone

Comments

@b3cft
Copy link

b3cft commented Oct 29, 2015

Hi, we operate multiple AWS accounts but only one Grafana cluster for all environments.

Would be even more fantastic if the the AWS credentials files could be enumerated to allow multiple credentials to be chosen when creating a source... e.g.

[mgmt]
aws_access_key_id = mgmt-id
aws_secret_access_key = mgmt-secret
region = eu-west-1

[dev]
aws_access_key_id = dev-id
aws_secret_access_key = dev-secret
region = eu-west-1

[preprod]
aws_access_key_id = preprod-id
aws_secret_access_key = preprod-secret
region = eu-west-1

[prod]
aws_access_key_id = prod-id
aws_secret_access_key = prod-secret
region = eu-west-1
@torkelo
Copy link
Member

torkelo commented Oct 29, 2015

image

Implemented and merged to master via #3053

:)

@torkelo torkelo closed this as completed Oct 29, 2015
@torkelo torkelo added this to the 2.5.1 milestone Oct 29, 2015
@b3cft
Copy link
Author

b3cft commented Oct 29, 2015

Thanks very much :-)

donh pushed a commit to donh/grafana that referenced this issue Nov 12, 2015
donh pushed a commit to donh/grafana that referenced this issue Nov 12, 2015
@hartfordfive
Copy link
Contributor

@b3cft How did you setup the permissions in IAM for Grafana to be able to access CloudWatch metrics for your multiple accounts?

@b3cft
Copy link
Author

b3cft commented Nov 19, 2015

In each account I'm monitoring, I have created an AWS user and used the AWS Provided Policy CloudWatchReadOnlyAccess. Then added each Access Key, and Secret Key into credentials file as above.

@torkelo torkelo modified the milestones: 2.5.1, 2.6 Nov 23, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants