LogoLogo
  • ABOUT
    • πŸ‘‹Introduction
    • πŸ”Safety & Security
    • ♾️CI/CD
    • 🏁Start Here
      • What to Expect
      • Setup Checklist
      • Understanding Operation Modes
  • Get Started
    • Autonomous Cloud Management
      • Connect AWS account
      • Connect Azure account
      • Connect GCP account
      • Connect Kubernetes cluster
        • πŸ€–Sedai Smart Agent
        • EKS Agentless Setup
        • AKS Agentless Setup
        • GKE Agentless Setup
      • Connect Monitoring Data
    • Augmented FinOps
      • Connect AWS Billing Account
      • Connect Azure Billing Account
  • Platform
    • βš™οΈSettings
      • Features
        • Optimization
        • Availability
        • Tag Configuration
      • Groups
      • Schedules
    • πŸ”„Optimization
      • AWS
        • Lambda
        • ECS
        • EC2
        • Storage
      • Kubernetes
      • Azure
        • Azure VMs
      • GCP
        • Dataflow
    • πŸ’‘Release Intelligence
    • πŸ‘οΈActivity
    • 🎯Service Level Objectives
    • 🌐Integrations
      • πŸ–₯️Infrastructure as Code (IaC)
        • Resource to IaC File Mapping
      • πŸ””Notifications
      • 🎫Ticketing & Service Management
    • πŸ”‘Single Sign-On / RBAC
  • Help
    • ❓Technical FAQ
    • Contact support@sedai.io
    • Schedule onboarding call
Powered by GitBook
On this page
  • IAM Policy Statements for Sedai
  • Set up IAM via Onboarding Wizard
  • Set up IAM manually
  • Update CloudFormation Stack
  • Resources

Was this helpful?

  1. Get Started
  2. Autonomous Cloud Management

Connect AWS account

Connect your AWS account to Sedai's cloud management system by configuring IAM roles. Follow this detailed guide to set up secure access for autonomous operations.

Last updated 6 months ago

Was this helpful?

If you do not have access to configure IAM or run CloudFormation stacks within your organization, we recommend raising a ticket with your security team.

Summary: Sedai securely connects to your cloud account and discovers supported cloud resources and automatically imports relevant CloudWatch metrics. The integration does not impact your privacy policies or include access to logs. We provide a CloudFormation stack to easily create an IAM Role and attach Sedai's policies to it, so that you will only need to provide Sedai with the Role ARN. These steps need to be repeated for each AWS account you want to connect to Sedai. In this page:

To experience the full value of Sedai, we recommend providing read-write access and managing permissions/reinforcement learning within the platform via the Crawl-Walk-Run modes: Datapilot, Copilot, and Autopilot. It's important to note that Sedai will not make any changes to your resources unless you update the mode setting. Learn more about Sedai's , and when you integrate your resources.


IAM Policy Statements for Sedai

Sedai's IAM policy provides visibility to your infrastructure and the option to allow it to autonomously modify resource configurations. The following summarizes services Sedai supports and how permission is used:

AWS Service
Purpose

ECS

Fargate

Lambda

EC2 S3 ELB

RDS Autoscaling

Discovers resources so that the system can create ML models and use reinforcement learning to reduce cost, improve performance, and prevent availability issues. Note: Sedai will only act if feature settings are set to Copilot or Autopilot mode and if the operation passes rigorous safety checks.

CloudWatch

X-Ray ELB Kinesis DynamoDB Logs App Mesh

(Read-only) Informs discovery process to help Sedai understand topology infrastructure.

Select these policies if you only want to explore Sedai and get familiar with the type of information it presents. Keep in mind that the system will not be able to use reinforcement learning, so predicted savings are typically less significant.

Use these policies if you want to explore Sedai’s capabilities and prohibit autonomous management. This allows Sedai to analyze monitoring data and predict low-confidence opportunties. The system will only be able to function in Datapilot mode, and will not be able to execute operations in Copilot or Autopilot mode.

Note: These policies do not support Sedai's ML models. If you are not ready to fully explore an autonomous system, you can start with read-only access and update the policy permissions later. Contact our team at support@sedai.io for help.

Sedai individually connects to Kubernetes clusters, so EKS clusters are displayed independent of their corresponding AWS account.


Set up IAM via Onboarding Wizard

  1. Navigate to your Sedai account (https://yourcompany.sedai.app). If you have not yet integrated cloud resources, by default you should see the integration wizard; otherwise, navigate to Settings > Integrations and click Connect Cloud.

  2. Click to execute the CloudFormation stack. This will open your AWS console (ensure you are logged in to the correct AWS account). Once completed, navigate to the Outputs tab to copy the Role ARN and go back to Sedai to enter it. Sedai will generate an External ID based on the provided ARN.


Set up IAM manually

Create IAM Policy

Create IAM Role (Recommended)

  1. Go to Settings > Integrations and select Connect Cloud.

  2. Select AWS as your cloud provider & select your resource types and the cloud products you'd like Sedai to manage.

  3. After giving you cloud a nickname, click the button the Launch CloudFormation (Make sure you're logged in to the AWS account you wish to integrate with Sedai)

  4. On the screen that will open in the CloudFormation console, leave the selections as is and click Next.

  5. In the Specify stack details page, enter the stack name.

  6. In the Sedai app configuration section, leave the custom external ID field empty (unless a custom external ID was provided previously).

  7. In the Permission section, select which cloud products you'd like Sedai to manage (please ensure this matches the selections you previously made within Sedai when connecting your account)

  8. Click Next, then scroll down and click Next again.

  9. In the Review and create page, check the capabilities and click Submit

  1. Make sure you're logged in to the AWS account you'd like to integrate with Sedai.

  2. Go to the CloudFormation console

  3. Click Create Stack and select With new resources (standard)

  4. Under Prepare template, select Template is ready

  5. Under Specify template, select Amazon S3 URL. Provide the following link then click Next:

https://sedai-onboarding-templates-prod.s3.amazonaws.com/nested/sedai-integration-main.yml
  1. In the Specify stack details page, enter the stack name.

  2. In the Sedai app configuration section, leave the custom external ID field empty (unless a custom external ID was provided previously).

  3. In the Permission section, select which cloud products you'd like Sedai to manage (please ensure this matches the selections you previously made within Sedai when connecting your account)

  4. Click Next, then scroll down and click Next again.

  5. In the Review and create page, check the capabilities and click Submit.

  1. Navigate to Identity and Access Management (IAM) within your AWS Console.

  2. Under Trusted entity type, select AWS account and then choose Another AWS account. Enter Sedai's unique Account ID (this will be displayed within the platform when you add a new cloud from the Integrations page and opt to manually set up IAM authentication with an IAM Role). Optionally, add the External Id, which is also displayed along with the Account Id in the previous page. Skip the additional options and select Next.

  3. Select the policy created in Step 2.

  4. Enter a Role name and Description, and select Create to complete setup.

  5. Copy the ARN. This will be used to add your connect your resources to Sedai from the Integrations page.

  1. Create IAM policy:

aws --profile AWS_PROFILE iam create-policy --policy-name SedaiAWSIntegrationIamPolicy --policy-document file://sedai-policy.json
  1. Create IAM Role and attach policy:

curl -o assume-role-policy.json https://raw.githubusercontent.com/SedaiEngineering/sedai-onboarding/main/aws/sedai-assume-role-policy-document.json
aws --profile AWS_PROFILE iam create-role --role-name SedaiAWSIntegrationRole --assume-role-policy-document file://assume-role-policy.json
aws --profile AWS_PROFILE iam attach-role-policy --role-name SedaiAWSIntegrationRole --policy-arn "arn:aws:iam::737058061372:policy/SedaiAWSIntegrationIamPolicy"
  1. Copy the ARN. This will be used to add your connect your resources to Sedai from the Integrations page.

If you plan to connect multiple EKS clusters from the same environment to Sedai, you will only need to create one IAM Role. The same ARN can be used to connect each cluster to Sedai.

Create IAM User

If your organization follows a scheduled key rotation, you will need to reconnect to Sedai each time. We recommend connecting your AWS cloud with an IAM Role instead to ensure uninterrupted access.

  1. Navigate to Identity and Access Management (IAM) within your AWS Console.

  2. Select Add Users and enter an easy to identify User name.

  3. Under AWS credential type, select Access key - Programmatic access. Select Next: Permissions.

  4. Under Set Permissions, select Attach existing policies directly and select the policy you created in Step 2.

  5. You can optionally add Tags in the next step. Otherwise proceed to Review and Create User to finish setup.

  6. You can optionally view or download the created User's security credentials. You will need the Access and Secret Key to connect your resources to Sedai.


Update CloudFormation Stack

To update Sedai's cloud product permissions, adjust permissions both within Sedai and the AWS console. Within the AWS console, follow the steps below. Within Sedai, go to Settings > Integrations, select the cloud account, and click Edit under Managed Cloud Products.

When updating a CloudFormation stack, change sets allow you to preview planned changes before applying them, ensuring no unintended consequences. To do this, follow this process:

  1. Access the CloudFormation console within the AWS Management Console.

  2. Select the desired stack from the list and select the Change Sets tab.

  3. Click Create change set then name the change set.

  4. On the page to specify the template, choose Use existing template and click Next.

  5. Update the Permission sections to reflect which cloud products you'd like Sedai to manage.

  6. Click Next, then scroll down and click Next again.

  7. In the Review and create page, check the capabilities and click Submit.

  8. Review the planned changes then click Execute change set.

  9. On the Execute change set? pop up, review the planned changes and specify your preferred options (We recommend using the pre-selected options).

  10. Click Execute change set to enact the changes.

After updating a CloudFormation stack, we recommend monitoring the deployment.

When you create or update a CloudFormation stack, you can track the update's progress ensure to it's functioning properly. Within the CloudFormation console, the Events tab displays the status of each resource during the update process. Refresh this tab to ensure it shows the CREATE_COMPLETE or UPDATE_COMPLETE status. If the deployment has failed, try re-deploying it.


Resources

Keep in mind that all integrated resources (irrespective of the policy used) will automatically run in Datapilot mode, which only analyzes monitoring data and does not make changes to your cloud resources. You can configure how Sedai manages your resources from the Settings > Resources page ().

(Read-only) Pulls monitoring data for continuous seasonality and performance analysis. By default, Sedai automatically imports relevant metrics to analyze resource behavior. You can additionally from other APM and observability providers.

Use these policies if you want to enable autonomous management within your AWS account. These policies include read-write access to the respective cloud resource type, which allows Sedai to make changes on your behalf (if set to ), as well as enable Sedai's ML models.

(includes read-only access to CloudWatch)

Even if you're not ready to run autonomous, we still recommend integrating your account with read-write permissions. You can set Sedai's features to run in , which will only generate recommendations for you to review.

(includes read-only access to CloudWatch)

To connect to EKS, we recommend deploying Sedai's within the cluster; however, you can alternatively via IAM authentication and Kubernetes Role Based Access Control (RBAC).

This approach uses a that by default provides read-write access. From Sedai's interface you will be able to select which resources you want Sedai to import and manage.

Choose the AWS products within your account that you want to integrate to Sedai. Based on your selection, Sedai will generate your custom policy. By default, this policy includes read-write access. If you want to use read-only access, you will need to .

From the AWS Console, navigate to Policies under Identity and Access Management. Select Create Policy. Copy your preferred and paste it into the JSON policy editor. View to learn more.

Create Sedai's

Select Role > .

Download your preferred Sedai .

If you are restricted from using CloudFormation, you can create an IAM role with S3 URLs for either the read-write policies or read-only .

Create Sedai's.

Select Role >

You can update a CloudFormation stack to change Sedai's permissions. If read-only access is disabled, you can then manage which cloud products Sedai has permission to optimize, as long as optimization is enabled in within Sedai.

learn more
Copilot or Autopilot mode
Common
Elastic Block Stage (EBS)
Elastic Compute Cloud (EC2)
Elastic Container Service (ECS)
Elastic Kubernetes Service (EKS)
Lambda
Relational Database Service (RDS)
Simple Storage Service (S3)
Datapilot mode
Common
Elastic Block Stage (EBS)
Elastic Compute Cloud (EC2)
Elastic Container Service (ECS)
Elastic Kubernetes Service (EKS)
Lambda
Relational Database Service (RDS)
Simple Storage Service (S3)
Smart Agent
set up agentless access
CloudFormation Stack
Create Role
Create User
Settings > Resources
manually configure IAM
AWS documentation
Sedai policy
IAM policy.
policy
policies
IAM policy
connect monitoring data
operation modes
what to expect
IAM Policy Statements for Sedai
How to set up IAM via Onboarding Wizard
How to set up IAM manually
How to update Sedai's CloudFormaton Stack
permissions
Policies and permissions in IAM - AWS Identity and Access ManagementAWS Identity and Access Management
IAM roles - AWS Identity and Access ManagementAWS Identity and Access Management
IAM users - AWS Identity and Access ManagementAWS Identity and Access Management
Logo
Logo
Logo