CloudFormation stack deployment takes very long before failing #26657
Replies: 2 comments 5 replies
-
There will be logs for the custom resource provider (Lambda Function) in CloudWatch - Could you view these logs to see if it gives any insight? If you think it might be a permissions error, try using |
Beta Was this translation helpful? Give feedback.
-
Some food for thought... On this page, it says whenever one creates a custom resource in a VPC that has an endpoint (which is my case), the IAM policy of this endpoint should allow for communication with a global AWS S3 bucket dedicated to responses from custom resources.
Here's how I create my VPC: new Vpc(this, 'VPC', {
vpcName: 'Main',
maxAzs: 3,
subnetConfiguration: [
{
subnetType: SubnetType.PUBLIC,
name: 'Public',
},
{
subnetType: SubnetType.PRIVATE_WITH_EGRESS,
name: 'PrivateWithEgress',
},
{
subnetType: SubnetType.PRIVATE_ISOLATED,
name: 'PrivateIsolated',
},
],
}); CDK creates one VPC Interface Endpoint associated with one default security group. The VPC endpoint and security group are attached to the Redshift Serverless workgroup/namespace. This security group allows for all inbound traffic from within itself and outbound traffic to anything (0.0.0.0/0). I manually added an inbound rule allowing all inbound traffic (0.0.0.0/0) for the sake of the test but to no avail. I also notice that the Redshift Serverless dashboard allows you to create a Redshift-managed VPC endpoint. I'm not sure this could help. My custom resource lambda function has its own security group. How can I (using CDK) make sure it can "talk" to the security group of Redshift Serverless)? As you can see above, I do have the following policy statements All ideas are welcome. Thanks in advance. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello friends,
I'm trying to initialise my Redshift Serverless Workgroup/Namespace either from a snapshot or with SQL statements. Both approaches leave the CloudFormation hanging for a while before throwing the following error:
CloudFormation did not receive a response from your Custom Resource. Please check your logs for requestId [blah-blah]. If you are using the Python cfn-response module, you may need to update your Lambda function code so that CloudFormation can attach the updated version.
Here's the code of my AwsCustomResource:
I feel like I'm following the documentation here as I should.
The fact that it takes very long before throwing the error makes me thing it could be a role/permissions issue, but I explicitly allow access to
ANY_RESOURCE
to the Lambda policy as seen in the code above.What am I doing wrong?
Beta Was this translation helpful? Give feedback.
All reactions