Roadie has the capability to automatically ingest resources from AWS. This is done by automatic discovery and currently ingests all configured resource types per AWS region.
This guide describes how to set up Roadie to access your specific AWS resources and automatically ingest them.
Administration > Settings > AWS Resources and make a note of the Roadie backend role ARN and account ID. This is mentioned on the title text of the AWS Resources integration settings page.
Follow the steps here to create the role.
The role needs to follow this naming convention
You’ll need to attach policies to the role to be able to retrieve information about the resources you want ingested. The supported resources and their needed policies are listed in a table at the end of this page. You can use the same role for multiple resource types as long as the needed permissions are granted to it.
For quick experimentation, you can use
AWS<ResourceType>ReadOnlyAccess policies provided by AWS, but the best practice is to allow only specific needed operations.
If you are using AWS CloudFormation, there is a linked CloudFormation template on the AWS Resources Configuration page which can be used to generate the needed assumable role.
On the AWS Resources settings page
Administration > Settings > AWS Resources in Roadie click
Here you can select the type of resource you want to be ingested. The possible options are listed in the table at the bottom of the page.
After choosing a resource, you need to define the role (created in step 2 above) to be used to ingest these resources, as well as the AWS region to use and the optional External ID configured for the role
After the role configuration is done, you can click the ‘Test Role’ button to check if the role is assumable by Roadie.
The table below lists the permissions required of the assumable role in order for the Catalog to ingest those resource types.
|AWS Policy Action(s)
|AWS Lambda Functions
|AWS Elastic Kubernetes Service Clusters
|AWS Simple Storage Service Buckets
|AWS DynamoDB tables
|AWS Elastic Compute Cloud instances
|AWS Relational Database Service instances
You can expand the code snippet below to show an example policy document for the AWS role. You can add additional statement blocks into the policy document where multiple role policy actions are required.
Needed minimal policy