Skip to main content
Version: 3.9.0

How to Roll Out Resoto AWS Permissions with CloudFormation

Each version of Resoto programmatically generates the specific IAM permissions it requires to collect (and optionally, manipulate) AWS resources. Manually maintaining these permissions is a tedious task, especially if you have multiple AWS accounts.

To eliminate this pain point, we provide a CloudFormation template that automatically creates a ResotoAccess role with the required permissions and a trust that allows a specified AWS account to assume this role.

The stack can be deployed in a single account, or organization-wide as a CloudFormation StackSet. In this how-to guide, we use this template to create a StackSet that deploys the ResotoAccess role to all accounts in your organization.

info

The source code can be found in the someengineering/resoto-cf GitHub repository.

note

If you prefer to deploy the StackSet yourself, the S3 URL of the template to create the ResotoAccess role is https://resotopublic.s3.amazonaws.com/cf/resoto-role.template.

Prerequisites​

This guide assumes that you have already installed Resoto.

You also need an AWS Organization that meets the prerequisites for StackSet operations.

Directions​

Deploying the StackSet​

  1. Open the AWS Organizations Console and find the Organization Unit (OU) where you want to deploy the ResotoAccess role. The role will be deployed to all accounts in this OU and all child OUs.

    The OU is the cryptic string underneath the OU name. To deploy the role to all accounts in the organization, use the Root OU (r-7h7x in the below example).

    Organization Home

  2. If you are not already in the correct account, log into the account where you want to deploy the StackSet. This account will be the account that manages the StackSet and the role that is deployed to all accounts in the organization unit.

  3. Click this button to open the Quick create stack page:

    Deploy StackSet

  4. Enter a stack name (e.g., ResotoAccess) and configure the four parameters as follows:

    ParameterDescription
    DeploymentTargetOrganizationalUnitIdsThe OU (or multiple, space-delimited OUs) where you wish to deploy the role.
    ResotoAccountIDThe account ID of the account where you have Resoto deployed. This account will be the one the Role has a trust relationship with.
    StackSetCallAsDefaults to DELEGATED_ADMIN but can be changed to SELF depending on the permissions you have in your organization and whether the account you are deploying the StackSet in is registered as a delegated administrator for your organization (recommended).
    StackSetPermissionModelDefaults to SERVICE_MANAGED but can be changed to SELF_MANAGED if you want to manage the StackSet permissions yourself. We prefer SERVICE_MANAGED as it allows us to turn on automatic deployments to accounts that we add to our organization in the future.

    Stack Configuration

  5. Click Next on both this page and the next, then click Create Stack.

    The stack will take a few minutes to deploy.

    Stack Creating

  6. In the menu to the left, click StackSets. You can see that the StackSet is being created on the Self-managed or Service-managed tab (depending on the option you chose).

    StackSet Creating

  7. After a few minutes, the StackSet will be created and begin deploying to all accounts in our organization. Reviewing the stacks in us-east-1, you should now see a new stack created by the StackSet:

    Stacks Created

    If we click it and check out its resources, you will see the ResotoAccess IAM role:

    ResotoAccess Role

    Selecting the role, you can confirm it has the correct permissions as well as a trust relationship with the account where Resoto is deployed:

    ResotoAccess Role PermissionsResotoAccess Role Trust

Configuring Resoto to Assume the ResotoAccess Role and Scrape the Organization​

  1. Open the resoto.worker configuration and locate the Aws section.

  2. Enter the role name in the Role field and check the Scrape Org checkbox.

    Depending on your organization setup, check Assume Current and Do Not Scrape Current checkboxes. They control whether Resoto should assume the role inside the account it is running in, or just collect that account with the permissions it already has. (For instance, if you deploy Resoto using Kubernetes and it is using a service account that is already using the ResotoAccess role, there would be no need to assume the same role again.)

    Resoto UI Config

  3. Save the configuration.

Further Reading​

Contact Us

Have feedback or need help? Don’t be shy—we’d love to hear from you!

 

 

 

Some Engineering Inc.