CSP Health Monitor - IAM Requirements
CSP Health Monitor - IAM Requirements
Overview
The CSP Health Monitor requires IAM permissions to monitor cloud provider maintenance events. This document provides the setup commands for GCP and AWS.
Google Cloud Platform (GCP)
Required IAM Permission
logging.logEntries.list- Read Cloud Logging entries for maintenance events
Setup Commands
Replace placeholders:
<GCP_SA_NAME>- GCP Service Account name (e.g.,csp-health-monitor)<TARGET_PROJECT_ID>- GCP project ID where the cluster runs<GKE_PROJECT_ID>- GCP project ID where GKE cluster is deployed<NAMESPACE>- Kubernetes namespace (default:nvsentinel)
Helm Configuration
Amazon Web Services (AWS)
Required IAM Permissions
health:DescribeEvents- Query AWS Health API for maintenance eventshealth:DescribeAffectedEntities- Get affected EC2 instance IDshealth:DescribeEventDetails- Get event details and recommended actions
Setup Commands
Replace placeholders:
<CLUSTER_NAME>- EKS cluster name<NAMESPACE>- Kubernetes namespace (default:nvsentinel)
Helm Configuration
Important (EKS): By default, the IAM role name is constructed as
<CLUSTER_NAME>-nvsentinel-health-monitor-assume-role-policy. AWS IAM role names have a 64-character limit, and the default suffix is 45 characters, leaving only 19 characters for the cluster name. If your cluster name exceeds 19 characters, setaws.iamRoleNameto a custom role name and create the IAM role with that name instead:Then in Helm values:
Additional Resources
- Configuration Guide: See docs/configuration/csp-health-monitor.md for detailed Helm configuration options
- Troubleshooting: See docs/runbooks/csp-health-monitor-iam.md for common issues and solutions