Skip to content

Commit

Permalink
Add AWS architecture diagram and note for cross account (#252)
Browse files Browse the repository at this point in the history
* Add AWS archtecture diagram and note for cross account

* Update install/amazon_rds/00_overview.mdx

Co-authored-by: Maciek Sakrejda <[email protected]>

---------

Co-authored-by: Maciek Sakrejda <[email protected]>
  • Loading branch information
keiko713 and msakrejda authored Apr 30, 2024
1 parent 306013e commit 0d7b581
Show file tree
Hide file tree
Showing 2 changed files with 217 additions and 0 deletions.
200 changes: 200 additions & 0 deletions images/collector_aws_architecture.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
17 changes: 17 additions & 0 deletions install/amazon_rds/00_overview.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,9 @@ backlink_href: /docs/install
backlink_title: 'Installation Guide'
---

import imgCollectorAwsArchitecture from '../../images/collector_aws_architecture.svg'
export const ImgCollectorAwsArchitecture = () => <img src={imgCollectorAwsArchitecture} />

To monitor your Amazon RDS for PostgreSQL or Amazon Aurora PostgreSQL servers
with pganalyze, you need to run the pganalyze collector. The pganalyze collector
connects to your database to capture query metadata and various statistics, then
Expand All @@ -31,6 +34,20 @@ ECS, or with Docker.
* The collector instance needs to be able to connect to the server directly,
bypass any connection poolers like PgBouncer

Here is an overview diagram for how the pganalyze collector will be placed
within your existing setup.

<ImgCollectorAwsArchitecture />

The collector can be installed in a different AWS account from the one hosting the
RDS/Aurora instance, provided that the collector can establish a connection to
the RDS/Aurora instance (e.g., using VPC Peering).
Additionally, the collector must be set up to assume an IAM role from the RDS
side, which should have the appropriate policies for accessing RDS logs and
system metrics. This role must include a trusted policy that permits the
collector's account to assume it.


Continue by configuring RDS instance:

<Link className="btn btn-success" to="01_configure_rds_instance">
Expand Down

0 comments on commit 0d7b581

Please sign in to comment.