AWS Account Factory for Terraform ( AFT ) on practice mini-course - setup #1

Поделиться
HTML-код
  • Опубликовано: 14 окт 2024

Комментарии • 19

  • @francescofurini6101
    @francescofurini6101 20 дней назад

    you are the guy from Udemy! great job with this tutorial, you saved my thesis 🤖

  • @crazer96
    @crazer96 Год назад

    This is a fantastic video! Thank you so much for making a clear, concise, end-to-end guide. Quick info to anyone following this now. With the new layout on 06:59, you have to click the "Access" tab, followed by "Grant access" (yellow button on right), before you can select roles.

  • @RodrigoDeVincenzoMonteiro
    @RodrigoDeVincenzoMonteiro 2 года назад +1

    Awesome demo, Skrypnyk, I wanted exactly see a walkthrough like that before diving deep to build one myself!

    • @sysarchitectsdiary7889
      @sysarchitectsdiary7889  2 года назад

      Glad that you liked :)
      Thank you for feedback
      Will continue soon prepare more interesting video

  • @alfredocambera
    @alfredocambera 2 года назад +3

    Great video. Thanks a lot for taking the time to create it.

    • @sysarchitectsdiary7889
      @sysarchitectsdiary7889  2 года назад +2

      Thank you, Alfredo! Appreciate your feedback, it really motivates me to move forward.
      If you will have any suggestions on what you want to see also on this channel, always welcome :)

  • @Amarnath-z7d
    @Amarnath-z7d 7 месяцев назад

    Its a wonderful explanation .. thank you somuch sir

  • @user3-d3i
    @user3-d3i Месяц назад

    can you please demo from the beginning , for how to create Control Tower Landing Zone with what Iam user please?

  • @ebbsleo3087
    @ebbsleo3087 2 года назад

    great walkthrough! thanks for posting this

  • @SomeGamer361
    @SomeGamer361 Год назад

    I'm getting an error with AWS permissions. I'm not sure what i'm missing.
    module.aft.module.aft_account_request_framework.data.aws_iam_policy.AWSLambdaVPCAccessExecutionRole: Refresh complete after 0s [id=arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole]

    │ Error: configuring Terraform AWS Provider: IAM Role (arn:aws:iam::xxxxxxxxx3:role/AWSControlTowerExecution) cannot be assumed.

    │ There are a number of possible causes of this - the most common are:
    │ * The credentials used in order to assume the role are invalid
    │ * The credentials do not have appropriate permission to assume the role
    │ * The role ARN is not valid

    │ AWS Error: operation error STS: AssumeRole, https response error StatusCode: 403, RequestID: 7f33036a-1489-498e-add8-dcc1cd24a8fd, api error AccessDenied: User: arn:aws:iam::xxxxxxxx8:user/terraform.cloud is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::xxxxxxxx3:role/AWSControlTowerExecution


    │ with module.aft.provider["registry.terraform.io/hashicorp/aws"].tf_backend_secondary_region,
    │ on .terraform/modules/aft/providers.tf line 28, in provider "aws":
    │ 28: provider "aws" {


    Operation failed: failed running terraform plan (exit 1)
    The user i'm using is an admin, but i've also got a policy specifically for AssumeRole
    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Sid": "VisualEditor0",
    "Effect": "Allow",
    "Action": "sts:AssumeRole",
    "Resource": "arn:aws:iam::xxxxxxxxx3:role/AWSControlTowerExecution"
    }
    ]
    }

  • @TheDelkos1981
    @TheDelkos1981 7 месяцев назад

    So, the third requirement - pre-installed landing zone - can't create it from Terraform? because I am looking for information about this but I dont find anything...
    any idea?

    • @Chris-qd8rs
      @Chris-qd8rs 3 месяца назад

      thats right, u do it in the aws console

  • @MatteoMi
    @MatteoMi 7 месяцев назад

    Well done :)

  • @dennisneuman7887
    @dennisneuman7887 Год назад

    Did you manage to use s3 as a terraform state backend? It does create the necessary buckets and dynamodb table but stores the statefile locally.
    When trying to migrate I don't seem to have permission to write to the bucket in the aft management account from the root/controltower account.

  • @njehcaleb7668
    @njehcaleb7668 Год назад

    Thanks

  • @saeedsherani7275
    @saeedsherani7275 2 года назад

    Can you please make another video for configuring control tower.

  • @JoelMakori95
    @JoelMakori95 2 года назад +1

    How do you resolve this error?
    error configuring Terraform AWS Provider: IAM Role (arn:aws:iam::xxxxxxxxx375:role/AWSControlTowerExecution) cannot be assumed.

    │ There are a number of possible causes of this - the most common are:
    │ * The credentials used in order to assume the role are invalid
    │ * The credentials do not have appropriate permission to assume the role
    │ * The role ARN is not valid
    I've assumed roles for each account under my "ct_management" user profile, but still having the same error

    • @JoelMakori95
      @JoelMakori95 2 года назад +2

      Fixed it, realized it was an issue w/ my credentuals, when calling aws sts get-caller-identity
      Creds were correct but still had issues running next steps, ended up deleting the credentials file and re-configured my aws credentials locally to get terraform working properly

  • @harirocking1530
    @harirocking1530 2 года назад

    i have tried exactly how you did by reffering the blog of hashicorp everything worked fine but couldn't be able to create the accounts