

The AmazonRDSforPMMPolicy is now added to your IAM user. The selected policy appears on the Permissions summary page. Select a check-box next to the name of the policy and click Review. Using the Filter, locate the policy with the required permissions (such as AmazonRDSforPMMPolicy). On the Add permissions page, click Attach existing policies directly. On the Permissions tab, click the Add permissions button.

Complete the following steps, to apply the policy: Then, locate and open the IAM user that you plan to use with Amazon RDS DB instances. The last step before you are ready to create an Amazon RDS DB instance is to attach the policy with the required permissions to the IAM user.įirst, make sure that the Identity and Access Management page is open and open Users. PMM retrieves this information automatically and attempts to discover your Amazon RDS DB instances. In case, the PMM Server and Amazon RDS DB instance were created by using the same AWS account, you do not need create the access key ID and secret access key manually. The system automatically generates a new access key ID and a secret access key that you can provide on the PMM Add Instance dashboard to have your Amazon RDS DB instances discovered. To create the access key, open the Security credentials tab and click the Create access key button. To create an access key for use with PMM, open the IAM console and click Users on the navigation pane. To discover an Amazon RDS DB instance in PMM, you either need to use the access key and secret access key of an existing IAM user or an IAM role. On the Set permissions page, add the new user to one or more groups if necessary.
#Amazon aws postgresql images password
Set a custom password and then proceed to permissions by clicking the Permissions button. On the Add user page, set the user name and select the Programmatic access option under Select AWS access type. To define a new policy use the IAM page at AWS. Once defined it can be associated with an existing user or group. Creating a policy ¶Ī policy defines how AWS services can be accessed. In this section, we will create a new user for this purpose.

Then, you need to associate this policy with the IAM user or group. The first step is to define a policy which will hold all the necessary permissions. This section only goes through the essential steps and points out the steps required for using Amazon RDS with Percona Monitoring and Management. The procedure for creating IAM user accounts is well described in the Amazon RDS documentation. On the other hand, you use your AWS account to access all AWS services. This measure improves security as the permissions of an IAM user account can be limited so that this account only grants access to your Amazon RDS DB instances. It is recommended that you use an IAM user account to access Amazon RDS DB instances instead of using your AWS account. Creating an IAM user with permission to access Amazon RDS DB instances ¶
