Features Services Workflow Architecture GitHub
Open Source AWS Infrastructure Monitoring

Monitor AWS.
Manage JIT Access.

A central hub for real-time AWS infrastructure visibility combined with secure Just-In-Time access management using AWS STS temporary credentials.

12+
AWS Services Supported
3
User Roles
STS
Temporary Credentials
OTP
Secure Verification

Everything you need for AWS visibility

Real-time monitoring, secure access management, and comprehensive cost tracking in one unified dashboard.

Real-Time Monitoring

Track EC2 instances, EKS clusters, RDS databases, and more with live status updates and CloudWatch metrics.

JIT Access Control

Request-approval workflow with temporary AWS STS credentials. Reduce long-term IAM credential exposure.

Role-Based Access

Employee, Manager, and Admin roles with granular permissions for viewing and approving access requests.

Cost Management

View month-to-date totals, daily spend charts, and detailed cost breakdown by AWS service.

OTP Verification

Manager identity verification via 6-digit OTP for sensitive operations ensures secure approval workflows.

Auto-Expiring Sessions

Temporary credentials automatically terminate when the requested duration expires for enhanced security.

Comprehensive AWS Coverage

Monitor and manage access across all your critical AWS infrastructure components.

Compute

EC2 EKS

Databases & Cache

RDS ElastiCache

Integration & Messaging

OpenSearch Amazon MQ

Networking & Delivery

ALB/NLB SES

Security & Infrastructure

Secrets Manager IAM

Cost Management

Billing Cost Explorer

Secure JIT Access in 4 Steps

Request, approve, activate, and auto-expire. Secure temporary credentials with zero standing access.

1

Request Phase

Employee requests access to specific AWS services for a defined duration.

2

Approval Phase

Manager receives notification and verifies identity via 6-digit OTP.

3

Activation Phase

AWS STS generates temporary credentials for the approved services.

4

Session Management

Access automatically terminates when the duration expires.

Built with Modern Technology

A robust stack designed for reliability, security, and developer productivity.

FastAPI

Python Backend

React

Frontend UI

PostgreSQL

Database

Valkey

Session Cache

Get Started

Step 1 · .env
POWER_AWS_ACCESS_KEY_ID=...
POWER_AWS_SECRET_ACCESS_KEY=...
POWER_AWS_REGION=us-east-1
BASE_ROLE_ARN=arn:aws:iam::123456789012:role/PowerUserRole

ADMIN_EMAIL=admin@company.com

SMTP_HOST=smtp.company.com
SMTP_PORT=587
SMTP_USER=...
SMTP_PASSWORD=...
SMTP_FROM=noreply@company.com

POSTGRES_HOST=db
POSTGRES_PORT=5432
POSTGRES_DB=awsdashboard
POSTGRES_USER=awsdashboard
POSTGRES_PASSWORD=changeme

VALKEY_URL=redis://valkey:6379

SECRET_KEY=change-me
Step 2 · docker-compose.yml
services:
  backend:
    image: mguptahub/cloud-dashboard-backend:latest
    env_file:
      - .env
    depends_on:
      - db
      - valkey

  frontend:
    image: mguptahub/cloud-dashboard-frontend:latest
    ports:
      - "4000:80"
    depends_on:
      - backend

  db:
    image: postgres:16
    environment:
      - POSTGRES_DB=${POSTGRES_DB:-aws_dashboard}
      - POSTGRES_USER=${POSTGRES_USER:-aws_dashboard}
      - POSTGRES_PASSWORD=${POSTGRES_PASSWORD:-aws_dashboard}
    volumes:
      - db_data:/var/lib/postgresql/data

  valkey:
    image: valkey/valkey:7
    volumes:
      - valkey_data:/data

volumes:
  db_data:
  valkey_data: