Add a flag to CloudFormation for IAM operations
This error signifies that a CloudFormation template you’re working has IAM sources in it. AWS lets and makes you acknowledge that by including a particular flag while you’re working an AWS CLI cloudformation deploy, create, or replace command.
In my case this:
aws cloudformation deploy
--profile $profile
--stack-name $groupname
--template-file cfn/group_batch_job_admins.yaml
--parameter-overrides
groupnameparam=$groupname
Wanted to change into this:
aws cloudformation deploy
--profile $profile
--capabilities CAPABILITY_NAMED_IAM
--stack-name $groupname
--template-file cfn/group_batch_job_admins.yaml
--parameter-overrides
groupnameparam=$groupname
You could find this flag within the documentation right here:
Wait. How come AWS can use underscores in variable names and we will’t?
However I digress.
Teri Radichel
Should you favored this story please clap and comply with:
Medium: Teri Radichel or E-mail Record: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests companies through LinkedIn: Teri Radichel or IANS Analysis
© 2nd Sight Lab 2022
____________________________________________
Writer:
Cybersecurity for Executives within the Age of Cloud on Amazon
Want Cloud Safety Coaching? 2nd Sight Lab Cloud Safety Coaching
Is your cloud safe? Rent 2nd Sight Lab for a penetration take a look at or safety evaluation.
Have a Cybersecurity or Cloud Safety Query? Ask Teri Radichel by scheduling a name with IANS Analysis.
Cybersecurity & Cloud Safety Assets by Teri Radichel: Cybersecurity and Cloud safety lessons, articles, white papers, displays, and podcasts