Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

deploying outbound auto-scale cft cross-account #3

Open
davidaavilar opened this issue Oct 10, 2019 · 10 comments
Open

deploying outbound auto-scale cft cross-account #3

davidaavilar opened this issue Oct 10, 2019 · 10 comments

Comments

@davidaavilar
Copy link

Hi, there. We are using outbound-autoscale cft that it ask for tgw-id and rtb-tgw-id (assuming that the tgw was created in the same account that we are deploying), however, the tgw was not deployed within the same account that we are deploying our security VPC. How can we deploy this cft cross-account?

@panwce
Copy link
Contributor

panwce commented Oct 11, 2019

The lambda function triggered by the ASG lifecycle instance hook would require an IAM role with cross account permissions. We will investigate

@davidaavilar
Copy link
Author

The lambda function triggered by the ASG lifecycle instance hook would require an IAM role with cross account permissions. We will investigate

Hi, there.. Thank you for your response.. I will appreciate if you could confirm us.. it only require to launch the cft on one unique account with rights over the account that tgw was created? Again, thanks!

@panwce
Copy link
Contributor

panwce commented Oct 15, 2019 via email

@davidaavilar
Copy link
Author

Hi, Justin. How are you? Thanks for your confirmation.. So, we need to add in the LambdaExecutionRole the ARN of the account? Do we have to make changes on lambda config.fw file? I'm not an AWS expert.. I've been seen this article https://aws.amazon.com/premiumsupport/knowledge-center/lambda-function-assume-iam-role/

Thanks for your help

@panwce
Copy link
Contributor

panwce commented Oct 17, 2019 via email

@davidaavilar
Copy link
Author

Hi, Justin. How are you? Thank you for your support. I hope to hear about you soon.

@panwce
Copy link
Contributor

panwce commented Oct 22, 2019 via email

@davidaavilar
Copy link
Author

Hi, there. How are you? Did you get any response from AWS about this issue? I'm trying to scalate it too to the AWS team that we are working. Thank you for your support!

@panwce
Copy link
Contributor

panwce commented Oct 29, 2019 via email

@davidaavilar
Copy link
Author

Hi, Justin. Thanks a lot for your support. Could you help me with the name of AWS's support engineer that replied you with that or the case number. With this, I can talk with AWS's architect that we cannot deploy VPN-attachment cross account.

I'm gonna discuss this with the customer to deploy the CFT in the same account. Please, let me know if you achieve move the Lambda function and if you are gonna to update the template with this. Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants