Overview
The AWS CloudWatch integration enables Steadwing to access your CloudWatch logs, metrics, and alarms during incident analysis. This helps our AI identify root causes faster by analyzing your AWS observability data - from application logs and infrastructure metrics to alarm states and performance data.Why Use AWS with Steadwing?
Log Analysis
Search CloudWatch Logs for errors, patterns, and stack traces
Metrics Analysis
Analyze performance and health metrics from CloudWatch
Alarm Monitoring
Track active and historical alarm states during incidents
Complete Picture
Combine AWS data with code analysis for faster RCA
Prerequisites
- An AWS account with CloudWatch data
- IAM credentials with read access to CloudWatch
Setup Instructions
Step 1: Create an IAM User
- Go to AWS Console → IAM → Users
- Click Create user
- Enter a username (e.g.,
steadwing-readonly) - Click Next
Step 2: Attach Permissions
Attach the following AWS managed policies to the user:| Policy Name | Purpose |
|---|---|
| CloudWatchReadOnlyAccess | Read CloudWatch metrics and alarms |
| CloudWatchLogsReadOnlyAccess | Read CloudWatch Logs and run Logs Insights queries |
Step 3: Create Access Keys
- Open the IAM user you created
- Go to Security credentials tab
- Click Create access key
- Select Third-party service as the use case
- Click Create access key
- Save both values:
- Access Key ID
- Secret Access Key
Step 4: Connect AWS in Steadwing
- Navigate to Steadwing Settings
- Find the AWS integration card
- Click to expand the collapsible form
- Fill in the required fields:
| Field | Value |
|---|---|
| Access Key ID | Your AWS access key (starts with AKIA...) |
| Secret Access Key | Your AWS secret key |
| Region | The AWS region to monitor (e.g., us-east-1) |
- Toggle the switch to Enable the integration
Step 5: Verify Connection
- Return to Steadwing Settings
- Confirm the AWS integration shows as Connected
- You’re all set! Steadwing will now use your CloudWatch data during incident analysis
How It Works
When analyzing an incident, Steadwing automatically:- Connects to your AWS CloudWatch using the provided credentials
- Queries CloudWatch Logs - application logs, error messages, stack traces
- Queries CloudWatch Metrics - performance and health data
- Checks CloudWatch Alarms - active and historical alarm states
- Correlates log errors with metric anomalies to find patterns
- Combines findings with code analysis to identify the root cause
- Provides evidence-based diagnosis with relevant logs and metrics
What Data Can Steadwing Access?
Once connected, Steadwing can read:- CloudWatch Logs - Application and infrastructure logs
- CloudWatch Metrics - Performance and health metrics
- CloudWatch Alarms - Active and historical alarm states
Supported AWS Services
Any service that sends data to CloudWatch is supported, including:- Lambda
- ECS / EKS
- EC2
- RDS
- API Gateway
- Step Functions
- And more
Troubleshooting
| Issue | Solution |
|---|---|
| Connection failed | Verify your access key and secret are correct |
| No logs found | Ensure the region matches where your logs are stored |
| Permission denied | Check that the IAM user has the required policies attached |
Security
- Credentials are encrypted at rest
- We recommend using a dedicated IAM user with minimal permissions
- You can revoke access anytime by deleting the access key in AWS IAM
Uninstall
To disconnect the integration:- In Steadwing Settings, disable the AWS integration
- In AWS IAM, delete the access key:
- Navigate to IAM → Users → your Steadwing user
- Go to Security credentials tab
- Find the access key and click Delete
FAQs
Can Steadwing modify my AWS resources?
Can Steadwing modify my AWS resources?
No. Steadwing has read-only access and can only query CloudWatch data. It cannot modify any AWS resources, configurations, or data.
Which AWS region should I use?
Which AWS region should I use?
Use the region where your primary CloudWatch logs and metrics are stored. You can update this later if needed.
Can I revoke access later?
Can I revoke access later?
Yes. Simply delete the access key in AWS IAM anytime to immediately revoke access.
Does this work with multiple regions?
Does this work with multiple regions?
Currently, Steadwing connects to one region at a time. Use the region with your most critical services.
How much data does it query?
How much data does it query?
Only relevant data around the incident timeframe (typically a few hours). Queries are optimized to focus on error patterns and anomalies.
What if I use AWS Organizations?
What if I use AWS Organizations?
Create the IAM user in the account where your CloudWatch data resides. For multi-account setups, you may need to configure cross-account access.