You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/faq/faq.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -327,6 +327,7 @@ The Accelerator provides 3 mechanisms to enable utilizing certificates with ALB'
327
327
328
328
- this mechanism allows a customer to generate new public certificates directly in ACM
329
329
- both `DNS` and `EMAIL` validation mechanisms are supported (DNS recommended)
330
+
- this requires a **_Public_** DNS zone be properly configured to validate you are legally entitled to issue certificates for the domain
330
331
- this will also create a certificate in ACM and a secret in secrets manager named `accelerator/certificates/My-Cert` in the specified AWS account(s), which points to the newly imported certificates ARN
331
332
- this mechanism should NOT be used on new installs, skip certificate and ALB deployment during initial deployment (removing them from the config file) and simply add on a subsequent state machine execution
332
333
- Process:
@@ -336,7 +337,7 @@ The Accelerator provides 3 mechanisms to enable utilizing certificates with ALB'
336
337
- during deployment, go to the AWS account in question, open ACM and the newly requested certificate. Document the authorization CNAME record required to validate certificate generation
337
338
- add the CNAME record to the zone in bullet 1 (in Route53 or 3rd party DNS provider) (documented [here](https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html))
338
339
- after a few minutes the certificate will validate and switch to `Issued` status
339
-
- Accelerator phase 1 will finish (assuming the phase didn't time-out)
340
+
- Accelerator phase 1 will finish (as long as the certificate is validated before the Phase 1 credentials time-out after 60-minutes)
340
341
- the ALB will deploy in a later phase with the specified certificate
341
342
342
343
-**Method 3** - Manually generate a certificate in ACM
Copy file name to clipboardExpand all lines: docs/installation/multi-file-config-capabilities.md
+33-32Lines changed: 33 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,11 +27,12 @@
27
27
- The loadAcceleratorConfig functionality should no longer assume config.json as the config filename in the config repo and/or S3, instead it should look for config.yaml and config.json
28
28
- Check for the existence of config.yaml and config.json (initially in S3, but also in CodeCommit on future executions)
29
29
- If both files exist, fail with an error message
30
-
- Infer the file type from the extension, and parse accordingly
30
+
-**Infer the file type from the extension, and parse accordingly**
31
31
- Any other failure should also be an error, fail with an error message
32
32
- The accelerator will continue to use JSON formatting internally, if a yaml file is supplied, we are simply converting it to JSON for use by the Accelerator
33
-
- All examples throughout this document use config.yaml as the example, but also apply to JSON
33
+
- All examples throughout this document use config.json as the example, but also apply to YAML
34
34
- Both JSON and YAML input files will be equally supported
35
+
- Only one file format is supported across all config files, either JSON or YAML, customers can NOT mix YAML and JSON file formats
35
36
36
37
### Steps For File Split:
37
38
@@ -40,15 +41,15 @@
40
41
```
41
42
{
42
43
"core": {
43
-
"__LOAD": "ous/core.yaml"
44
+
"__LOAD": "ous/core.json"
44
45
}
45
46
}
46
47
```
47
48
48
49
Note that while we will provide sensible examples, there is no prescriptive requirement for file organization within a customer's configuration, customers can use the feature to break-out sections as is most effective for their deployment. Breaking out large repeatable sections like security groups is a good example and could be included off the main file, an account file, or off an ou file:
- When creating new accounts (inserting into config file):
116
117
- if the update is not going to make the file larger than 2000 lines, insert the new account into the config file `"workloadaccounts-param-filename"`
117
118
- if the insert will push the file over 2000 lines:
118
-
- create the next unused filename for the given prefix in Code Commit (`{"workloadaccounts-prefix"}{"workloadaccounts-suffix"}.{customer file format}`), i.e. `"accounts/more-accounts3.yaml"`
119
+
- create the next unused filename for the given prefix in Code Commit (`{"workloadaccounts-prefix"}{"workloadaccounts-suffix"}.{customer file format}`), i.e. `"accounts/more-accounts3.json"`
119
120
- insert the new account into the new file in it's entirety
120
121
- update `"workloadaccounts-param-filename"` to: `{"workloadaccounts-prefix"}{"workloadaccounts-suffix"}.{customer file format}`
121
122
- add a new load stmt to the workload-accounts section of the config file with the name `{"workloadaccounts-prefix"}{"workloadaccounts-suffix"}.{customer file format}`
@@ -128,40 +129,40 @@ The entire main config file could be reduced to this:
0 commit comments