Connecting to AWS

Step-by-step guide to connect an AWS account to a Bluebricks collection using a CloudFormation stack and Role ARN

Prerequisites

Step 1: Create Role ARN using CloudFormation Stack

  1. Navigate to AWS Console

  2. Click the "Search" field, type "cloudformation" and click it

  3. Click "Create stack" and choose "With new resources (standard)"

  4. Mark "Choose an existing template", mark "Upload a template file" and click Choose file

  5. Open the file you downloaded in step 1 and click Next

  6. Give your stack a name and click Next

  7. Acknowledge the required capabilities at the bottom of the page and click Next

  8. Review and click Submit

circle-info

AWS supports two Role ARNs: at least one is required:

  • Discovery Role ARN: grants read-only access for cloud discovery and resource inventory.

  • Orchestration Role ARN: grants read/write access for deploying and managing infrastructure through blueprints.

You can provide both to enable full visibility and deployment capabilities. See Connect your Cloud for details on permission types.

Step 2: Connect AWS in Bluebricks

Using the app

  1. Click "Connect Cloud" on the collection you want to link to AWS

  2. Select AWS as the Cloud Provider

  3. Choose an existing Account Number or click "New Account"

  4. If creating a New Account, enter the Role ARN ID and CloudFormation Stack ID

  5. Click "Connect & Create" to complete the setup

Connect via CLI

You can connect an AWS cloud account to a collection using the Bricks CLI:

The command walks you through the AWS connection flow interactively. After setup completes, verify the connection:

A connected collection shows the cloud provider and account name:

An unconnected collection shows - for both fields:

circle-info

CLI cloud setup currently supports AWS only. To connect GCP, Azure, or a self-hosted runner, use the Bluebricks app with the provider-specific instructions above.

Using the API

Use the Cloud Accounts APIarrow-up-right to create a cloud account. Pass the Stack ID as cloudFormationStackId and the RoleArn Value as roleArnId.

Next steps

Last updated

Was this helpful?