Documentation Index
Fetch the complete documentation index at: https://docs.monk.io/llms.txt
Use this file to discover all available pages before exploring further.
What is this integration?
Amazon RDS makes it easy to set up, operate, and scale relational databases in the cloud.What Monk manages
- DB instance, subnet group, security group
What the Agent can do and how to use it
- Database Creation: Provision MySQL, PostgreSQL, MariaDB, Oracle, and SQL Server instances
- Backup & Recovery: Configure automated backups, point-in-time recovery, and manual snapshots
- Scaling: Modify instance types, storage, and enable read replicas for scaling
- High Availability: Set up Multi-AZ deployments for automatic failover
- Security: Configure VPC isolation, security groups, and encryption at rest
- Maintenance: Schedule and manage automated maintenance windows
- Monitoring: Enable Enhanced Monitoring and Performance Insights
- Parameter Groups: Customize database engine parameters and configurations
- Ensure AWS provider is added: monk cluster provider add -p aws
- monk update <namespace>/<name>
Obtaining AWS Credentials
AWS RDS uses your AWS account credentials. You’ll need AWS access keys with appropriate permissions.What You’ll Need
- AWS Access Key ID
- AWS Secret Access Key
- Optional: Default region (e.g.,
us-east-1)
Step-by-Step
- Log into AWS Console at https://console.aws.amazon.com
- Navigate to IAM → Users
- Select your IAM user or Create user for Monk
- Go to Security credentials tab
- Click Create access key
- Choose use case: “Third-party service”
- Click Next → Create access key
- Copy Access Key ID and Secret Access Key
- Save them securely - secret key shown only once
Required IAM Permissions
Attach these AWS managed policies to the user:AmazonRDSFullAccess- For RDS managementAmazonEC2FullAccess- For VPC and security groupsIAMReadOnlyAccess- For verification
Providing to Monk
When deploying with AWS RDS, ask Monk:Security Best Practices
✅ Use IAM user for Monk - Not your personal admin account ✅ Enable MFA on the account managing the IAM user ✅ Rotate keys every 90 days ✅ Monitor with CloudTrail - Track API usage ✅ Use minimal permissions - Only grant what Monk needsAuth
- Uses AWS provider credentials (Access Key ID and Secret Access Key)
Getting Started
- Provide AWS credentials to Monk when deploying:
CLI Reference (Advanced)
For manual provider configuration:- Define an RDS instance (save as rds.yaml):
- Create/update:
Backup & Snapshot Actions
| Action | Description |
|---|---|
get-backup-info | View backup retention, window, and automated backup status |
create-snapshot | Create an on-demand manual snapshot |
list-snapshots | List available snapshots (manual and automated) |
describe-snapshot | Get detailed information about a specific snapshot |
delete-snapshot | Delete a manual snapshot |
restore | Restore to a new RDS instance from a snapshot |
get-restore-status | Check status of a restored instance |

