-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS Security Groups and Roles #377
Comments
Hello @ShafiKhan18 - you have a good question. Currently the CloudFormation template performs all the steps including IAM Roles and Security Groups. We understand this creates a challenge in many organizations where there is enterprise control over specific AWS resources. We've been talking about this a lot recently on the Herd team and are partway through an initiative to make the CloudFormation template much more flexible. We are refactoring so there are options to reference existing Roles and Security Groups -- or to have Herd create them. And we will deliver at the same time some documentation indicating required characteristics (eg what ports need to be open for the SGs). We are planning to release this in early June. The immediate workaround is to go into the CloudFormation template and modify it to use Roles and Security Groups that your enterprise has created. Let me know if you have more questions on this topic. If you have specific questions about the internals of the CloudFormation template, we can have an engineer answer them. Also we are always happy to have more open-ended discussion about what you are trying to accomplish so we can help with guidance or answering questions. |
Hi,
Thank you for taking the time to respond to my question.
I like the workaround and would like to work with your engineer as I am new to Herd and Cloud. I don’t want to screw up our DEV work.
Please feel free to reach out to me on 508-202-8884 anytime for a conversation on this.
Thanks,
Shafi.
Ultimately, poor data quality is like dirt on the windshield. You may be able to drive for a long time with slowly degrading vision, but at some point you either have to stop and clear the windshield or risk everything.
-Ken Orr, The Cutter Consortium
From: Nate Weisz [mailto:notifications@github.com]
Sent: Wednesday, April 18, 2018 2:21 PM
To: FINRAOS/herd
Cc: Syed, Shafiullah Khan; Mention
Subject: Re: [FINRAOS/herd] AWS Security Groups and Roles (#377)
Hello @ShafiKhan18<https://github.com/ShafiKhan18> - you have a good question.
Currently the CloudFormation template performs all the steps including IAM Roles and Security Groups. We understand this creates a challenge in many organizations where there is enterprise control over specific AWS resources.
We've been talking about this a lot recently on the Herd team and are partway through an initiative to make the CloudFormation template much more flexible. We are refactoring so there are options to reference existing Roles and Security Groups -- or to have Herd create them. And we will deliver at the same time some documentation indicating required characteristics (eg what ports need to be open for the SGs). We are planning to release this in early June.
The immediate workaround is to go into the CloudFormation template and modify it to use Roles and Security Groups that your enterprise has created.
Let me know if you have more questions on this topic. If you have specific questions about the internals of the CloudFormation template, we can have an engineer answer them.
Also we are always happy to have more open-ended discussion about what you are trying to accomplish so we can help with guidance or answering questions.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub<#377 (comment)>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AksRkD-AbD0DtAtO5wJytX7tXOaSgD6lks5tp4QdgaJpZM4TY1WY>.
|
Will you be able to provide any assistance?
Ultimately, poor data quality is like dirt on the windshield. You may be able to drive for a long time with slowly degrading vision, but at some point you either have to stop and clear the windshield or risk everything.
-Ken Orr, The Cutter Consortium
From: Syed, Shafiullah Khan
Sent: Wednesday, April 18, 2018 2:47 PM
To: FINRAOS/herd; FINRAOS/herd
Cc: Mention
Subject: RE: [FINRAOS/herd] AWS Security Groups and Roles (#377)
Hi,
Thank you for taking the time to respond to my question.
I like the workaround and would like to work with your engineer as I am new to Herd and Cloud. I don’t want to screw up our DEV work.
Please feel free to reach out to me on 508-202-8884 anytime for a conversation on this.
Thanks,
Shafi.
Ultimately, poor data quality is like dirt on the windshield. You may be able to drive for a long time with slowly degrading vision, but at some point you either have to stop and clear the windshield or risk everything.
-Ken Orr, The Cutter Consortium
From: Nate Weisz [mailto:notifications@github.com]
Sent: Wednesday, April 18, 2018 2:21 PM
To: FINRAOS/herd
Cc: Syed, Shafiullah Khan; Mention
Subject: Re: [FINRAOS/herd] AWS Security Groups and Roles (#377)
Hello @ShafiKhan18<https://github.com/ShafiKhan18> - you have a good question.
Currently the CloudFormation template performs all the steps including IAM Roles and Security Groups. We understand this creates a challenge in many organizations where there is enterprise control over specific AWS resources.
We've been talking about this a lot recently on the Herd team and are partway through an initiative to make the CloudFormation template much more flexible. We are refactoring so there are options to reference existing Roles and Security Groups -- or to have Herd create them. And we will deliver at the same time some documentation indicating required characteristics (eg what ports need to be open for the SGs). We are planning to release this in early June.
The immediate workaround is to go into the CloudFormation template and modify it to use Roles and Security Groups that your enterprise has created.
Let me know if you have more questions on this topic. If you have specific questions about the internals of the CloudFormation template, we can have an engineer answer them.
Also we are always happy to have more open-ended discussion about what you are trying to accomplish so we can help with guidance or answering questions.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub<#377 (comment)>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AksRkD-AbD0DtAtO5wJytX7tXOaSgD6lks5tp4QdgaJpZM4TY1WY>.
|
* commit '1f9643b543aae08ac4753544cefdbd0a0304b8a1': DM-11004: Manage Document Schema in Format DM-11004: Manage Document Schema in Format DM-11004: Manage Document Schema in Format DM-11004: Manage Document Schema in Format DM-11004: Manage Document Schema in Format
We are trying to evaluate Herd for data management needs on AWS. I am trying to do a demo install on AWS and the cloudformation template fails at the IAM
CreateRole User step as my ID does not have the privilege to do so. Is there a way we can work around this step by having the template use an existing AWS
Security group and role I can have our cloud infrastructure team create before going through the cloud formation. Being a financial services organization,
there are restrictions in place due to which I am asking if this is a possibility. Please let me know.
Thanks,
Shafi.
The text was updated successfully, but these errors were encountered: