Skip to content

Commit 1e0d260

Browse files
committed
doc: Adds trobuleshooting guidance when IAM Role has been deleted
1 parent 13cbf87 commit 1e0d260

File tree

4 files changed

+15
-1
lines changed

4 files changed

+15
-1
lines changed

README.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,12 @@ The following are common issues encountered when using AWS CloudFormation/CDK wi
128128
* The machine making the API call to the 3rd-party MongoDB Atlas API would be various AWS servers hosting Lambda functions and won't be static.
129129
* Review the [AWS IP address ranges](https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html) and contact AWS Support directly who can help confirm the CIDR range to be used in your Atlas PAK IP Whitelist.
130130

131-
### Error: The CFN stack remains in the `CREATE_IN_PROGRESS` state before failing after an hour or so
131+
### Error: The CFN stack remains in the `CREATE_IN_PROGRESS` state before failing after 30 min or more
132+
The problem might be due to the IAM role:
133+
1. [Misconfigured IAM Role's trust relationship](#misconfigured-iam-roles-trust-relationship)
134+
2. [Activate Type IAM Role deleted](#activate-type-iam-role-deleted)
135+
136+
### Misconfigured IAM Role's trust relationship
132137
The problem is caused by incorrect trust relationships linked to the role that you used to activate CFN resources or run the CFN stack. To resolve the issue, ensure that your IAM role's trust relationships include `resources.cloudformation.amazonaws.com`, `cloudformation.amazonaws.com`, `lambda.amazonaws.com`. The following YAML code shows an example of the correct trust relationships:
133138
```yaml
134139
AssumeRolePolicyDocument:
@@ -147,6 +152,15 @@ Use the [execution-role.yaml](examples/execution-role.yaml) file to generate an
147152
Alternatively, you can set the trust relationships of your role via AWS Console: in the IAM dashboard, select your role and click **Trust Relationships**:
148153
![Screenshot 2023-03-31 at 17 32 55](https://user-images.githubusercontent.com/5663078/230436500-fb4ee057-b70e-4580-a94d-f56191728117.png)
149154
155+
### Activate Type IAM Role deleted
156+
The IAM Role used to Activate the resource type might have been deleted (also applies when using a different IAM Role when creating the stack).
157+
To verify this you can:
158+
159+
1. ![alt text](docs/images/activate_type_iam_role1.png)
160+
2. ![alt text](docs/images/activate_type_iam_role2.png)
161+
3. ![alt text](docs/images/activate_type_iam_role3.png)
162+
* Ensure this IAM Role exists
163+
150164
## Error: 404 (request "INVALID_GROUP_ID") An invalid group ID <YOUR-PROJECT-ID>|default was specified
151165
The problem is caused by using the project resource identifier (ID + Profile Name) as the input parameter `ProjectID` of another CFN resource. The correct approach is to use [GetAttr](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html) function to get the ProjectId from the project resource and use that value as input parameter to the next CFN resource.
152166
Example of correct use of GetAtt (see [project-cluster.json](examples/cluster/project-cluster.json)):
348 KB
Loading
345 KB
Loading
42.6 KB
Loading

0 commit comments

Comments
 (0)