<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Pavan Kumar</title>
    <description>The latest articles on DEV Community by Pavan Kumar (@pavandevops).</description>
    <link>https://dev.to/pavandevops</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3170190%2F2d9dce34-fdf3-472d-b28a-8524f760c614.png</url>
      <title>DEV Community: Pavan Kumar</title>
      <link>https://dev.to/pavandevops</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/pavandevops"/>
    <language>en</language>
    <item>
      <title>Resolve : Issue with SNS notification for CloudWatch alarm trigger with KMS. Monitoring is essential but secure monitoring is even better. This blog helps to integrate AWS CloudWatch Alarms with an SNS topic encrypted using AWS KMS.</title>
      <dc:creator>Pavan Kumar</dc:creator>
      <pubDate>Fri, 16 May 2025 14:10:45 +0000</pubDate>
      <link>https://dev.to/pavandevops/resolve-issue-with-sns-notification-for-cloudwatch-alarm-trigger-with-kms-monitoring-is-1eec</link>
      <guid>https://dev.to/pavandevops/resolve-issue-with-sns-notification-for-cloudwatch-alarm-trigger-with-kms-monitoring-is-1eec</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh" class="crayons-story__hidden-navigation-link"&gt;CloudWatch Alarm Integration with KMS-Encrypted SNS Topic&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/pavandevops" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3170190%2F2d9dce34-fdf3-472d-b28a-8524f760c614.png" alt="pavandevops profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/pavandevops" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Pavan Kumar
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Pavan Kumar
                
              
              &lt;div id="story-author-preview-content-2494102" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/pavandevops" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3170190%2F2d9dce34-fdf3-472d-b28a-8524f760c614.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Pavan Kumar&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;May 16 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh" id="article-link-2494102"&gt;
          CloudWatch Alarm Integration with KMS-Encrypted SNS Topic
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/aws"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;aws&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/monitoring"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;monitoring&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cloudwatch"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cloudwatch&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/sns"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;sns&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;1&lt;span class="hidden s:inline"&gt; reaction&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              1&lt;span class="hidden s:inline"&gt; comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            4 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>aws</category>
      <category>monitoring</category>
      <category>cloudwatch</category>
      <category>sns</category>
    </item>
    <item>
      <title>CloudWatch Alarm Integration with KMS-Encrypted SNS Topic</title>
      <dc:creator>Pavan Kumar</dc:creator>
      <pubDate>Fri, 16 May 2025 13:57:24 +0000</pubDate>
      <link>https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh</link>
      <guid>https://dev.to/pavandevops/cloudwatch-alarm-integration-with-kms-encrypted-sns-topic-22dh</guid>
      <description>&lt;h2&gt;
  
  
  Configure an Amazon CloudWatch alarm with an encrypted Amazon Simple Notification Service (Amazon SNS) topic.
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Monitoring&lt;/strong&gt; and &lt;strong&gt;alerting&lt;/strong&gt; are essential in the cloud but securing those alerts is important too. In this post, we are going to explore how to configure a CloudWatch Alarm so that you are being notified through an SNS topic, which is encrypted with KMS, so your alert data stays secured.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You must use an &lt;strong&gt;AWS Key Management Service (AWS KMS) customer managed key&lt;/strong&gt; to deliver Amazon SNS notifications with an encrypted Amazon SNS topic for a CloudWatch alarm. If you use the default alias/aws/sns AWS managed key for encryption, then the CloudWatch alarm fails to initiate the alarm action. You then receive a message that's similar to the following in the Alarm History section:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;"Failed to execute action arn:aws:sns:us-east-1:ACCOUNT_ID:TOPIC_NAME. Received error: "CloudWatch Alarms does not have authorization to access the SNS topic encryption key.""&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo8xk41sk0dbg5ih6frgq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo8xk41sk0dbg5ih6frgq.png" alt="Failed to execute action" width="800" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why should we want secure CloudWatch notifications?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;When an Alarm is triggered, e.g., the CPU Utilization is greater than 80%, you can alert via Amazon ‘s Simple Notification Service (SNS). Such alerts could include homeland security information such as resources information, environment details and others.&lt;/p&gt;

&lt;p&gt;Without the encryption, anybodycan access to the SNS topic could potentially read these messages. With the SNS topic encrypted with KMS, you get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🔐 Alert messages must be private&lt;/li&gt;
&lt;li&gt;✅ Adherence to Privacy Regulations&lt;/li&gt;
&lt;li&gt;🛡️ Defense from unauthorized access&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Architecture Overview&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm8s742qucggxfq4nza9n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm8s742qucggxfq4nza9n.png" alt="Architecture Overview" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1: Create a KMS Key
&lt;/h2&gt;

&lt;p&gt;1.1 To create a KMS key in AWS, simply follow the step-by-step instruction demonstrated in the image.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3icwdc1e1is20nl507p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3icwdc1e1is20nl507p.png" alt="KMS Setup" width="800" height="283"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Begin from &lt;strong&gt;Step 1&lt;/strong&gt;, where you set up the key by choosing the key type and key usage. In &lt;strong&gt;Step 2&lt;/strong&gt;, assign a descriptive label and description to use later to identify the key. &lt;strong&gt;Step 3&lt;/strong&gt; (optional) enables you to specify key administrative permissions by defining who may administer the key. &lt;strong&gt;Step 4&lt;/strong&gt; (optional) is to specify key usage permissions — who or what services are allowed to use this key to encrypt or decrypt. &lt;strong&gt;Step 5&lt;/strong&gt; (optional) is where you can modify the key policy for additional permission management. Lastly, in &lt;strong&gt;Step 6&lt;/strong&gt;, take a look at all your settings and click Create to create the new KMS key.&lt;/p&gt;

&lt;p&gt;Once it was created you are able see a key as shown below.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyugi91m2e807joktvxa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyugi91m2e807joktvxa.png" alt="KMS Key" width="800" height="136"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1.2 Edit the key policy to grant CloudWatch alarms the Decrypt and GenerateDataKey permissions to publish messages to encrypted Amazon SNS topics.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fud68oi6iwkzs4495hk8r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fud68oi6iwkzs4495hk8r.png" alt="Adding Key Policy for CloudWatch" width="800" height="218"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Add the below policy
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{      
"Sid": "Allow_CloudWatch_for_CMK",  
  "Effect": "Allow",  
  "Principal": {  
    "Service": [  
      "cloudwatch.amazonaws.com"  
    ]  
  },  
  "Action": [  
    "kms:Decrypt",  
    "kms:GenerateDataKey*"  
  ],  
  "Resource": "*"  
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The default AWS KMS key policy for Amazon SNS doesn't allow CloudWatch alarms to perform kms:Decrypt and kms:GenerateDataKey API calls. You can't manually edit policies for AWS managed keys.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0jtr6ot12zaqm07h70ox.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0jtr6ot12zaqm07h70ox.png" alt="Key Policy for CloudWatch" width="800" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 2: Enable Encryption for SNS
&lt;/h2&gt;

&lt;p&gt;2.1 Navigate to the SNS dashboard.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faekwk8ne8l4pt5etbabb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faekwk8ne8l4pt5etbabb.png" alt="SNS dashboard" width="800" height="121"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.2 In the left navigation panel, select Topics.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl7nyxgq1d79qvcen5r73.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl7nyxgq1d79qvcen5r73.png" alt="Topics" width="800" height="166"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.2 Select the SNS topic you want to examine and click on Edit.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7cf0ald6zjl9aaba3wpc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7cf0ald6zjl9aaba3wpc.png" alt="Edit the Topic" width="800" height="228"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.4 Under Encryption check, if the server-side encryption option is enabled or disabled, if not enabled enable with custom kms key.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4hvm5bs5iw3bchk1x50b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4hvm5bs5iw3bchk1x50b.png" alt="Enable Encryption" width="800" height="204"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.4 Under Access Policy, includes the Publish permission to allow CloudWatch alarms to publish messages to the Amazon SNS topic.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{     
"Sid": "Allow_Publish_Alarms",  
  "Effect": "Allow",  
  "Principal": {  
    "Service": [  
      "cloudwatch.amazonaws.com"  
    ]  
  },  
  "Action": "sns:Publish",  
  "Resource": "arn:aws:sns:demo-region:demo-account-id:demo-topic"}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Replace &lt;strong&gt;demo-region&lt;/strong&gt; with your AWS Region, &lt;strong&gt;demo-account-id&lt;/strong&gt; with the account ID, and &lt;strong&gt;demo-topic&lt;/strong&gt; with the topic name as shown in image.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8f3eq0nrg5ycznqqcr3w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8f3eq0nrg5ycznqqcr3w.png" alt="Access Policy to SNS" width="800" height="211"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 3: CloudWatch Alarm Setup
&lt;/h2&gt;

&lt;p&gt;3.1 To create a CloudWatch alarm, follow the steps indicated in the image. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7iax8j1laz5zro8tf02n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7iax8j1laz5zro8tf02n.png" alt="Steps to create CloudWatch Alarm" width="800" height="285"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Start with &lt;strong&gt;Step 1&lt;/strong&gt;, where you enter the metric and the conditions that will cause the alarm to trigger. This involves choosing an applicable metric and setting thresholds according to your requirements for monitoring. Under &lt;strong&gt;Step 2&lt;/strong&gt;, set up what actions must be taken when the alarm state is changed — for example, sending notifications through SNS or invoking an auto-scaling policy. Proceed to &lt;strong&gt;Step 3&lt;/strong&gt;, where you enter a descriptive name and description for easy identification and management of the alarm. Finally, in &lt;strong&gt;Step 4&lt;/strong&gt;, check all your settings in the preview, and once all is well, go ahead and click Create to complete setting up your CloudWatch alarm. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhxsa7n40183kkv23pkb1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhxsa7n40183kkv23pkb1.png" alt="CloudWatch Alarm" width="800" height="89"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 4: Testing Phase
&lt;/h2&gt;

&lt;p&gt;4.1 Modify the alarm by lowering the threshold (e.g., set CPU &amp;gt; 1%).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fddijay9pzar7cw8043z1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fddijay9pzar7cw8043z1.png" alt="Modify the Threshold" width="800" height="326"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4.2 Wait for the alarm to enter the ALARM state.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwto0udp4zicmi63h8biu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwto0udp4zicmi63h8biu.png" alt="Alarm Status" width="800" height="401"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4.3 Confirm that your SNS messages are sent and Subscribers receive the alert.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0vceqdgpwzfd6o134dur.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0vceqdgpwzfd6o134dur.png" alt="Alert Status" width="800" height="194"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion:
&lt;/h2&gt;

&lt;p&gt;In AWS, it's not only about receiving alerts — it's about safeguarding them. When you combine CloudWatch Alarms with KMS-encrypted SNS topics, you have a secure and auditable alerting system that meets best practices and compliance requirements.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>monitoring</category>
      <category>cloudwatch</category>
      <category>sns</category>
    </item>
  </channel>
</rss>
