-
-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Transform is not supported in SERVICE_MANAGED permission model #10
Comments
I have a feeling removing the last line of You may also have to remove this part:
|
Removing those lines fixes the syntax, but running the template yields
... after which deployment stops, of course. And those logs are unfortunately not accessible. |
You can choose to not rollback when deploying. Not 100% if that's possible with StackSets though. |
I'll look into it, but meanwhile: is there anything you can suggest I do? Custom resources can be notoriously difficult to debug, because of the indirection. Grateful for any help; this will be used in a system of 500+ accounts, so StackSets are vital here. |
That log is the only way to resolve it. That said, the log should still be there. Nothing in the stack deletes it on stack destruction. The log should stay behind after the stack is deleted. |
The log doesn't give much information, but through experimentation I found that it had to do with not specifying the new account number in the main template. The need to update things whenever a new account is created - which in our system will happen several times a day - is not a practical one. I'm thus modifying your code to allow the whole AWS Organization to stream logs using a Condition. This requires creating a Role specifically for this purpose. I'll let you know when I'm done adapting your code in case you want to use my changes |
Oh yeah OU would be awesome here. |
Hi, still working on the OU, but I thought I'd send you what I've got so
far, as Ive solved the 6MB reingestion/retry problem in the Log Processor
lambda. It's actually one of the Lambda Blueprints - AWS Support pointed me
in the right direction. I've enclosed an archive with a couple of extra
files - the lambda code in the template has been stripped of comments, but
you can find them in the loose file.
Cheers,
/ Peter
|
The Log Processor role needed a couple more permissions. New archive enclosed.
|
Where have you enclosed the archive? I can't see it. |
I'm trying to install the
CloudWatch2S3-additional-account.template
as a StackSet in eu-north-1 and us-east-1, but I get the following error message:Transform is not supported in SERVICE_MANAGED permission model
Unfortunately there is no way to specify the permission model for StackSets.
Is this a known issue?
The text was updated successfully, but these errors were encountered: