Overview
AWS integration enables IncidentFox to access your AWS infrastructure for:- CloudWatch Logs and Metrics
- EC2 instance status and details
- RDS database monitoring
- Lambda function analysis
- ECS/Fargate task status
- CodePipeline deployment tracking
Prerequisites
- AWS account with IAM access
- IAM role or user with appropriate permissions
- Knowledge of your AWS region(s)
Configuration
Step 1: Create IAM Role (Recommended)
Create an IAM role for IncidentFox to assume:Step 2: Configure Trust Policy
If using cross-account access:Step 3: Add to IncidentFox
Via Web UI:- Go to Team Console > Integrations
- Click Add Integration > AWS
- Enter:
- Region (primary)
- Authentication method (Role ARN or Access Keys)
- Role ARN (if using assume role)
- Click Test Connection
- Save
Available Tools
CloudWatch Logs
get_cloudwatch_logs
Fetch logs from CloudWatch Log Groups.
log_group- Log group namefilter_pattern- CloudWatch filter patterntime_range- Time range to search
query_cloudwatch_insights
Run CloudWatch Logs Insights queries.
log_groups- Log groups to queryquery- Insights query stringtime_range- Time range
CloudWatch Metrics
get_cloudwatch_metrics
Query CloudWatch metrics.
namespace- Metric namespace (e.g., AWS/EC2)metric_name- Metric namedimensions- Dimension filtersstatistic- Average, Sum, Maximum, etc.period- Data point period in seconds
EC2
describe_ec2_instance
Get EC2 instance details and status.
instance_id- EC2 instance ID
- Instance state
- Instance type
- Launch time
- Security groups
- Network interfaces
- Tags
RDS
get_rds_instance_status
Check RDS database status and metrics.
db_identifier- RDS instance identifier
- Instance status
- Endpoint
- Storage allocation
- Recent events
- Performance metrics
Lambda
describe_lambda_function
Get Lambda function configuration.
function_name- Lambda function name
- Runtime
- Memory configuration
- Timeout
- Environment variables
- Last modified
- Recent invocations
ECS
list_ecs_tasks
List ECS tasks in a cluster/service.
cluster- ECS cluster nameservice- Service name (optional)status- RUNNING, STOPPED, etc.
CodePipeline
describe_codepipeline
Get CodePipeline execution status.
pipeline_name- Pipeline name
- Pipeline state
- Stage statuses
- Recent executions
- Failed actions (if any)
Use Cases
Investigating Lambda Errors
RDS Performance Issues
Deployment Tracking
Multi-Account Setup
For organizations with multiple AWS accounts:Troubleshooting
Access Denied
Symptom: “User is not authorized to perform this action” Solutions:- Verify IAM policy attached to role
- Check trust relationship allows assume role
- Ensure resource ARNs match your resources
No Data Returned
Symptom: Queries return empty results Solutions:- Verify region is correct
- Check time range - CloudWatch has retention limits
- Confirm log group/metric names are exact
Throttling
Symptom: “Rate exceeded” errors Solutions:- Reduce query frequency
- Use broader time periods
- Request AWS quota increase
Best Practices
- Use resource tagging - Tag resources to enable filtered queries
- Set up log retention - Ensure logs are retained long enough for investigations
- Use cross-account roles - Avoid using access keys
- Enable Performance Insights - For RDS debugging
- Set up CloudWatch alarms - So IncidentFox can reference them

