All Projects → MattTunny → AWS-Transit-Gateway-Demo-MultiAccount

MattTunny / AWS-Transit-Gateway-Demo-MultiAccount

Licence: MIT license
Cloudformation template to set up AWS Transit Gateway with Multi Accounts in Organizations

Programming Languages

python
139335 projects - #7 most used programming language
CSS
56736 projects

Projects that are alternatives of or similar to AWS-Transit-Gateway-Demo-MultiAccount

open-bus
🚌 Analysing Israel's public transport data
Stars: ✭ 65 (+225%)
Mutual labels:  transit
cfngoat
Cfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 70 (+250%)
Mutual labels:  cloudformation
SecretsManagerwithCloudFormation
Implements a Lambda-backed CloudFormation Custom Resource for AWS Secrets Manager
Stars: ✭ 20 (+0%)
Mutual labels:  cloudformation
cloudformation-coverage-roadmap
The AWS CloudFormation Public Coverage Roadmap
Stars: ✭ 993 (+4865%)
Mutual labels:  cloudformation
cim
CIM takes the pain out of Infrastructure as Code and CloudFormation
Stars: ✭ 51 (+155%)
Mutual labels:  cloudformation
AutoSpotting
Saves up to 90% of AWS EC2 costs by automating the use of spot instances on existing AutoScaling groups. Installs in minutes using CloudFormation or Terraform. Convenient to deploy at scale using StackSets. Uses tagging to avoid launch configuration changes. Automated spot termination handling. Reliable fallback to on-demand instances.
Stars: ✭ 2,058 (+10190%)
Mutual labels:  cloudformation
cfsec
Static analysis for CloudFormation templates to identify common misconfiguration
Stars: ✭ 53 (+165%)
Mutual labels:  cloudformation
subwayclock
Display clock for NYC subways
Stars: ✭ 29 (+45%)
Mutual labels:  transit
aem-aws-stack-builder
Adobe Experience Manager (AEM) infrastructure builder on AWS using CloudFormation stacks
Stars: ✭ 36 (+80%)
Mutual labels:  cloudformation
iidy
iidy (Is it done yet?) -- CloudFormation with Confidence
Stars: ✭ 46 (+130%)
Mutual labels:  cloudformation
terraform-aws-base-networking
Terraform module for building base networking in AWS
Stars: ✭ 15 (-25%)
Mutual labels:  vpc
autoscaling-ec2-gitlab-runners-fargate
Autoscaling EC2 GitLab Runners Spawned by Fargate
Stars: ✭ 20 (+0%)
Mutual labels:  cloudformation
aws-solutions-architect-associate-certificate
Note to pass the AWS Solutions Architect Associate Exam
Stars: ✭ 58 (+190%)
Mutual labels:  vpc
cdkgoat
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 27 (+35%)
Mutual labels:  cloudformation
transitland-atlas
an open directory of mobility feeds and operators — powers both Transitland v1 and v2
Stars: ✭ 55 (+175%)
Mutual labels:  transit
terraform-aws-secure-vpc
A terraform module to create a VPC with secure default configurations.
Stars: ✭ 13 (-35%)
Mutual labels:  vpc
stackit
Cross-platform CloudFormation CLI tool for easy synchronous and idempotent stack updates
Stars: ✭ 37 (+85%)
Mutual labels:  cloudformation
serverless-dynamodb-ttl
⚡️ Serverless Plugin to set DynamoDB TTL
Stars: ✭ 16 (-20%)
Mutual labels:  cloudformation
monitoring-jump-start
Monitor AWS resources with ease
Stars: ✭ 67 (+235%)
Mutual labels:  cloudformation
transitime
TheTransitClock real-time transit information system
Stars: ✭ 60 (+200%)
Mutual labels:  transit

AWS Transit GateWay Demo with Session Manager between Multi Accounts

These cloudformation templates will create a VPC with Transit Gatway and share it between 2 accounts. SSM is already configured so its easy to test network connectivity.


Pre-reqs

  • Organizations needs to be abled with ALL features turn on (run python script 'enable-all-features.py' to enable)
  • 2 AWS Accounts.
  • 1 s3 bucket for zip files, Custom Lambda Resources are required as cloudformation/lambda API havn't been updated to include TransitGateway or RAM yet.

Demo

This will create everything for you, if you running cloudformation from the browser use seperate browsers so you can tab between.

  • From Account 1 (Org Master), Copy the 2 zip files into you're s3 bucket (share-resources.zip & update-route-table.zip)

  • Fill in the 2 Paramaters in 'account-1.yaml': s3 Bucket with zip files & 2nd AWS Account Id. Rest can be left as is

  • Run Account-1.yaml cloudformation template

aws cloudformation package --s3-bucket randombucket --template-file account-1.yaml --output-template-file output1.yaml
aws cloudformation deploy --template-file output1.yaml --stack-name 'TransitDemo' --capabilities CAPABILITY_IAM
  • Once Stack has completed, get the TransitGateWay Output from Cloudformation (TransitGateWay Id) and add it to Paramater in 'account-2.yaml'

  • Run Account-2.yaml cloudformation template for account-2

aws cloudformation package --s3-bucket randombucket --template-file account-2.yaml --output-template-file output2.yaml --profile account2
aws cloudformation deploy --template-file output2.yaml --stack-name 'TransitDemo' --capabilities CAPABILITY_IAM --profile account2
  • You should now have connectivity between 2 accounts. SSM Session Manager is configured in this template so if you have upgraded SSM agent installed locally you can test:
aws ssm start-session --target 'i-09dd3dd5b22d7f123'

Cleanup

Remember to delete the stacks when finished

aws cloudformation delete-stack --stack-name 'TransitDemo'
aws cloudformation delete-stack --stack-name 'TransitDemo' --profile account2
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].