You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: reference-artifacts/Custom-Scripts/lza-upgrade/CHANGELOG.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,17 @@ All notable changes to this project will be documented in this file.
5
5
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
6
6
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
7
8
+
## [1.6.1] - 2025-02-14
9
+
10
+
### Added
11
+
- feat(tools): Add detection of modified route entries in network drift detection script
12
+
- feat(convert-config): Handle conversion of VPC Flow Logs log group pattern in dynamic partition
13
+
14
+
### Changed
15
+
- fix(resource-mapping): Use pagination to list stacks and improve nested stacks lookup
16
+
- fix(convert-config): Removed inaccurate warnings for SSM Document sharing with nested OUs
17
+
- fix(asea-prep): asea-prep command now disables ASEA EventBridge rule that adds the subscription filters to new Log Groups. A new rule is created by LZA during the installation.
Copy file name to clipboardExpand all lines: src/mkdocs/docs/lza-upgrade/faq.md
+20-1Lines changed: 20 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,4 +65,23 @@ logging:
65
65
66
66
```
67
67
68
-
This is because for upgraded environment, there is already an existing organizational trail configured by ASEA or ControlTower that will continue to be used. We don't recommend changing this to `true` as this will instruct LZA to create a new trail in addition to the existing one created by ASEA.
68
+
This is because for upgraded environment, there is already an existing organizational trail configured by ASEA or ControlTower that will continue to be used. We don't recommend changing this to `true` as this will instruct LZA to create a new trail in addition to the existing one created by ASEA.
69
+
70
+
## Which Service Quotas should be monitored for the upgrade?
71
+
72
+
Depending on your configuration, the LZA installation can create over 500 IAM Roles in each account. If you already have several IAM Roles in your accounts and using the default limit of 1000, the installation could be blocked by this service quota.
73
+
74
+
You can make an AWS Config query using the organization aggregator to list the current number of IAM Roles in each account, and request a limit increase proactively.
75
+
```
76
+
SELECT
77
+
accountId,
78
+
COUNT(*)
79
+
WHERE
80
+
resourceType = 'AWS::IAM::Role'
81
+
GROUP BY
82
+
accountId
83
+
ORDER BY
84
+
COUNT(*) DESC
85
+
```
86
+
87
+
For more information about LZA related Quotas, refer to the [LZA Documentation about Quotas](https://docs.aws.amazon.com/solutions/latest/landing-zone-accelerator-on-aws/quotas.html) as well as this note about [CodeBuild concurrency](https://docs.aws.amazon.com/solutions/latest/landing-zone-accelerator-on-aws/prerequisites.html#update-codebuild-conncurrency-quota)
Copy file name to clipboardExpand all lines: src/mkdocs/docs/lza-upgrade/known-issues.md
+23-17Lines changed: 23 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,45 +44,51 @@ ASEA-NetworkAssociationsStack-xxxxxx-ca-central-1 failed: Error: The stack named
44
44
## Landing Zone Accelerator known issues
45
45
The following issues will not prevent a successful upgrade from ASEA to LZA, but can impact functionalities and operations in the upgraded Landing Zone.
46
46
47
-
### Error adding a new route targeting firewall instance
48
47
49
-
**Description:** After a successful upgrade, you try to add in `network-config.yaml` a route entry that targets ENI 0 of a firewall appliance using the lookup variable `${ACCEL_LOOKUP::EC2:ENI_0:Firewall_azA:Id}`
48
+
### Removal of interface endpoints fails in ImportAseaResources stage
50
49
51
-
**Symptom or error message:** Error in the NetworkAssociationsStack after adding a route targeting ENI 0 of a firewall appliance.
50
+
**Description:** Failure when attempting to remove an interface endpoint that was deployed by ASEA prior to LZA upgrade.
51
+
52
+
**Symptom or error message:** Failure in ImportAseaResources
52
53
53
54
```
54
-
Resource handler returned message: "Invalid id: "${ACCEL_LOOKUP::EC2:ENI_0:Firewall_azA:Id}" (expecting "eni-...")
55
+
ASEA-SharedNetwork-Phase2-VpcEndpoints1 failed: Error [ValidationError]: Template format error: Unresolved resource dependencies [SsmParamEndpointVpccodecommitDns] in the Resources block of the template
55
56
```
56
57
57
58
**Resolution or workaround:** A fix will be available in a future version of LZA.
58
59
59
60
60
-
### Some AWS Config Rules do not evaluate after the upgrade
61
+
### Resources are not deleted after being removed from configuration file
61
62
62
-
**Description:**Some AWS Config Rules deployed by LZA do not evaluate (i.e Last successful detective evaluation appears as 'Not Available' in the console). The equivalent ASEA Config Rule evaluates correctly.
63
+
**Description:**You attempt to remove a resource that was deployed by ASEA from the LZA configuration file and it is not removed after a successful LZA pipeline run.
63
64
64
-
**Symptom or error message:** The scope of changes of Config Rule is set to an empty list of Resource types instead of scoped to **All changes** as in ASEA.
65
+
**Symptom or error message:** The LZA pipeline runs with success, but the resource is not deleted.
65
66
66
-
**Resolution or workaround:**A fix will be available in a future version of LZA. Manually changing the Scope of changes to "All resources" can be a short-term remediation. Alternatively you can opt-out of removing the ASEA Config Rules in the post-upgrade phase. (this will result in duplicate rules being evaluated)
67
+
**Resolution or workaround:**Not all ASEA resources support deletion through the LZA configuration and pipeline. Review the [ASEA Resource Handlers](./asea-resource-handlers.md) page for the current state of supported handlers.
67
68
69
+
# Fixed Issues
68
70
69
-
### Removal of interface endpoints fails in ImportAseaResources stage
71
+
##Fixed in LZA v1.11.1
70
72
71
-
**Description:** Failure when attempting to remove an interface endpoint that was deployed by ASEA prior to LZA upgrade.
73
+
The following issued were fixed as part of LZA v1.11.1 release.
72
74
73
-
**Symptom or error message:** Failure in ImportAseaResources
75
+
### Error adding a new route targeting firewall instance
76
+
77
+
**Description:** After a successful upgrade, you try to add in `network-config.yaml` a route entry that targets ENI 0 of a firewall appliance using the lookup variable `${ACCEL_LOOKUP::EC2:ENI_0:Firewall_azA:Id}`
78
+
79
+
**Symptom or error message:** Error in the NetworkAssociationsStack after adding a route targeting ENI 0 of a firewall appliance.
74
80
75
81
```
76
-
ASEA-SharedNetwork-Phase2-VpcEndpoints1 failed: Error [ValidationError]: Template format error: Unresolved resource dependencies [SsmParamEndpointVpccodecommitDns] in the Resources block of the template
82
+
Resource handler returned message: "Invalid id: "${ACCEL_LOOKUP::EC2:ENI_0:Firewall_azA:Id}" (expecting "eni-...")
77
83
```
78
84
79
-
**Resolution or workaround:**A fix will be available in a future version of LZA.
85
+
**Resolution or workaround:**Fixed in LZA v1.11.1
80
86
81
87
82
-
### Resources are not deleted after being removed from configuration file
88
+
### Some AWS Config Rules do not evaluate after the upgrade
83
89
84
-
**Description:**You attempt to remove a resource that was deployed by ASEA from the LZA configuration file and it is not removed after a successful LZA pipeline run.
90
+
**Description:**Some AWS Config Rules deployed by LZA do not evaluate (i.e Last successful detective evaluation appears as 'Not Available' in the console). The equivalent ASEA Config Rule evaluates correctly.
85
91
86
-
**Symptom or error message:** The LZA pipeline runs with success, but the resource is not deleted.
92
+
**Symptom or error message:** The scope of changes of Config Rule is set to an empty list of Resource types instead of scoped to **All changes** as in ASEA.
87
93
88
-
**Resolution or workaround:**Not all ASEA resources support deletion through the LZA configuration and pipeline. Review the [ASEA Resource Handlers](./asea-resource-handlers.md) page for the current state of supported handlers.
Copy file name to clipboardExpand all lines: src/mkdocs/docs/lza-upgrade/preparation/prereq-config.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,7 @@
8
8
- You can run the scripts from your local workstation. If you are filtering egress traffic from your corporate network you need to ensure [outbound connectivity to AWS service endpoints](../troubleshooting.md#network-timeout-or-connectivity-issue-running-the-upgrade-tool).
9
9
- You will need Git, AWS CLI, NodeJS and Yarn installed.
10
10
- We highly recommend having appropriate AWS Support plans on all AWS Accounts of your landing zone. For any issues encountered during the upgrade process you need to open a support case to get assistance and exchange relevant information with AWS staff. At a minimum Developer support is needed on the management account and core landing zones accounts (Logging, Security, Networking and Perimeter) to troubleshoot any cross-account issues. Business support is the minimum recommended tier if you have production workloads in AWS
11
+
- Monitor and manage your service quotas. See the FAQ [Which Service Quotas should be monitored for the upgrade?](../faq.md#which-service-quotas-should-be-monitored-for-the-upgrade)
11
12
- Upgrading your landing zone from ASEA to LZA requires advanced knowledge of configuring and operating ASEA and LZA landing zones. This operation should be led by your most-experienced resources responsible for your current landing zone operations. Review all the documentation in this upgrade guide and Landing Zone Accelerator implementation guide.
Workaround: Increase the **Number of retries** in the SDK configuration.
62
+
1. Go to CodeBuild console and locate the `ASEA-ToolkitProject` project
63
+
2. Edit the project, in the Environment variables section:
64
+
a) add a new environment variable named `NUMBER_OF_RETRIES`
65
+
b) set the value of the a higher value (default: 12)
66
+
3. Release the accelerator pipeline again
67
+
68
+
53
69
## Use of opt-in region - "InvalidClientTokenId: The security token included in the request is invalid"
54
70
If an AWS opt-in region (e.g. ca-west-1) is enabled in your ASEA environment you need to change the region compatibility of STS session tokens to be valid in all AWS Regions.
55
71
@@ -105,4 +121,14 @@ You encounter the following error during an LZA pipeline run after adding an opt
105
121
106
122
> The stack named ASEA-SecurityStack-<account>-ca-west-1 failed creation, it may need to be manually deleted from the AWS console: ROLLBACK_COMPLETE: Received response status [FAILED] from custom resource. Message returned: BadRequestException: The request failed because the GuardDuty service principal does not have permission to the KMS key or the resource specified by the destinationArn parameter. Refer to https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_exportfindings.html
107
123
108
-
See information about the [Central Logging bucket CMK](./comparison/kms.md#central-logging-bucket) for more details and how to fix the issue.
124
+
See information about the [Central Logging bucket CMK](./comparison/kms.md#central-logging-bucket) for more details and how to fix the issue.
125
+
126
+
## Cannot exceed quota for RolesPerAccount error
127
+
You encounter an error similar to this one during LZA installation:
128
+
129
+
```
130
+
Deployment failed: Error: The stack named ASEA-SecurityResourcesStack-<account>-<region> failed creation, it may need to be manually deleted from the AWS console: ROLLBACK_COMPLETE: Resource handler returned message: "Cannot exceed quota for RolesPerAccount: 1000 (Service: Iam, Status Code: 409, Request ID: )" (RequestToken: , HandlerErrorCode: ServiceLimitExceeded)
131
+
132
+
```
133
+
134
+
You need to request a limit increase for the RolesPerAccount Quota. See the FAQ [Which Service Quotas should be monitored for the upgrade?](./faq.md#which-service-quotas-should-be-monitored-for-the-upgrade)
0 commit comments