Skip to content

Latest commit

 

History

History
41 lines (24 loc) · 1.58 KB

postgres_aws.md

File metadata and controls

41 lines (24 loc) · 1.58 KB

Postgres on AWS

Amazon can host your postgres database in their RDS service. We recommend using AWS RDS or GCP Cloud SQL to productionalize your Security Monkey deployment.

You must create a Postgres RDS instance in the same region you intend to launch your Security Monkey instance.

Create RDS Security Group

The first step is to create a security group for this RDS instance. Navigate to the AWS EC2 console's security group section. Please ensure that you are within the same region that Security Monkey is deployed in.

Click Create Security Group:

Create new security group

Create a new security group named securitymonkey-rds, and add an ingress rule on TCP 5432 to permit the securitymonkey (or whatever you named the security group that Security Monkey is launched with) security group access.

Sg details

Launch Postgres RDS Instance

Create RDS Instance

The AWS supplied defaults should get you going. Make sure that you launch the RDS instance with the securitymonkey-rds security group that we created above.

You will need to use the hostname, dbname, username, password to create a SQLALCHEMY_DATABASE_URI for your config.

SQLALCHEMY_DATABASE_URI = 'postgresql://securitymonkeyuser:securitymonkeypassword@hostname:5432/secmonkey'

Advanced users may wish to supply a KMS key for encryption at rest.

Next: