You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This pull request updates the documentation for creating a data plane in
a Bring Your Own Cloud (BYOC) setup. The changes include enhancements to
the CloudFormation template, updates to AWS permissions, and adjustments
to GCP configurations, ensuring improved flexibility and clarity for
users.
### AWS CloudFormation Template Enhancements:
* Changed the syntax from `bash` to `yaml` and added a new `ExternalId`
parameter for trust relationships. This parameter allows customization
with validation rules for length and allowed characters.
* Updated `sts:ExternalId` in the trust relationship to reference the
newly added `ExternalId` parameter instead of the hardcoded value.
### AWS Permissions Updates:
* Added permissions for additional AWS services, including
`ec2:DescribeVpcEndpoints`, `rds:DescribeDBInstances`,
`ec2:CreateSecurityGroup`, and `iam:UpdateAssumeRolePolicy`. These
changes expand the scope of supported operations.
[[1]](diffhunk://#diff-4e65397b3c1d1f1985ff681841ddc06fbe6766c099cc5f84f94a709b5c1d55deR107-R108)
[[2]](diffhunk://#diff-4e65397b3c1d1f1985ff681841ddc06fbe6766c099cc5f84f94a709b5c1d55deR132-R134)
[[3]](diffhunk://#diff-4e65397b3c1d1f1985ff681841ddc06fbe6766c099cc5f84f94a709b5c1d55deR182-R190)
* Included `rds.amazonaws.com` in the list of trusted service principals
and added `rds:*` to the allowed actions, enabling support for
RDS-related operations.
### GCP Configuration Adjustments:
* Added `sqladmin.googleapis.com` and `servicenetworking.googleapis.com`
to the list of enabled APIs for GCP projects.
* Granted the `roles/cloudsql.admin` IAM role to the service account for
managing Cloud SQL resources.
### Documentation Updates:
* Clarified the requirements for sharing the `ExternalId` parameter with
Hasura, emphasizing its importance when customized.
* Expanded the valid range for VPC CIDR blocks from `/16` to `/16-/19`
for both AWS and GCP, providing more flexibility in network
configurations.
[[1]](diffhunk://#diff-4e65397b3c1d1f1985ff681841ddc06fbe6766c099cc5f84f94a709b5c1d55deL311-R343)
[[2]](diffhunk://#diff-4e65397b3c1d1f1985ff681841ddc06fbe6766c099cc5f84f94a709b5c1d55deL406-R444)
@@ -298,6 +323,13 @@ Share the following with the Hasura team:
298
323
299
324
- (Required) Role ARN (From output above)
300
325
- (Required) AWS Region
326
+
- (Optional) External ID
327
+
- The external ID used in the trust relationship between your AWS account and Hasura's AWS account
328
+
- This is the value you specified for the `ExternalId` parameter in the CloudFormation template
329
+
- If not specified, the default value "hasura-cloud" will be used
330
+
- Must have a minimum of 2 characters and a maximum of 1,224 characters
331
+
- Must be alphanumeric without white space, but can include the following symbols: plus (+), equal (=), comma (,), period (.), at (@), colon (:), forward slash (/), and hyphen (-)
332
+
-**Important**: Make sure to provide this value to the Hasura team if you've customized it
301
333
- (Optional) Preferred Availability Zones
302
334
- Use AZ IDs (e.g., use1-az1, use1-az2) instead of AZ names (us-east-1a, us-east-1b)
303
335
- You can get the AZ IDs by running:
@@ -308,7 +340,7 @@ Share the following with the Hasura team:
0 commit comments