Overview
Connect CodeWolf to your AWS infrastructure for comprehensive monitoring across EC2, Lambda, ECS, and other AWS services.Prerequisites
- AWS account with appropriate IAM permissions
- AWS CLI configured
- CodeWolf account
Setup
1
Create IAM role
Create an IAM role for CodeWolf with the necessary permissions.
2
Configure trust relationship
Set up a trust relationship allowing CodeWolf to assume the role.
Get your External ID from the CodeWolf dashboard under Integrations > AWS.
3
Connect to CodeWolf
In the CodeWolf dashboard, go to Integrations > AWS.Enter your IAM role ARN and click Connect.
Supported services
EC2
Monitor EC2 instances:- Instance health and status
- CPU and memory utilization
- Network traffic
- Disk I/O
Lambda
Track serverless functions:- Invocation count and errors
- Duration and timeout monitoring
- Cold start analysis
- Memory usage optimization
ECS/Fargate
Monitor containerized applications:- Task and service health
- Resource utilization
- Deployment tracking
- Auto-scaling events
RDS
Database monitoring:- Query performance
- Connection pooling
- Storage utilization
- Backup status
CloudWatch integration
CodeWolf automatically imports:- Custom metrics
- Log groups
- Alarms and events
- Dashboards
Configuration
Primary AWS region for monitoring
Enable monitoring across multiple regions
List of AWS services to monitor:
["ec2", "lambda", "ecs", "rds"]Metrics collection interval in seconds
CloudFormation template
Deploy CodeWolf integration using CloudFormation:Security best practices
- Use least privilege IAM policies
- Enable MFA for sensitive operations
- Regularly rotate access keys
- Monitor CloudTrail for API activity
- Use VPC endpoints for private connectivity
Troubleshooting
Role assumption failed
Role assumption failed
- Verify the External ID matches exactly
- Check that the trust relationship is configured correctly
- Ensure the IAM role has necessary permissions
- Confirm the role ARN is correct
Missing metrics
Missing metrics
- Verify CloudWatch metrics are being published
- Check IAM permissions include
cloudwatch:GetMetricData - Ensure the correct region is selected
Permission denied errors
Permission denied errors
Review the IAM policy and add missing permissions. Check CloudTrail logs for specific denied actions.

