AWS Account Factory for Terraform ( AFT ) on practice mini-course - setup #1

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ต.ค. 2024

ความคิดเห็น • 19

  • @crazer96
    @crazer96 ปีที่แล้ว

    This is a fantastic video! Thank you so much for making a clear, concise, end-to-end guide. Quick info to anyone following this now. With the new layout on 06:59, you have to click the "Access" tab, followed by "Grant access" (yellow button on right), before you can select roles.

  • @alfredocambera
    @alfredocambera 2 ปีที่แล้ว +3

    Great video. Thanks a lot for taking the time to create it.

    • @sysarchitectsdiary7889
      @sysarchitectsdiary7889  2 ปีที่แล้ว +2

      Thank you, Alfredo! Appreciate your feedback, it really motivates me to move forward.
      If you will have any suggestions on what you want to see also on this channel, always welcome :)

  • @user3-d3i
    @user3-d3i 18 วันที่ผ่านมา

    can you please demo from the beginning , for how to create Control Tower Landing Zone with what Iam user please?

  • @francescofurini6101
    @francescofurini6101 8 วันที่ผ่านมา

    you are the guy from Udemy! great job with this tutorial, you saved my thesis 🤖

  • @TheDelkos1981
    @TheDelkos1981 7 หลายเดือนก่อน

    So, the third requirement - pre-installed landing zone - can't create it from Terraform? because I am looking for information about this but I dont find anything...
    any idea?

    • @Chris-qd8rs
      @Chris-qd8rs 3 หลายเดือนก่อน

      thats right, u do it in the aws console

  • @njehcaleb7668
    @njehcaleb7668 ปีที่แล้ว

    Thanks

  • @JoelMakori95
    @JoelMakori95 2 ปีที่แล้ว +1

    How do you resolve this error?
    error configuring Terraform AWS Provider: IAM Role (arn:aws:iam::xxxxxxxxx375:role/AWSControlTowerExecution) cannot be assumed.

    │ There are a number of possible causes of this - the most common are:
    │ * The credentials used in order to assume the role are invalid
    │ * The credentials do not have appropriate permission to assume the role
    │ * The role ARN is not valid
    I've assumed roles for each account under my "ct_management" user profile, but still having the same error

    • @JoelMakori95
      @JoelMakori95 2 ปีที่แล้ว +2

      Fixed it, realized it was an issue w/ my credentuals, when calling aws sts get-caller-identity
      Creds were correct but still had issues running next steps, ended up deleting the credentials file and re-configured my aws credentials locally to get terraform working properly

  • @dennisneuman7887
    @dennisneuman7887 ปีที่แล้ว

    Did you manage to use s3 as a terraform state backend? It does create the necessary buckets and dynamodb table but stores the statefile locally.
    When trying to migrate I don't seem to have permission to write to the bucket in the aft management account from the root/controltower account.

  • @SomeGamer361
    @SomeGamer361 ปีที่แล้ว

    I'm getting an error with AWS permissions. I'm not sure what i'm missing.
    module.aft.module.aft_account_request_framework.data.aws_iam_policy.AWSLambdaVPCAccessExecutionRole: Refresh complete after 0s [id=arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole]

    │ Error: configuring Terraform AWS Provider: IAM Role (arn:aws:iam::xxxxxxxxx3:role/AWSControlTowerExecution) cannot be assumed.

    │ There are a number of possible causes of this - the most common are:
    │ * The credentials used in order to assume the role are invalid
    │ * The credentials do not have appropriate permission to assume the role
    │ * The role ARN is not valid

    │ AWS Error: operation error STS: AssumeRole, https response error StatusCode: 403, RequestID: 7f33036a-1489-498e-add8-dcc1cd24a8fd, api error AccessDenied: User: arn:aws:iam::xxxxxxxx8:user/terraform.cloud is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::xxxxxxxx3:role/AWSControlTowerExecution


    │ with module.aft.provider["registry.terraform.io/hashicorp/aws"].tf_backend_secondary_region,
    │ on .terraform/modules/aft/providers.tf line 28, in provider "aws":
    │ 28: provider "aws" {


    Operation failed: failed running terraform plan (exit 1)
    The user i'm using is an admin, but i've also got a policy specifically for AssumeRole
    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Sid": "VisualEditor0",
    "Effect": "Allow",
    "Action": "sts:AssumeRole",
    "Resource": "arn:aws:iam::xxxxxxxxx3:role/AWSControlTowerExecution"
    }
    ]
    }

  • @RodrigoDeVincenzoMonteiro
    @RodrigoDeVincenzoMonteiro 2 ปีที่แล้ว +1

    Awesome demo, Skrypnyk, I wanted exactly see a walkthrough like that before diving deep to build one myself!

    • @sysarchitectsdiary7889
      @sysarchitectsdiary7889  2 ปีที่แล้ว

      Glad that you liked :)
      Thank you for feedback
      Will continue soon prepare more interesting video

  • @Amarnath-z7d
    @Amarnath-z7d 7 หลายเดือนก่อน

    Its a wonderful explanation .. thank you somuch sir

  • @saeedsherani7275
    @saeedsherani7275 2 ปีที่แล้ว

    Can you please make another video for configuring control tower.

  • @harirocking1530
    @harirocking1530 2 ปีที่แล้ว

    i have tried exactly how you did by reffering the blog of hashicorp everything worked fine but couldn't be able to create the accounts

  • @ebbsleo3087
    @ebbsleo3087 2 ปีที่แล้ว

    great walkthrough! thanks for posting this

  • @MatteoMi
    @MatteoMi 7 หลายเดือนก่อน

    Well done :)