You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+15-1Lines changed: 15 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,12 @@ The following are common issues encountered when using AWS CloudFormation/CDK wi
128
128
* The machine making the API call to the 3rd-party MongoDB Atlas API would be various AWS servers hosting Lambda functions and won't be static.
129
129
* Review the [AWS IP address ranges](https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html) and contact AWS Support directly who can help confirm the CIDR range to be used in your Atlas PAK IP Whitelist.
130
130
131
-
### Error: The CFN stack remains in the `CREATE_IN_PROGRESS` state before failing after an hour or so
131
+
### Error: The CFN stack remains in the `CREATE_IN_PROGRESS` state before failing after 30 min or more
132
+
The problem might be due to the IAM role:
133
+
1.[Misconfigured IAM Role's trust relationship](#misconfigured-iam-roles-trust-relationship)
134
+
2.[Activate Type IAM Role deleted](#activate-type-iam-role-deleted)
135
+
136
+
### Misconfigured IAM Role's trust relationship
132
137
The problem is caused by incorrect trust relationships linked to the role that you used to activate CFN resources or run the CFN stack. To resolve the issue, ensure that your IAM role's trust relationships include `resources.cloudformation.amazonaws.com`, `cloudformation.amazonaws.com`, `lambda.amazonaws.com`. The following YAML code shows an example of the correct trust relationships:
133
138
```yaml
134
139
AssumeRolePolicyDocument:
@@ -147,6 +152,15 @@ Use the [execution-role.yaml](examples/execution-role.yaml) file to generate an
147
152
Alternatively, you can set the trust relationships of your role via AWS Console: in the IAM dashboard, select your role and click **Trust Relationships**:
148
153

149
154
155
+
### Activate Type IAM Role deleted
156
+
The IAM Role used to Activate the resource type might have been deleted (also applies when using a different IAM Role when creating the stack).
## Error: 404 (request "INVALID_GROUP_ID") An invalid group ID <YOUR-PROJECT-ID>|default was specified
151
165
The problem is caused by using the project resource identifier (ID + Profile Name) as the input parameter `ProjectID` of another CFN resource. The correct approach is to use [GetAttr](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-getatt.html) function to get the ProjectId from the project resource and use that value as input parameter to the next CFN resource.
152
166
Example of correct use of GetAtt (see [project-cluster.json](examples/cluster/project-cluster.json)):
0 commit comments