-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stack Creation Errors #12
Comments
FYI: I've seen this issue too when specifying existing security group, VPC and subnet. Today I ran the cloudformation stack (link in readme) without specifying security group, VPC and subnet, (and setting multiple-AZ to N) and did NOT get that error. |
Thanks for the confirmation. I don't want to have a whole new VPC setup. Just curious if your willing would you be able to provide me the security rules it generated? |
Thanks for reaching out and sorry about the delay responding to your first comment! I'll take look and see what's going on with the "bring your own VPC" option |
Thanks Brian! |
Hi @scorpiontx-awhelan the security group that was created is the default SG for the also created VPC. The inbound rules for the SG reference itself. So if the security group id is sg-123456 the one in-bound rule is Security Group Rule ID=sgr-xxxxxx, Type=All traffic, Protocol=All, Port Range=All, Source=sg-123456. Note that the source references itself. The outbound rule is wide open as shown below: |
Thanks, I'm thinking it's not likely due tot he SG at this point. |
Wondering if anyone has found a solution to this issue? I am unable in my account to create a new VPC, but am getting the error at the top, which I am not sure how to troubleshoot. |
My bring-your-own VPC error has been resolved in the latest version. |
great news! |
Only issue is that I don't have a launch template created. Is there recommended launch template or AMI for these compute environments? |
Hello Again,
Getting some additional stack creation errors, any thoughts? Not sure if related to security group again or not, do you have any general guidance on the minimal entries needed within the security group?
-The following resource(s) failed to create: [GetAWSServiceRoleForEC2Spot, Container, GetAWSServiceRoleForEC2SpotFleet]. Rollback requested by user.
Thank You
The text was updated successfully, but these errors were encountered: