How to add an AWS account settings to your Cloudzy account
Option 1 (Recommended): Add an AWS account using external IAM role:
- Open the Cloudzy Settings page
- Click: Add a new account.
- Enter a Description for the account. Example: "Staging AWS"
- Cloudzy will provide settings you will need for the AWS IAM console. Leave this browser tab open
- Open a new tab in your browser, and login to your AWS console.
- On your AWS console, click on IAM
- Click on Policies, Create Policy
- Select: Create Your Own Policy
- Policy Name: "CloudzyBackupPolicy" (or another name you choose)
- Policy Document: Head over to your Cloudzy browser tab and click "Show Example Policy"
- Copy and paste the example policy provided into the Policy Document field on the AWS console
- Click Create Policy
- Click Roles, Create new Role:
- Select: Role for cross-account access
- Select: Provide access between your AWS account and a 3rd party AWS account
- Account ID: Enter the Cloudzy Account ID provided on your Cloudzy browser tab
- External ID: Enter the External ID provided on your Cloudzy browser tab
- Click Next
- Attach the policy you created in step 5 "CloudzyBackupPolicy", click Next Step
- Role Name: "CloudzyRole", click Create Role
- Click on the newly created role and copy the Role ARN
- example: arn:aws:iam::1234567800000:role/CloudzyRole
- Head over to your Cloudzy browser tab and enter the Role ARN on the Cloudzy Create Account page
- Click "Test credentials" to be sure the account is setup correctly
- You should see "Permissions are set correctly"
- Click "Create Credentials".
You're now ready to setup Jobs and start automatic backups.
Option 2 (Advanced / not recommended): Add an AWS account using access keys
- Open the Cloudzy Settings page
- Click: Add a new account.
- Enter a Description for the account. Example: "Staging AWS"
- Open a new tab in your browser, and login to your AWS console.
- Your AWS user and access keys will need the following permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Stmt1496019595000",
"Effect": "Allow",
"Action": [
"ec2:CreateSnapshot",
"ec2:DeleteSnapshot",
"ec2:DescribeSnapshots",
"ec2:DescribeInstances",
"ec2:CreateTags",
"ec2:DescribeSnapshotAttribute",
"rds:CreateDBSnapshot",
"rds:CreateDBClusterSnapshot",
"rds:DeleteDBSnapshot",
"rds:DeleteDBClusterSnapshot",
"rds:DescribeDBSnapshots",
"rds:DescribeDBInstances",
"rds:DescribeDBSnapshotAttributes",
"rds:AddTagsToResource",
"rds:ListTagsForResource",
"iam:SimulatePrincipalPolicy",
"budgets:*"
],
"Resource": [
"*"
]
}
]
}