Project Defaults

Project Defaults

Project Defaults configure the baseline settings for your SkySaver project. These settings apply to all connected AWS accounts unless overridden at the account level.

Accessing Project Defaults

Navigate to Project Defaults from the main menu.

Project Defaults Project Defaults

Available Settings

SettingDescriptionDefault
Enabled ServicesWhich resource types to scheduleNone
RegionsAWS regions to scanNone (must configure)
Default TagTag key for schedulesSchedule
Default Role NameIAM role nameSkySaverScheduler
External IDSecurity token for role assumptionAuto-generated

Configuring Services

Enable the AWS services you want SkySaver to manage:

Available Services

ServiceDescription
EC2Elastic Compute Cloud instances
RDSRelational Database Service instances
LambdaLambda functions (concurrency)
ASGAuto Scaling Groups

Enabling Services

  1. Navigate to Project Defaults
  2. Toggle On for desired services
  3. Click Update

Note: Only enabled services will be scanned for scheduling. Enable only what you need to minimize API calls.

Configuring Regions

Add all AWS regions where your resources are located:

Adding Regions

  1. Navigate to Project Defaults
  2. Click Add Region or use the region dropdown
  3. Select regions from the list
  4. Click Update

Common Regions

RegionDescription
us-east-1N. Virginia
us-west-2Oregon
eu-west-1Ireland
eu-central-1Frankfurt
ap-southeast-1Singapore

Tag Configuration

The Default Tag is the AWS resource tag key used for schedule matching:

Setting the Default Tag

  1. Navigate to Project Defaults
  2. Find the Default Tag field
  3. Enter your preferred tag key (default is Schedule)
  4. Click Update

Tag Considerations

  • Keep tag names consistent across accounts
  • Avoid spaces in tag names
  • Consider including “SkySaver” for clarity
  • Document your tag naming convention

Role Configuration

Default Role Name

The IAM role name that SkySaver assumes in your AWS accounts:

  • Default: SkySaverScheduler
  • Must match the role created by CloudFormation
  • Can be overridden per account

External ID

A security token used when assuming IAM roles:

  • Auto-generated UUID per project
  • Must match the External ID in your IAM role trust policy
  • Keep this value secure

Updating Settings

To update project defaults:

  1. Make your changes in the form
  2. Click the Update button
  3. Changes take effect immediately

Account-Level Overrides

Individual AWS accounts can override these defaults:

SettingOverride Location
TagAccounts > Manage > Edit
RegionsAccounts > Manage > Edit
ServicesNot overridable (project-wide)

Best Practices

  1. Start minimal - Enable only necessary services
  2. Be consistent - Use the same tag across all accounts
  3. Document - Record your External ID securely
  4. Review regularly - Audit settings as needs change

Impact of Changes

ChangeEffect
Enable serviceStarts scanning that resource type
Disable serviceStops all scheduling for that type
Add regionStarts scanning in new region
Remove regionStops scanning in that region
Change tagMust update AWS resource tags to match

Troubleshooting

IssueCauseSolution
Resources not foundRegion not addedAdd region to defaults
Schedules not runningService not enabledEnable service in defaults
Role assumption failsExternal ID mismatchVerify External ID matches