AWS Account Factory for Terraform ( AFT ) on practice mini-course - setup #1

Поділитися
Вставка
  • Опубліковано 11 гру 2024

КОМЕНТАРІ • 19

  • @francescofurini6101
    @francescofurini6101 2 місяці тому

    you are the guy from Udemy! great job with this tutorial, you saved my thesis 🤖

  • @crazer96
    @crazer96 Рік тому

    This is a fantastic video! Thank you so much for making a clear, concise, end-to-end guide. Quick info to anyone following this now. With the new layout on 06:59, you have to click the "Access" tab, followed by "Grant access" (yellow button on right), before you can select roles.

  • @RodrigoDeVincenzoMonteiro
    @RodrigoDeVincenzoMonteiro 2 роки тому +1

    Awesome demo, Skrypnyk, I wanted exactly see a walkthrough like that before diving deep to build one myself!

    • @sysarchitectsdiary7889
      @sysarchitectsdiary7889  2 роки тому

      Glad that you liked :)
      Thank you for feedback
      Will continue soon prepare more interesting video

  • @alfredocambera
    @alfredocambera 2 роки тому +3

    Great video. Thanks a lot for taking the time to create it.

    • @sysarchitectsdiary7889
      @sysarchitectsdiary7889  2 роки тому +2

      Thank you, Alfredo! Appreciate your feedback, it really motivates me to move forward.
      If you will have any suggestions on what you want to see also on this channel, always welcome :)

  • @Amarnath-z7d
    @Amarnath-z7d 9 місяців тому

    Its a wonderful explanation .. thank you somuch sir

  • @ebbsleo3087
    @ebbsleo3087 2 роки тому

    great walkthrough! thanks for posting this

  • @user3-d3i
    @user3-d3i 2 місяці тому

    can you please demo from the beginning , for how to create Control Tower Landing Zone with what Iam user please?

  • @MatteoMi
    @MatteoMi 9 місяців тому

    Well done :)

  • @SomeGamer361
    @SomeGamer361 Рік тому

    I'm getting an error with AWS permissions. I'm not sure what i'm missing.
    module.aft.module.aft_account_request_framework.data.aws_iam_policy.AWSLambdaVPCAccessExecutionRole: Refresh complete after 0s [id=arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole]

    │ Error: configuring Terraform AWS Provider: IAM Role (arn:aws:iam::xxxxxxxxx3:role/AWSControlTowerExecution) cannot be assumed.

    │ There are a number of possible causes of this - the most common are:
    │ * The credentials used in order to assume the role are invalid
    │ * The credentials do not have appropriate permission to assume the role
    │ * The role ARN is not valid

    │ AWS Error: operation error STS: AssumeRole, https response error StatusCode: 403, RequestID: 7f33036a-1489-498e-add8-dcc1cd24a8fd, api error AccessDenied: User: arn:aws:iam::xxxxxxxx8:user/terraform.cloud is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::xxxxxxxx3:role/AWSControlTowerExecution


    │ with module.aft.provider["registry.terraform.io/hashicorp/aws"].tf_backend_secondary_region,
    │ on .terraform/modules/aft/providers.tf line 28, in provider "aws":
    │ 28: provider "aws" {


    Operation failed: failed running terraform plan (exit 1)
    The user i'm using is an admin, but i've also got a policy specifically for AssumeRole
    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Sid": "VisualEditor0",
    "Effect": "Allow",
    "Action": "sts:AssumeRole",
    "Resource": "arn:aws:iam::xxxxxxxxx3:role/AWSControlTowerExecution"
    }
    ]
    }

  • @saeedsherani7275
    @saeedsherani7275 2 роки тому

    Can you please make another video for configuring control tower.

  • @njehcaleb7668
    @njehcaleb7668 Рік тому

    Thanks

  • @dennisneuman7887
    @dennisneuman7887 Рік тому

    Did you manage to use s3 as a terraform state backend? It does create the necessary buckets and dynamodb table but stores the statefile locally.
    When trying to migrate I don't seem to have permission to write to the bucket in the aft management account from the root/controltower account.

  • @JoelMakori95
    @JoelMakori95 2 роки тому +1

    How do you resolve this error?
    error configuring Terraform AWS Provider: IAM Role (arn:aws:iam::xxxxxxxxx375:role/AWSControlTowerExecution) cannot be assumed.

    │ There are a number of possible causes of this - the most common are:
    │ * The credentials used in order to assume the role are invalid
    │ * The credentials do not have appropriate permission to assume the role
    │ * The role ARN is not valid
    I've assumed roles for each account under my "ct_management" user profile, but still having the same error

    • @JoelMakori95
      @JoelMakori95 2 роки тому +2

      Fixed it, realized it was an issue w/ my credentuals, when calling aws sts get-caller-identity
      Creds were correct but still had issues running next steps, ended up deleting the credentials file and re-configured my aws credentials locally to get terraform working properly

  • @harirocking1530
    @harirocking1530 2 роки тому

    i have tried exactly how you did by reffering the blog of hashicorp everything worked fine but couldn't be able to create the accounts

  • @TheDelkos1981
    @TheDelkos1981 9 місяців тому

    So, the third requirement - pre-installed landing zone - can't create it from Terraform? because I am looking for information about this but I dont find anything...
    any idea?

    • @Chris-qd8rs
      @Chris-qd8rs 5 місяців тому

      thats right, u do it in the aws console