AWS
Connect Cased to AWS to manage and monitor your cloud infrastructure
Setup Steps
-
In your AWS Management Console go to the IAM service
-
Create IAM Policy under Policies create a new policy in the JSON editor.
-
Paste this JSON into the policy editor and name is
CasedPolicy
.CasedPolicy {"Version": "2012-10-17","Statement": [{"Effect": "Allow","Action": ["autoscaling:Describe*","cloudformation:Describe*","cloudformation:ListStacks","cloudfront:ListDistributions","cloudtrail:DescribeTrails","cloudtrail:GetTrail","cloudtrail:GetTrailStatus","cloudtrail:LookupEvents","cloudwatch:GetMetricData","cloudwatch:GetMetricStatistics","cloudwatch:GetMetricWidgetImage","cloudwatch:ListMetrics","dynamodb:DescribeTable","dynamodb:ListTables","ec2:DescribeInstances","ec2:DescribeNetworkInterfaces","ec2:DescribeSecurityGroups","ec2:DescribeSubnets","ec2:DescribeVpcs","ecs:DescribeClusters","ecs:DescribeServices","ecs:DescribeTaskDefinition","ecs:DescribeTasks","ecs:ListClusters","ecs:ListServices","ecs:ListTasks","ecr:DescribeRepositories","ecr:ListImages","ecr:ListTagsForResource","eks:ListClusters","eks:DescribeCluster","eks:ListNodegroups","elasticache:Describe*","elasticache:ListTagsForResource","elasticbeanstalk:DescribeEnvironments","elasticloadbalancing:DescribeLoadBalancers","iam:GetPolicy","iam:GetPolicyVersion","iam:GetRole","iam:ListAttachedRolePolicies","iam:ListPolicies","iam:ListRoles","iam:ListUsers","kms:DescribeKey","kms:ListKeys","lambda:ListFunctions","logs:DescribeLogStreams","logs:DescribeLogGroups","logs:GetLogEvents","rds:DescribeDBInstances","rds:DescribeDBSnapshots","rds:DescribeEvents","rds:ListTagsForResource","s3:GetBucketLocation","s3:ListAllMyBuckets","s3:ListBucket","s3:GetObject","sns:ListSubscriptions","sns:ListTopics","sqs:ListQueues"],"Resource": "*"}]} -
Create IAM Role
- Open IAM in AWS Console
- Go to Roles → Create role
- Choose “AWS account” as trusted entity type
- Enter Cased account ID:
495860673956
- Attach the policy you created
- Name the role (e.g.,
CasedRole
)
-
Almost done! Configure Cased:
- Copy your Role ARN from the role summary page
- Format:
arn:aws:iam::<YOUR_ACCOUNT_ID>:role/CasedRole
- Paste the ARN in Cased’s AWS connection settings
- Select your AWS region