Connect your AWS account to Cloudmon using read-only IAM credentials. Once connected, Cloudmon auto-discovers your resources and begins collecting metrics in real time.
This guide walks you through connecting your AWS account to Cloudmon for the first time. Once complete, Cloudmon will have read-only access to your AWS environment and will begin auto-discovering your resources.
Before you begin, ensure the following are in place:
| Title | Description |
| AWS Account access | You must have IAM permissions to create users, roles, and attach policies |
| Cloudmon account | An active Cloudmon account with Cloud Monitoring license |
| Supported regions | All standard AWS regions are supported. |
| Services to monitor | Decide which services you want to monitor (EC2, RDS, S3, etc.) — you will scope IAM permissions accordingly |
Cloudmon connects to your AWS account using a dedicated read-only IAM user or cross-account IAM role. It calls AWS CloudWatch and service-specific APIs at regular intervals to pull metrics, resource lists, and configuration data. Nothing is installed inside your AWS environment.
Follow the AWS documentation to create a read-only IAM policy: Creating IAM policies — AWS documentation
Follow the AWS documentation to create a programmatic IAM user and attach your policy: Creating an IAM user — AWS documentation
⚠️ Important: The Secret Access Key is shown only once. Store it securely before closing this screen.
If your organization prefers IAM roles over IAM users (recommended for multi-account setups), follow the AWS documentation to create a cross-account IAM role: Creating a cross-account IAM role — AWS documentation
| Field | Value |
| Probe | Select the probe to monitor the AWS environment |
| Name | A friendly name (e.g. "Production AWS") |
| Access Key ID | From Step 2 (if using IAM User) |
| Secret Access Key | From Step 2 (if using IAM User) |
| Services | Select EC2, RDS, S3, or others as needed |
| Discovery Interval | From a list based on the requirement |
| Additional Options | Brings down a Region selection option |
| Notify Discovery (checkbox) | Notifies the user when the environment has been discovered |
| Notify to | Who should receive the notification |
| Tags | Any tags that could be associated with this AWS account |
| Symptom | Likely Cause | Fix |
| "Invalid credentials" error on validation | Access Key ID or Secret is incorrect | Re-enter credentials from the AWS IAM console |
| "Access Denied" on a specific service | IAM policy is missing a required permission | Add the missing action to CloudmonReadOnlyPolicy |
| Resources not appearing after discovery | Wrong region selected, or resources have no CloudWatch data | Check selected regions match where resources are deployed |
| Metrics showing gaps | CloudWatch detailed monitoring is not enabled on the instance | Enable detailed monitoring in AWS EC2 console (adds cost) |
| Role ARN validation fails | Cloudmon's account ID is not trusted in the role's trust policy | Re-check the trusted entity in the IAM role |