Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stack Creation Errors #12

Open
scorpiontx-awhelan opened this issue May 4, 2023 · 10 comments
Open

Stack Creation Errors #12

scorpiontx-awhelan opened this issue May 4, 2023 · 10 comments

Comments

@scorpiontx-awhelan
Copy link

Hello Again,
Getting some additional stack creation errors, any thoughts? Not sure if related to security group again or not, do you have any general guidance on the minimal entries needed within the security group?

  • CloudFormation did not receive a response from your Custom Resource. Please check your logs for requestId [dc9341b8-fcd6-4bda-808c-78c1e243c51e]. If you are using the Python cfn-response module, you may need to update your Lambda function code so that CloudFormation can attach the updated version.

-The following resource(s) failed to create: [GetAWSServiceRoleForEC2Spot, Container, GetAWSServiceRoleForEC2SpotFleet]. Rollback requested by user.

Thank You

@jmtroywork
Copy link

FYI: I've seen this issue too when specifying existing security group, VPC and subnet. Today I ran the cloudformation stack (link in readme) without specifying security group, VPC and subnet, (and setting multiple-AZ to N) and did NOT get that error.

@scorpiontx-awhelan
Copy link
Author

Thanks for the confirmation. I don't want to have a whole new VPC setup. Just curious if your willing would you be able to provide me the security rules it generated?

@brianloyal
Copy link
Contributor

Thanks for reaching out and sorry about the delay responding to your first comment! I'll take look and see what's going on with the "bring your own VPC" option

@scorpiontx-awhelan
Copy link
Author

Thanks Brian!

@jmtroywork
Copy link

Hi @scorpiontx-awhelan the security group that was created is the default SG for the also created VPC. The inbound rules for the SG reference itself. So if the security group id is sg-123456 the one in-bound rule is Security Group Rule ID=sgr-xxxxxx, Type=All traffic, Protocol=All, Port Range=All, Source=sg-123456. Note that the source references itself. The outbound rule is wide open as shown below:
image

@scorpiontx-awhelan
Copy link
Author

Thanks, I'm thinking it's not likely due tot he SG at this point.

@kyleoconnell-CDC
Copy link

Wondering if anyone has found a solution to this issue? I am unable in my account to create a new VPC, but am getting the error at the top, which I am not sure how to troubleshoot.

@kyleoconnell-CDC
Copy link

My bring-your-own VPC error has been resolved in the latest version.

@scorpiontx-awhelan
Copy link
Author

great news!

@kyleoconnell-CDC
Copy link

Only issue is that I don't have a launch template created. Is there recommended launch template or AMI for these compute environments?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants