A new Flexera Community experience is coming on November 25th. Click here for more information.
Hi
Anyone else that have deployed the AWS Connector for more than 100+ accounts?
We currently use "AWS beacon installed on EC2 instance using IAM Roles"
Our cloud team tells me that this setup will only scale up to about 75 accounts and we have 500+. The reason is that we need to list all accounts that the connector shall look into, and in AWS this role or policy has limitation in number of characters, which will only cover 75 entries.
I was thinking if we need instead use one of the other methods of connecting or if we need to have multiple beacons running these jobs or configure several policies or roles.
@ccrawford any thoughts how to scale too 500+ accounts?
Oct 08, 2020 06:04 AM
Hey @mag00_75 ,
Thanks for reaching out.
It should be possible to create multiple policies, each to the character limits, encompassing several accounts and then attaching all of these policies to the role which is used by the server running the beacon.
For example, here is a role used by a server of ours with the beacon installed. This beacon uses EC2 metadata (no access keys needed), same as you. As you can see, there are two policies applied, each with their own list of ARNs:
And when the adapter runs it will attempt to assume both roles in each policy:
One issue you might encounter is with the 'Maximum Session Duration'. Because the adapter discovers all associated roles and then assumes them, thus marking the start of our session, the delay between fully populating and assuming all the roles before the inventory can complete may lead to the session becoming invalidated. In this case you can try increasing the maximum session duration.
However if this doesn't work you can request an enhancement to the adapter, so that the roles are assumed just before they are inventoried.
Alternatively, you can use one of the other methods but bare in mind these are less reliable and less performant than using EC2 metadata as you currently are.
I think if after performing the above, of splitting out the policies and seeing if the inventory completes within a reasonable time before session expiry... if you are struggling to implement it then the best course of action would probably be the above enhancement.
Oct 08, 2020 06:38 AM
Hi @mag00_75 did you have any success using method described by @ccrawford ?
We are also having a customer who has 150+ accounts and growing in AWS and would preferrably find a solution to this that works without testing in production & do customized instructions as well.
BR, Antti
Apr 08, 2021 05:07 AM
Yes, it works splitting the policies and divide ARN's.
However we have not tested the limits how how many accounts can be inventoried in a session token. Our cloud team do not want everyone to run the getinstances because it can empty the buckets, so they are preparing a custom API for us to fetch the instance data from instead that are continuously updated.
Apr 08, 2021 06:02 AM