Create IAM Role

  1. Go to AWS Management Console
  • Find IAM
  • Select IAM

Create IAM Role

  1. In the IAM interface
  • Select Policies
  • Select Create policies

Create IAM Role

  1. In the Create policies interface
  • Copy below policy:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowReadingMetricsFromCloudWatch",
      "Effect": "Allow",
      "Action": [
        "cloudwatch:DescribeAlarmsForMetric",
        "cloudwatch:ListMetrics",
        "cloudwatch:GetMetricStatistics",
        "cloudwatch:GetMetricData"
      ],
      "Resource": "*"
    },
    {
      "Sid": "AllowReadingTagsInstancesRegionsFromEC2",
      "Effect": "Allow",
      "Action": ["ec2:DescribeTags", "ec2:DescribeInstances", "ec2:DescribeRegions"],
      "Resource": "*"
    },
    {
      "Sid": "AllowReadingResourcesForTags",
      "Effect": "Allow",
      "Action": "tag:GetResources",
      "Resource": "*"
    }
  ]
}
  • Select Next: Tags

Create IAM Role

  1. In the Create policy interface
  • Enter key value
  • Enter the value value
  • Select Next:Review

Create IAM Role

  1. In the Create policy interface
  • Name, enter GrafanaAccessPolicy
  • Select Create policy

Create IAM Role

  1. So we have created a policy for Role successfully

Create IAM Role

  1. In the IAM interface
  • Select Roles
  • Select Create role

Create IAM Role

  1. In the Select trusted entity interface
  • Select AWS service
  • Select EC2
  • Select Next

Create IAM Role

  1. In the Add permissions interface
  • Find and select GrafanaAccessPolicy

Create IAM Role

  1. Select Next

Create IAM Role

  1. In Name, review and create step
  • Role name, enter ```GrafanaAccessRole````
  • Description, enter Role for Grafana Access

Create IAM Role

  1. Select Create role

Create IAM Role

  1. Complete role creation for EC2 instance

Create IAM Role