What is this integration?
Amazon RDS makes it easy to set up, operate, and scale relational databases in the cloud.What Monk manages
- DB instance, subnet group, security group
What the Agent can do and how to use it
- Database Creation: Provision MySQL, PostgreSQL, MariaDB, Oracle, and SQL Server instances
- Backup & Recovery: Configure automated backups, point-in-time recovery, and manual snapshots
- Scaling: Modify instance types, storage, and enable read replicas for scaling
- High Availability: Set up Multi-AZ deployments for automatic failover
- Security: Configure VPC isolation, security groups, and encryption at rest
- Maintenance: Schedule and manage automated maintenance windows
- Monitoring: Enable Enhanced Monitoring and Performance Insights
- Parameter Groups: Customize database engine parameters and configurations
- Ensure AWS provider is added: monk cluster provider add -p aws
- monk update <namespace>/<name>
Obtaining AWS Credentials
AWS RDS uses your AWS account credentials. You’ll need AWS access keys with appropriate permissions.What You’ll Need
- AWS Access Key ID
- AWS Secret Access Key
- Optional: Default region (e.g.,
us-east-1)
Step-by-Step
- Log into AWS Console at https://console.aws.amazon.com
- Navigate to IAM → Users
- Select your IAM user or Create user for Monk
- Go to Security credentials tab
- Click Create access key
- Choose use case: “Third-party service”
- Click Next → Create access key
- Copy Access Key ID and Secret Access Key
- Save them securely - secret key shown only once
Required IAM Permissions
Attach these AWS managed policies to the user:AmazonRDSFullAccess- For RDS managementAmazonEC2FullAccess- For VPC and security groupsIAMReadOnlyAccess- For verification
Providing to Monk
When deploying with AWS RDS, ask Monk:Security Best Practices
✅ Use IAM user for Monk - Not your personal admin account ✅ Enable MFA on the account managing the IAM user ✅ Rotate keys every 90 days ✅ Monitor with CloudTrail - Track API usage ✅ Use minimal permissions - Only grant what Monk needsAuth
- Uses AWS provider credentials (Access Key ID and Secret Access Key)
Getting Started
- Provide AWS credentials to Monk when deploying:
CLI Reference (Advanced)
For manual provider configuration:- Define an RDS instance (save as rds.yaml):
- Create/update:
Backup & Snapshot Actions
| Action | Description |
|---|---|
get-backup-info | View backup retention, window, and automated backup status |
create-snapshot | Create an on-demand manual snapshot |
list-snapshots | List available snapshots (manual and automated) |
describe-snapshot | Get detailed information about a specific snapshot |
delete-snapshot | Delete a manual snapshot |
restore | Restore to a new RDS instance from a snapshot |
get-restore-status | Check status of a restored instance |

