Skip to main content

Configuration

To be able to analyse and discover your infrastructure, Overmind requires read-only access to your AWS account. There are two ways to configure this:

  • Temporarily: When you run the overmind terraform commands locally, the CLI uses the same AWS access that Terraform does to create a temporary local source. This gives Overmind access to AWS while the command is running, but not afterwards.
  • Permanently (Recommended): This is known as a "Managed Source". Managed sources are always running and assume an IAM role that you create in your AWS account that gives them read-only AWS access.

Configure a Managed Source​

To create an AWS source, open settings by clicking your profile picture in the top right of the screen, then clicking Account Settings, then Sources

Screenshot of the "User settings" menu, showing the first steps to take: Click "Account Settings"

Then click Add Source > AWS.

Screenshot of the sources subsection of the Overmind settings with the Add Source > AWS button highlighted

Then, use "Deploy with AWS CloudFormation" to be taken to the AWS console. You may need to sign in and reload the page. With the results from the CloudFormation deployment, choose a name for your source (e.g. "prod") and fill in "Region" and "AWSTargetRoleARN".

Screenshot of the "Add AWS Source" dialogue, showing tabs for automatic and manual setup. The automatic setup pane is selected. There is explanation text and input fields for Source name, Region and AWSTargetRoleARN.

Press "Create source" to finish the configuration.

Manual Setup​

To allow Overmind to access your infrastructure safely, you need to first configure a role and trust relationship that the Overmind AWS account can assume.

This role will be protected by an external ID.

To create the role, open the AWS console for the account you wish to link to Overmind, then:

  1. Open IAM
  2. Click Roles
  3. Click "Create role"
  4. In "Trusted entity type" select "AWS account"
  5. In "An AWS account" select "Another AWS account" and enter 942836531449
  6. (Optional, you can do this later) Tick "Require external ID". Note: Each source within Overmind has its own unique external ID. In order to find the external ID for a source go to Settings > Sources > Add Source > AWS > Manual Setup and copy the external ID from Step 3. Do not close this window after you have done this, you'll need it later
  7. On the "Add permissions", don't select anything, just click "Next"
  8. In "Role name" enter a descriptive name like overmind-read-only
  9. Click "Create Role"

The next step is to assign permissions to this role. To do this open your newly created role, then:

  1. Click "Add Permissions" > "Create inline policy"

  2. Select JSON

  3. Paste the following policy:

    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Effect": "Allow",
    "Action": [
    "apigateway:Get*",
    "autoscaling:Describe*",
    "cloudfront:Get*",
    "cloudfront:List*",
    "cloudwatch:Describe*",
    "cloudwatch:ListTagsForResource",
    "directconnect:Describe*",
    "dynamodb:Describe*",
    "dynamodb:List*",
    "ec2:Describe*",
    "ecs:Describe*",
    "ecs:List*",
    "eks:Describe*",
    "eks:List*",
    "elasticfilesystem:Describe*",
    "elasticloadbalancing:Describe*",
    "iam:Get*",
    "iam:List*",
    "kms:Describe*",
    "kms:Get*",
    "kms:List*",
    "lambda:Get*",
    "lambda:List*",
    "network-firewall:Describe*",
    "network-firewall:List*",
    "networkmanager:Describe*",
    "networkmanager:Get*",
    "networkmanager:List*",
    "rds:Describe*",
    "rds:ListTagsForResource",
    "route53:Get*",
    "route53:List*",
    "s3:GetBucket*",
    "s3:ListAllMyBuckets",
    "sns:Get*",
    "sns:List*",
    "sqs:Get*",
    "sqs:List*"
    ],
    "Resource": "*"
    }
    ]
    }
  4. Name the policy overmind-read-only

  5. Click "Create policy"

At this point the permissions are complete, the last step is to copy the ARN of the role from the IAM console, and paste it back into Overmind, and create the source. The source will get a green tick once it's started and connected, which should take less than a minute.

Configure Unmanaged Access​

If for some reason, you can't allow external role assumption, you can run the aws-source container in your own infrastructure and allow access that way. Note that in this case you are also responsible for keeping the container up-to-date.

We provide a pre-built docker container.

Check your sources​

After you have configured a source, it'll show up in the Source Settings. There you can check that the source is healthy.

Explore your new data​

Once your new source is healthy, jump over to the Explore page to show all your resources.