我试图通过安全帐户中的默认管理(全部是terraform)在组织级别启用IAM访问分析器。
在组织帐户的根目录中,我有:
"access-analyzer.amazonaws.com"
resource "aws_organizations_organization" "org" {
feature_set = "ALL"
aws_service_access_principals = [
...
"access-analyzer.amazonaws.com"
]
enabled_policy_types = [
"SERVICE_CONTROL_POLICY"
]
}aws_organizations_delegated_administrator_for、安全帐户和aws_organizations_delegated_administratorresource "aws_organizations_delegated_administrator" "example" {
account_id = var.security_account
service_principal = "access-analyzer.amazonaws.com"
}在安全帐户中,我启用了access-analyzer,并将type设置为organization
resource "aws_accessanalyzer_analyzer" "accessanalyzer" {
analyzer_name = "test"
type = "ORGANIZATION"
}当它运行时,我会得到错误:
Error: error creating Access Analyzer Analyzer (openc): ConflictException: Access Analyzer Service Linked Role is not in the organizational management account
│ {
│ RespMetadata: {
│ StatusCode: 409,
│ RequestID: "1c597ce0-4c59-4115-89aa-437cdc8156d5"
│ },
│ Message_: "Access Analyzer Service Linked Role is not in the organizational management account"
│ }
│
│ with aws_accessanalyzer_analyzer.accessanalyzer,
│ on access-analyzer.tf line 1, in resource "aws_accessanalyzer_analyzer" "accessanalyzer":
│ 1: resource "aws_accessanalyzer_analyzer" "accessanalyzer" {
│
╵你知道这是怎么回事吗?我想委托管理员来解决这个问题?
发布于 2022-05-31 13:29:46
您缺少并需要在主“组织”帐户上创建"AWSServiceRoleForAccessAnalyzer“角色,最简单的方法是在主帐户上创建一个分析器,然后该角色将自动创建
https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html
然后尝试应用你的Terraform代码。
https://stackoverflow.com/questions/72302212
复制相似问题