Skip to main content

Cloud Accounts

Cloud accounts are connections between Upmetr and your cloud providers. Once connected, Upmetr discovers resources, tracks costs, and collects cloud-native metrics automatically.

Supported Providers

AWS

EC2, RDS, Route53, CloudFront, ALB, ACM, CloudWatch metrics, Cost Explorer

Google Cloud

Compute Engine, Cloud SQL, Cloud Monitoring metrics, billing

Azure

Virtual Machines, SQL Database, Azure Monitor metrics, cost management

DigitalOcean

Droplets, managed databases, monitoring, billing

Adding an Account

  1. Navigate to Settings > Cloud Accounts
  2. Click Add Account
  3. Select your cloud provider
  4. Enter credentials (see provider-specific sections below)
  5. Click Test Connection to verify
  6. Click Save
After adding, click Discover to scan for resources. Resources are re-discovered every 15 minutes.

AWS Setup

AWS supports two authentication methods:

GCP Setup

  1. Create a Service Account in your GCP project with the following roles:
    • roles/compute.viewer — Compute Engine resources
    • roles/cloudsql.viewer — Cloud SQL instances
    • roles/monitoring.viewer — Cloud Monitoring metrics
    • roles/billing.viewer — Billing data (optional, for cost tracking)
  2. Generate a JSON key file for the service account
  3. In Upmetr, paste the contents of the JSON key file in the Service Account JSON field

Azure Setup

  1. Register an App Registration in Azure Active Directory
  2. Grant it the Reader role on your subscription
  3. In Upmetr, enter:
    • Tenant ID — Your Azure AD tenant
    • Application (Client) ID — From the app registration
    • Client Secret — Generated in app registration > Certificates & secrets
    • Subscription ID — The subscription to monitor

DigitalOcean Setup

  1. Generate a Personal Access Token at cloud.digitalocean.com/account/api/tokens
  2. Grant Read scope
  3. In Upmetr, paste the token

Resource Discovery

After connecting an account, Upmetr discovers:
ProviderResource Types
AWSEC2, RDS, Route53, CloudFront, ALB, ACM certificates
GCPCompute Engine VMs, Cloud SQL instances
AzureVirtual Machines, SQL Databases
DigitalOceanDroplets, Managed Databases
Resources are refreshed every 15 minutes. You can trigger a manual discovery from the account detail page.

Security Best Practices

Always use the least privilege principle. Only grant the permissions Upmetr needs.
  • Prefer IAM Roles over Access Keys when possible (AWS)
  • Use unique External IDs per account for AssumeRole
  • Rotate credentials periodically for Access Key or token-based auth
  • Enable CloudTrail (AWS) to audit API calls from Upmetr

Troubleshooting

IssueSolution
”Access Denied”Verify the policy is attached and permissions are correct
”Invalid Role ARN”Check format: arn:aws:iam::ACCOUNT_ID:role/ROLE_NAME
”Connection Test Failed”Verify credentials and network connectivity
”Expired Token”Regenerate the token or access key