Skip to main content
Connecting your AWS account to NOFire AI enables automatic discovery and monitoring of your AWS infrastructure across multiple regions. NOFire AI discovers:
  • RDS Instances - MySQL, PostgreSQL, MariaDB, Oracle, SQL Server databases
  • Aurora Clusters - Including cluster members and read replicas
  • ElastiCache Clusters - Redis and Memcached deployments
  • Lambda Functions - Serverless functions with complete configuration
  • Multi-Region Support - Discover resources across all your specified AWS regions
This metadata enhances NOFire AI’s understanding of your infrastructure landscape, enabling deeper context for investigations and root cause analysis. To ensure a smooth integration, we follow AWS’s best practices by utilizing an assumed role and external ID for secure access.

Step 1: Create IAM Role

Navigate to AWS IAM console

For automation or scripting, you can create the IAM role using the AWS CLI:
# Set your variables
NOFIREAI_ACCOUNT_ID="593113792344"
EXTERNAL_ID="your-unique-external-id"
ROLE_NAME="nofireai-readonly-role"

# Create trust policy
cat > trust-policy.json <<EOF
{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Principal": {"AWS": "arn:aws:iam::${NOFIREAI_ACCOUNT_ID}:root"},
    "Action": "sts:AssumeRole",
    "Condition": {"StringEquals": {"sts:ExternalId": "${EXTERNAL_ID}"}}
  }]
}
EOF

# Create role and attach policies
aws iam create-role \
  --role-name ${ROLE_NAME} \
  --assume-role-policy-document file://trust-policy.json \
  --description "NOFire AI readonly access for infrastructure discovery"

# Attach managed policies
aws iam attach-role-policy \
  --role-name ${ROLE_NAME} \
  --policy-arn arn:aws:iam::aws:policy/ReadOnlyAccess

aws iam attach-role-policy \
  --role-name ${ROLE_NAME} \
  --policy-arn arn:aws:iam::aws:policy/CloudWatchLogsReadOnlyAccess

aws iam attach-role-policy \
  --role-name ${ROLE_NAME} \
  --policy-arn arn:aws:iam::aws:policy/AmazonRDSPerformanceInsightsReadOnly

# Get Role ARN
aws iam get-role --role-name ${ROLE_NAME} --query 'Role.Arn' --output text

Step 2: Add AWS Connection to NOFire AI

Navigate to the Connections Tab