AWS Setup Guide
Connect your Amazon Web Services account to KorPro and start analyzing your EKS clusters.
Prerequisites
- AWS account with EKS clusters
- IAM user or role with appropriate permissions
- Access to AWS Console or CLI
Step 1: Create IAM Policy
Create an IAM policy with the necessary permissions for discovery and identity verification:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"eks:ListClusters",
"eks:DescribeCluster",
"ec2:DescribeRegions",
"sts:GetCallerIdentity"
],
"Resource": "*"
}
]
}Step 2: Create IAM User
- Go to IAM → Users in the AWS Console
- Click "Add users"
- Name it "korpro-reader"
- Attach the policy you created in Step 1
- Click "Create user"
Step 3: Generate Access Keys
- Click on the IAM user you created
- Go to the "Security credentials" tab
- Click "Create access key"
- Select "Application running outside AWS"
- Download or copy the Access Key ID and Secret Access Key
Step 4: Connect to KorPro
- In KorPro, go to Settings → Cloud Providers → AWS
- Click "Add AWS Account"
- Enter your Access Key ID and Secret Access Key
- Select the AWS regions where your EKS clusters are located
- Click "Connect"
Step 5: Grant EKS Cluster Access (per cluster)
For EKS, IAM permissions alone are not enough to query the Kubernetes API. You must grant the IAM principal access to each EKS cluster. In the AWS Console, go to EKS → Clusters → [Your Cluster] → Access tab. Create an Access entry for your principal ARN (e.g., arn:aws:iam::ACCOUNT_ID:user/korpro-reader).
Step 6: Attach an EKS Access Policy
After creating the access entry, you must attach an EKS access policy. We recommend associating AmazonEKSViewPolicy. Wait 1-2 minutes for propagation before retrying the analysis.
Troubleshooting
Clusters not appearing?
- Verify the IAM policy includes all required permissions
- Check that EKS clusters are in the selected regions
- Ensure the access keys are valid and active