AWS Setup
The AWS integration lets you manage EC2 instances directly from Reoclo. Once connected, you can reboot, shut down, and power on instances, view CloudWatch metrics and monthly costs, inspect security groups and volumes, and execute commands remotely via SSM Run Command.
Prerequisites
Section titled “Prerequisites”- An AWS account with at least one EC2 instance
- Permission to create IAM users and policies in your AWS account
- A Reoclo account with server management access
Step 1: Create an IAM User
Section titled “Step 1: Create an IAM User”- Log into the AWS Console
- Navigate to IAM > Users > Create user
- Enter a username (for example,
reoclo-service) - Select Programmatic access only (no console access needed)
- Click Next to proceed to permissions
Step 2: Attach the Minimum-Privilege Policy
Section titled “Step 2: Attach the Minimum-Privilege Policy”Instead of attaching a broad managed policy, create a scoped inline policy that grants only the permissions Reoclo needs.
- On the permissions page, click Attach policies directly
- Click Create policy > JSON tab
- Paste the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "ReocloEC2Read", "Effect": "Allow", "Action": [ "ec2:DescribeInstances", "ec2:DescribeInstanceStatus", "ec2:DescribeInstanceTypes", "ec2:DescribeRegions", "ec2:DescribeVolumes" ], "Resource": "*" }, { "Sid": "ReocloEC2Control", "Effect": "Allow", "Action": [ "ec2:StartInstances", "ec2:StopInstances", "ec2:RebootInstances" ], "Resource": "arn:aws:ec2:*:*:instance/*" }, { "Sid": "ReocloCloudWatch", "Effect": "Allow", "Action": ["cloudwatch:GetMetricStatistics"], "Resource": "*" }, { "Sid": "ReocloCostExplorer", "Effect": "Allow", "Action": ["ce:GetCostAndUsage"], "Resource": "*" }, { "Sid": "ReocloSSMRead", "Effect": "Allow", "Action": [ "ssm:DescribeInstanceInformation", "ssm:GetCommandInvocation", "ssm:ListCommandInvocations" ], "Resource": "*" }, { "Sid": "ReocloSSMSendCommand", "Effect": "Allow", "Action": ["ssm:SendCommand"], "Resource": [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ssm:*:*:document/AWS-RunShellScript" ] }, { "Sid": "ReocloSTS", "Effect": "Allow", "Action": ["sts:GetCallerIdentity"], "Resource": "*" } ]}- Name the policy (for example,
ReocloMinimalAccess) and save it - Attach the policy to the
reoclo-serviceuser
Step 3: Create Access Keys
Section titled “Step 3: Create Access Keys”- Go to the newly created IAM user
- Navigate to Security credentials > Access keys
- Click Create access key
- Select Third-party service as the use case
- Copy both the Access Key ID (starts with
AKIA) and the Secret Access Key
Step 4: Add the Credential in Reoclo
Section titled “Step 4: Add the Credential in Reoclo”- In Reoclo, navigate to Cloud Providers in the sidebar
- Click Add Provider
- Select Amazon Web Services from the dropdown
- Enter a label (for example,
my-aws-prod) - Paste your Access Key ID and Secret Access Key
- Click Test & Save to verify the credential
Reoclo will call sts:GetCallerIdentity to confirm the keys are valid. If successful, you will see your AWS account ID and IAM user displayed.
Step 5: Add a Server
Section titled “Step 5: Add a Server”- Navigate to Servers and click Add Server
- Select your AWS credential as the cloud provider
- Enter the EC2 Instance ID (for example,
i-0123456789abcdef0) - Select the Region where the instance runs (for example,
us-east-1) - Save
Reoclo will begin syncing instance metadata, including status, IP addresses, specs, security groups, tags, and attached volumes.
Features
Section titled “Features”Power Operations
Section titled “Power Operations”From the server detail page, you can:
- Power On a stopped instance
- Shutdown (graceful stop)
- Reboot the instance
- Hard Reset (force stop, then start)
Operations are tracked in real time with progress indicators.
Metrics and Cost
Section titled “Metrics and Cost”Reoclo pulls CPU, network, and disk I/O metrics from CloudWatch automatically. Monthly cost is fetched from AWS Cost Explorer and displayed on the server detail page.
SSM Run Command
Section titled “SSM Run Command”If your EC2 instances have the SSM Agent installed, you can execute commands directly from Reoclo without SSH access.
Requirements for SSM:
- The instance must have an IAM instance profile with the
AmazonSSMManagedInstanceCoremanaged policy attached - The SSM Agent must be installed and running (pre-installed on Amazon Linux 2, Amazon Linux 2023, Ubuntu 16.04+, and Windows Server 2016+)
- The instance must have a network path to SSM endpoints (direct internet access, or VPC endpoints for
ssm,ssmmessages, andec2messages)
When SSM is available, the server detail page shows a green SSM ready badge and a Run Command panel where you can execute shell commands and view output.
If SSM is not available, a grey SSM unavailable badge appears with troubleshooting guidance.
Troubleshooting
Section titled “Troubleshooting”Credential verification fails
Section titled “Credential verification fails”- Confirm the Access Key ID starts with
AKIA - Confirm the Secret Access Key was copied completely (no trailing spaces)
- Check that the IAM user has not been deactivated or deleted
Power operations fail with “IncorrectInstanceState”
Section titled “Power operations fail with “IncorrectInstanceState””This means the instance is in a state that does not allow the requested operation. For example, you cannot start an instance that is already running. Wait for the current transition to complete and try again.
SSM badge shows “unavailable”
Section titled “SSM badge shows “unavailable””Check the three requirements listed above:
- Instance profile with
AmazonSSMManagedInstanceCore - SSM Agent installed and running
- Network path to SSM endpoints
You can verify SSM Agent status in the AWS Console under Systems Manager > Fleet Manager.
Metrics show “Requires CloudWatch Agent”
Section titled “Metrics show “Requires CloudWatch Agent””Basic EC2 monitoring includes CPU and network metrics. Disk utilization requires the CloudWatch Agent to be installed on the instance.
Next Steps
Section titled “Next Steps”- Cloud Credentials for managing credentials across all providers
- Servers Overview to understand server management
- Scheduled Operations to automate power operations on a schedule
- API Overview for programmatic access to cloud operations