💾 Archived View for cfdocs.wetterberg.nu › stacksets-prereqs.gemini captured on 2024-05-12 at 16:01:14. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

Prerequisites for stack set operations

Search

Because stack sets perform stack operations across multiple accounts, before you can create your first stack set you need the necessary permissions defined in your AWS accounts.

To set up the required permissions for creating a stack set with *self\-managed* permissions, see Performing stack set operations involving regions that are disabled by default and Grant self\-managed permissions.

Grant self-managed permissions

To set up the required permissions for creating a stack set with *service\-managed* permissions, see Performing stack set operations involving regions that are disabled by default and Enable trusted access with AWS Organizations.

Enable trusted access with AWS Organizations

Performing stack set operations involving regions that are disabled by default

AWS Regions introduced after March 20, 2019, such as Asia Pacific (Hong Kong), are disabled by default. You must enable these Regions for your account(s) before you can use them. Because of this, consider the following before performing stack set operations involving accounts in Regions that are disabled by default:

Be aware that during stack set operations, administrator and target accounts exchange metadata regarding the accounts themselves, as well as the stack set and stack set instances involved.

In addition, if you disable a Region that contains an account in which stack set instances reside, you are responsible for deleting any such instances or resources, if desired. In addition, be aware that metadata regarding the target account in the disabled Region will be retained in the administrator account.

For more information about enabling and disabling regions, see Managing AWS Regions in the *AWS General Reference*.

Managing AWS Regions

Grant self-managed permissions

Enable trusted access with AWS Organizations