1 Answer
- Newest
- Most votes
- Most comments
1
Hello.
Try creating an IAM role named "AWSCloudFormationStackSetAdministrationRole" as described in the documentation below.
You also need to create an IAM role named "AWSCloudFormationStackSetExecutionRole" in the target account.
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html#stacksets-prereqs-accountsetup
Or specify the ARN of "AWSOrgMngtAcctCloudFormationStackSetAdministrationRole" in "AdministrationRoleARN".
https://docs.aws.amazon.com/ja_jp/AWSCloudFormation/latest/UserGuide/aws-resource-cloudformation-stackset.html
WLOUAcctStackSet:
Type: AWS::CloudFormation::StackSet
DeletionPolicy: Delete
DependsOn: [WLOUsAcct]
Properties:
AdministrationRoleARN: AWSOrgMngtAcctCloudFormationStackSetAdministrationRole-ARN # Add
StackSetName: WLOUAcctStackSet
.....
Relevant content
- asked a year ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 24 days ago