Configure AWS authentication for New Relic workflow automation. Choose between IAM roles, IAM users, or session tokens to securely connect workflows with AWS services like EC2, SQS, and DynamoDB.
Prerequisites
Before setting up AWS credentials, ensure you have:
- An AWS account with permission to create IAM roles or users.
- Your New Relic account ID.
- Admin access to the AWS IAM Console.
Required permissions
Before creating credentials, understand what permissions your workflows need. Grant only the permissions your workflows actually use—this follows the principle of least privilege and minimizes security risk.
Common workflow permissions
Workflow type | Required AWS permissions | Description |
|---|---|---|
EC2 management |
| Stop, start, or modify EC2 instances in response to alerts |
SQS messaging |
| Send messages to SQS queues for downstream processing |
DynamoDB |
| Read from or write to DynamoDB tables |
ヒント
Start with read-only permissions (Describe*, Get*, List*), then add write permissions (Put*, Create*, Delete*) only as needed. This prevents accidental destructive actions during testing.
See AWS policy examples for complete IAM policy templates for these workflow types.
Choose your authentication method
Method | Use cases | Characteristics |
|---|---|---|
IAM role | Production workflows, all AWS services |
|
|
| |
|
|
Using credentials in workflows
After setting up authentication, reference your credentials in workflow configurations:
IAM role (recommended)
Paste the role ARN directly into workflow inputs—no secrets manager needed:
awsRoleArn: arn:aws:iam::123456789012:role/NewRelicWorkflowAutomationRole重要
Role ARNs are resource identifiers, not sensitive credentials. Don't store them in secrets manager—paste them directly into workflow configurations.
IAM user or session tokens
Reference secrets manager for access keys:
awsAccessKeyId: ${{ :secrets:awsAccessKeyId }}awsSecretAccessKey: ${{ :secrets:awsSecretAccessKey }}awsSessionToken: ${{ :secrets:awsSessionToken }} # Only for session tokensNew Relic retrieves secrets at runtime, authenticates with AWS, then discards them. Your credentials never appear in logs or workflow history.
Related topics
IAM role setup
Configure IAM role for production workflows (recommended)
IAM user setup
Set up IAM user with access keys for testing
Session tokens setup
Generate temporary session tokens for local development
AWS policy examples
Complete IAM policies for EC2, SQS, DynamoDB, and more
AWS actions
Browse EC2, Lambda, S3, SQS, and other AWS actions
EC2 management example
See AWS credentials in action with EC2 workflows