Using "iam_role" with S3 state bucket in another account #538
-
|
Hi. I'm having a heck of a time with something that I swear worked fine two days ago. Now I can't explain the failure. I'm trying to use the My My
When I run I can assume the The only thing I can come up with is https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketPolicy.html, a 405 Method Not Allowed because the identity doesn't belong to the bucket owner's account. As mentioned, I'm 99.9999% sure this was working two days ago, and after many changes and things moving around, now I can't figure out what's going on! Happy to provide more details if I'm missing some details above. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 7 replies
-
|
Did you recently update Can you try setting remote_state {
backend = "s3"
generate = {
path = "backend.tf"
if_exists = "overwrite_terragrunt"
}
config = {
bucket = "my-state-bucket"
key = "${path_relative_to_include()}/terraform.tfstate"
region = "us-east-1"
encrypt = true
dynamodb_table = "terraform-locks"
}
disable_bucket_update = true
} |
Beta Was this translation helpful? Give feedback.
-
|
@tcourtnage-tbl Hello, do you have any issues with dynamoDB cross account or you create new dynamoDB table for each account? |
Beta Was this translation helpful? Give feedback.
Did you recently update
terragruntto the latest version? This may be an issue with the introduction of the bucket state syncing feature in Terragrunt.Can you try setting
disable_bucket_update = trueon theremote_stateblock and see if that avoids the issue? E.g.: