Skip to main content
Druva Documentation

Register an AWS account

Phoenix Editions: File:/tick.png Elite File:/cross.png EnterpriseFile:/tick.png Business 

To register an AWS account and protect workloads running in it, Phoenix requires an Identity Access Management (IAM) role. The IAM role lets Phoenix access your AWS account and create backups of workloads running in it. To create an IAM role for Phoenix, Druva provides a CloudFormation template that is used to create a CloudFormation stack. The CloudFormation stack creates the IAM role that Phoenix requires. The Amazon Resource Name (ARN) of the IAM role is attached to Phoenix so that it can run backup and restore jobs in your AWS account.

The following steps describe how to register an AWS account using the CloudFormation template:

  1. Log in to the Phoenix Management Console.
  2. From the top menu, select an Organization under which you want to register your AWS account.
  3. After you select an Organization, click Protect > AWS Resources on the top menu.
  4. On the AWS Resources page, click Add AWS Account.
  5. On the Add AWS Account page, click the Copy Cloudformation template to grant Phoenix access to AWS button on the Create AWS Access Role field to copy the S3 URL that points to the location of the CloudFormation template.
    CFT-URL.png
    Note: You cannot use this URL to register an AWS account in another Organization. This URL is tied to the Organization under which it was generated.
  6. After you copy the S3 URL, sign in to the AWS Management Console.
  7. Use the Find Services field on the AWS Management Console to search and select CloudFormation.
    find cloudranger in the find services field
  8. On the CloudFormation Stacks page, click Create new stack.
  9. In the Specify Template section of the Create stack wizard, select Amazon S3 URL under Template source, paste the CloudFormation template URL that you copied in step 5 and then click Next.
    create-stack.png
  10. In the Specify stack details section, provide a name for the stack and click Next. Use a name that can identify the purpose of the stack. For example, Phoenix-access. 
    Provide a CloudFormation Stack Name
  11. In the Configure stack options section, scroll down to the bottom and click Next.
  12. In the Review section, scroll down to the bottom, enable I acknowledge that AWS CloudFormation might create IAM resources with custom names, and then click Create stack.
    stack_acknowledge_role_creation
  13. After you click Create, Amazon creates a stack with the name you provide in step 10. The status of the stack shows CREATE_IN_PROGRESS for a while. 
    stack-creation-in-progress.png
    Refresh the page until it shows CREATE_COMPLETE.
    stack-create-complete.png
  14. Copy the ARN (Amazon Resource Name) from the Outputs tab after the status changes to CREATE_COMPLETE. 
    copy-IAM-role-ARN.png
  15. Navigate back to the Phoenix Management Console, paste this ARN in Phoenix Role ARN field of the Add AWS Account page, and then click Save.
    Enter role ARN

After the account is registered, Phoenix detects the workloads running in your AWS account and the accounts page appears with the registered AWS account listed on it. You can select the account and click Edit to change the name of the account. Click the AWS account name to open the Resources page that lists resources that Phoenix can backup. If you want to register another account, perform the steps above for that account.