Skip to content

AWS

The AWS integration allows agents to interact with your Amazon Web Services infrastructure. With 30 actions spanning compute, serverless, monitoring, storage, and identity management, your agents can answer questions about your infrastructure, check resource status, and perform routine management tasks.

  • An active AWS account with the resources you want agents to access.
  • Permission to create IAM roles and run a setup stack in your AWS account (typically requires admin access).
  • Admin or Owner role in your Sprigr Teams organisation.

The AWS integration uses a cross-account IAM role for secure, credential-free access. Instead of sharing API keys, you create a role in your AWS account that Sprigr Teams can assume. This approach follows AWS security best practices:

  • No long-lived credentials are stored or shared
  • You control exactly what permissions the role has
  • You can revoke access at any time by deleting the role
  • All actions are logged in your AWS account’s audit trail

The setup process uses a guided wizard with an automated setup template that creates the IAM role with the correct permissions and trust policy.

  1. Open the Integration Hub

    Sign in to team.sprigr.com and click Integrations in the sidebar.

  2. Find AWS

    Locate the AWS card and click Connect. This opens the AWS setup wizard.

  3. Generate an External ID

    The wizard generates a unique External ID for your organisation. This ID is used as an additional security measure to prevent confused deputy attacks. Copy this ID — you will need it in the next step.

  4. Launch the setup template

    Click the Launch Stack button. This opens the AWS Console in a new tab with a pre-configured setup template. The template creates:

    • An IAM role with a trust policy that allows Sprigr Teams to assume it
    • A managed policy with read-only permissions for the services your agents will access

    Acknowledge that the template will create IAM resources and click Create Stack. Wait for the stack creation to complete (usually under 2 minutes).

  5. Enter the Role ARN

    Once the stack finishes creating, go to the Outputs tab and copy the Role ARN value. Return to the Sprigr Teams setup wizard and paste the Role ARN.

  6. Test the connection

    Click Test Connection. Sprigr Teams will attempt to assume the role and make a basic API call. If the test succeeds, you will see a green success message. Click Save to finish the setup.

ToolActionDescription
awslist_instancesList EC2 instances with optional filters (state, tags, type)
awsget_instanceGet detailed information about a specific instance
awsstart_instanceStart a stopped instance
awsstop_instanceStop a running instance
ToolActionDescription
awslist_functionsList Lambda functions
awsget_functionGet details about a specific function
awsinvoke_functionInvoke a Lambda function with a payload
awslist_function_logsView recent invocation logs
ToolActionDescription
awsget_metricsQuery CloudWatch metrics for any service
awslist_alarmsList CloudWatch alarms and their states
awsget_alarm_historyView alarm state change history
awsget_billingGet current month billing summary
awsget_cost_breakdownGet cost breakdown by service
ToolActionDescription
awslist_bucketsList S3 buckets
awslist_objectsList objects in a bucket with prefix filtering
awsget_objectRead an object from S3
awsput_objectUpload an object to S3
ToolActionDescription
awslist_parametersList SSM parameters
awsget_parameterRead a parameter value
awsput_parameterCreate or update a parameter
ToolActionDescription
awslist_usersList IAM users
awslist_rolesList IAM roles
awsget_userGet details about a specific IAM user
ToolActionDescription
awsget_caller_identityVerify which AWS account and role is being used
awsget_cost_forecastGet cost forecast for the current or next month
  • Infrastructure status checks — “Are all our production instances running?” — An agent queries EC2 and returns a quick summary of instance states.
  • Billing monitoring — “How much have we spent on AWS this month?” — The agent pulls the current billing data and breaks it down by service.
  • Alarm triage — “What CloudWatch alarms are firing right now?” — The agent lists all alarms in ALARM state and provides details about what triggered them.
  • Log investigation — “Show me the recent errors for our payment-processor Lambda function” — The agent retrieves recent invocation logs and highlights errors.
  • Daily infrastructure reports — A scheduled workflow queries key metrics, alarm states, and billing data, then sends a morning summary to the team.

“Access denied” or “AssumeRole failed” Verify that the Role ARN is correct and the trust policy includes the right External ID. Check the stack outputs in your AWS Console.

Missing resources in results The IAM role may not have permissions for the service or region you are querying. Check the policy attached to the role and ensure it covers the needed services.

Slow responses Queries across all regions can take longer. If possible, have the agent specify a region in the query to speed up results.

Stack creation failed Check the Events tab in the AWS Console for the specific error. Common issues include insufficient IAM permissions for the user creating the stack or a naming conflict with existing resources.

  • GCP — Connect Google Cloud Platform alongside or instead of AWS.
  • Integrations Overview — See all available integrations.
  • Workflows — Automate infrastructure checks and reporting with workflows.