DEV Community

Cover image for How to display informations from Amazon Managed Prometheus ?
Maxime Guilbert
Maxime Guilbert

Posted on • Updated on

How to display informations from Amazon Managed Prometheus ?

Using AMP (Amazon Managed Prometheus) can be really useful because we don't have to manage a lot of things with Prometheus, especially when we are looking for a scalable platform.

But currently, there's no pretty interface to be able to check the data, the rules, alarms... So here comes Prom-UI!


Prom-UI is the web interface from Prometheus but extracted to be able to run in a standalone mode and with the configuration to let you define from where you want to retrieve the data!

How-to use it ?

First, Prom-UI is not able to connect itself to AWS, so we will need a little bit of setup in AWS and use another tool to make it works.

1 - Setup in AWS

(In this case, you already have AMP setup and have workspaces defined.)

In AWS, we will need to define an IAM role to let access to the data in AMP.

  1. On the IAM console, choose Roles in the navigation pane
  2. Choose Create role and choose Custom trust policy
  3. Replace the custom trust policy with the following one. Update fields Account Number, region, OpenID conect ID, namespace & service account name
    "Version": "2012-10-17",
    "Statement": [
            "Effect": "Allow",
            "Principal": {
                "Federated": "arn:aws:iam::<Account Number>:oidc-provider/oidc.eks.<region><OpenID Connect ID>"
            "Action": "sts:AssumeRoleWithWebIdentity",
            "Condition": {
                "StringEquals": {
                    "oidc.eks.<region><OpenID Connect ID>:sub": "system:serviceaccount:<namespace>:<service account name>"
Enter fullscreen mode Exit fullscreen mode

In this case, the Prom-UI app will be deployed in an EKS cluster. The OpenID Connect ID can be retrieve in the field OpenID Connect provider URL in the AWS EKS console.

  1. Choose Next
  2. Click on Create Policy, it will open a new tab
  3. Paste the following policy in the JSON tab
    "Statement": [
            "Action": [
            "Effect": "Allow",
            "Resource": "*",
            "Sid": "VisualEditor0"
    "Version": "2012-10-17"
Enter fullscreen mode Exit fullscreen mode
  1. Click on Next, and Review
  2. Define a name for the policy, and click on Create Policy
  3. Go back to the tab where you were creating the rules
  4. Refresh the list of policies, and select the one you just created
  5. Then click on Next, name the role and click on Create role
  6. Retrieve the newly created role and get its ARN

2 - Setup in Kubernetes

Now everything is prepared in AWS, we can setup the stuff in Kubernetes to let everything works!


Create a service account using the following template, where you have to replace arn with the ARN of the created role, service account name & namespace with the values you used while creating the role.

apiVersion: v1
kind: ServiceAccount
  annotations: <arn>
  name: <service account name>
  namespace: <namespace>
Enter fullscreen mode Exit fullscreen mode


For the deployment you can use the following deployment configuration where you have to replace :

  • deployment name
  • namespace
  • Workspace UUID - UUID of the workspace in AMP
  • service account name
apiVersion: apps/v1
kind: Deployment
  name: <deployment name>
  namespace: <namespace>
  replicas: 1
      app: prom-ui
      maxSurge: 25%
      maxUnavailable: 25%
    type: RollingUpdate
        app: prom-ui
      - env:
        - name: PROMETHEUS_SRC_API
          value: http://localhost:8005/workspaces/ws-<workspace UUID>
        image: adaendraa/prom-ui:1.0.2
          failureThreshold: 6
            path: /health-check
            port: http
            scheme: HTTP
          periodSeconds: 5
          successThreshold: 1
          timeoutSeconds: 3
        name: rules-ui
        - containerPort: 3000
          name: http
          protocol: TCP
          failureThreshold: 3
            path: /health-check
            port: http
            scheme: HTTP
          periodSeconds: 5
          successThreshold: 1
          timeoutSeconds: 3
      - args:
        - --name
        - aps
        - --region
        - <region>
        - --host
        - --port
        - :8005
        imagePullPolicy: IfNotPresent
        name: aws
        - containerPort: 8005
          name: aws-sigv4-proxy
          protocol: TCP
        resources: {}
        terminationMessagePath: /dev/termination-log
        terminationMessagePolicy: File
      serviceAccount: <service account name>
      serviceAccountName: <service account name>
Enter fullscreen mode Exit fullscreen mode

The deployment is pretty simple, we have a deployment with 2 containers :

  • aws : An AWS sigV4 container which will help us to communicate with AWS
  • prom-ui : The Web UI app which will point on http://localhost:8005/workspaces/ws-<workspace UUID> to retrieve data from AMP through the AWS Sig V4 container.

Then you have to expose this deployment to be able to use it properly (I won't talk about it because there are a lot of ways to do it depending your context).

To check if everything is right, you can use kubectl port-forward.

I hope it will help you! 🍺

You want to support me?

Buy Me A Coffee

Top comments (0)