Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multi account setup 3 #1

Open
wants to merge 565 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
565 commits
Select commit Hold shift + click to select a range
0e3d127
Fix Account Setup Stack Names and screenshots
Jun 27, 2022
5e0c18f
Pilot Light final updates
Jun 27, 2022
3a6e51f
Warm Standby Completed
Jun 27, 2022
c68e2e2
Update section1-oncall-health-sample-app.yaml (#595)
sssalim-aws Jun 27, 2022
c9f89a1
Hot Standby Finish
Jun 27, 2022
b89e923
Merge pull request #586 from chaitanyashah/vpc-flow-log-lambda-issue
sdharank Jun 27, 2022
11cf262
Updates
Jun 28, 2022
0d20f1e
Translated to spanish Module 2's introduction _index.es.md.
jmroche Jun 28, 2022
5fa49ad
Complted translating Module 2 section 1-prerequisites and section 2-v…
jmroche Jun 28, 2022
7bfacf7
Added images vw-7-ES and vw-8-ES to Pilot Light Module section 2-veri…
jmroche Jun 28, 2022
f88fb7e
Fix CFN
Jun 28, 2022
f8c4711
added view
awssteph Jun 28, 2022
b998bb1
updated utlize to pun pricing
awssteph Jun 28, 2022
cef6198
removed old query and remove dev
awssteph Jun 28, 2022
a3a960b
Merge pull request #596 from awssteph/rm_pricing_autostart
awssteph Jun 28, 2022
83c059c
added aws-programmatic-access-test-object to glue crawler exclusions …
Jun 28, 2022
354e899
bumped last updated date
Jun 28, 2022
a53a7ce
added aws-programmatic-access-test-object to glue crawler exclusions …
Jun 29, 2022
f673c0e
Completed translating Workshop 2 - 3-prepare-secondary section. Added…
jmroche Jun 29, 2022
48d189d
Add note box to reliability s3 bi-directional replication lab (#597)
awsdunc Jun 29, 2022
114d78a
Update 3_deploy_env_iaac.md (#581)
Vahan90 Jun 29, 2022
e129fe0
Hot Standby Final
Jun 29, 2022
3f788b7
Hot Standby final final
Jun 29, 2022
db10b31
Implement feedback
Jun 30, 2022
e076c2f
Fix DB Cleanup for Workshop 3
Jun 30, 2022
03a1be0
Completed translating Module 2 / section 4-failover to spanish.
jmroche Jun 30, 2022
06092cd
Updated module sections 2,3 and 4 to align with latest changes comiit…
jmroche Jun 30, 2022
b91c82f
Merge pull request #1 from awslabs/q2-2022-updates
jmroche Jun 30, 2022
d037782
Completed translating to spanish Module 2 section 5-verify-secondary.
jmroche Jun 30, 2022
f774461
Completed translating Workshop 2 section 6-cleanup to spanish.
jmroche Jun 30, 2022
0ce5629
Completed the review of the translations of the entire Workshop 2 mod…
jmroche Jun 30, 2022
b6617d7
fix test bucket (#599)
iakov-aws Jul 1, 2022
6832399
Final fixes
Jul 1, 2022
9d2a0b2
Fix max size ASG
Jul 1, 2022
48edf09
Add drawio and health check fix for Warm
Jul 1, 2022
834081b
Cleanup module 3
Jul 2, 2022
c1e64e1
Add step to cleanup
Jul 2, 2022
d2847fc
Fix deletion policy
Jul 3, 2022
db6a4fe
Final tweaks
Jul 3, 2022
125fa1d
Consistent formatting
Jul 3, 2022
169c1e4
Module 1 Final
Jul 3, 2022
2e4961b
Change EE bucket from v1 to v7
Jul 3, 2022
a0a2604
Change EE bucket from v1 to v7 - fix bucket nam,e
Jul 3, 2022
0042e94
Module 2 and 3 and 4 Final
Jul 3, 2022
c4d9d21
Stack renames for ES version
Jul 3, 2022
6bc1ac4
Merge pull request #600 from awslabs/master
sssalim-aws Jul 4, 2022
2e3c959
Fix ASG for Workshop 3
Jul 4, 2022
1c25ae5
Pilot and Warm Quip Feedback incorporated
Jul 4, 2022
ad5c978
Final Changes based on Feedback
Jul 4, 2022
b34c321
Add CloudFront to Workshop 4 cleanup
Jul 4, 2022
3fd8828
Spanish translation. Images missing
camilo23401 Jul 5, 2022
220b07f
Merge branch 'q2-2022-updates' of https://github.com/awslabs/aws-well…
camilo23401 Jul 5, 2022
7af8f5a
fix issues_603 - missing comma
setheliot Jul 5, 2022
8730139
Merge pull request #601 from awslabs/sssalim
setheliot Jul 5, 2022
03a82bb
Incorporate feedback
Jul 6, 2022
0e39d98
Translation with images
camilo23401 Jul 6, 2022
5d31fb8
Merge branch 'q2-2022-updates' of https://github.com/awslabs/aws-well…
camilo23401 Jul 6, 2022
3f0be2c
Merge pull request #605 from camilo23401/camiload-translation
jmoran8888 Jul 6, 2022
3f6b166
Fixed merge confilcts and updated local fork with remote updates.
jmroche Jul 6, 2022
46c3f2c
Merge branch 'awslabs-q2-2022-updates' into q2-2022-updates
jmroche Jul 6, 2022
cbba1d4
Merge pull request #2 from awslabs/q2-2022-updates
jmroche Jul 6, 2022
cf11c91
Merge pull request #606 from jmroche/q2-2022-updates
jmoran8888 Jul 6, 2022
d0f4078
Delete unused images and files
Jul 6, 2022
f7de7af
Delete unused images and files
Jul 6, 2022
4ab4d33
Delete unused images and files
Jul 6, 2022
f87ec6b
Spanish fixed
jleonga Jul 7, 2022
512299c
Merge pull request #612 from jleongr/q2-2022-updates
jmoran8888 Jul 7, 2022
963111f
Spanish translation review
jgquint Jul 7, 2022
6bc23db
Merge pull request #613 from jgquint/q2-2022-updates
jmoran8888 Jul 7, 2022
897b9dc
Final feedback
Jul 7, 2022
2e490bf
Consistant verbiage
Jul 7, 2022
d5344ed
Reword to make more clear on what is happening
Jul 7, 2022
ee5699e
Add in ASG Link
Jul 7, 2022
049fb26
Resolve conflicts
Jul 7, 2022
23173b8
New Strategies Image
Jul 8, 2022
8b094a9
New Strategies Image
Jul 8, 2022
7225434
updated org to pull all tags and removed tag reffernce in amin file
awssteph Jul 14, 2022
ed8ae41
added tmp cation back in
awssteph Jul 14, 2022
54d2a51
Merge pull request #617 from awssteph/org_all_tags
awssteph Jul 15, 2022
425d540
updated the mod notes
awssteph Jul 15, 2022
7df5847
Merge pull request #618 from awssteph/org_all_tags
awssteph Jul 15, 2022
71939f7
Merge pull request #566 from awslabs/cid-docs
yprikhodko Jul 18, 2022
8fc3831
updated pic
awssteph Jul 20, 2022
1efdb29
Merge pull request #622 from awssteph/read_only_screenshot
awssteph Jul 20, 2022
130969b
Merge pull request #623 from awslabs/seliot
jmoran8888 Jul 21, 2022
a66a985
added SQL
awssteph Jul 27, 2022
f126054
added triggers
awssteph Jul 27, 2022
bcd9fe8
messing with EC2 one
awssteph Jul 28, 2022
cb10277
messing with EC2 one
awssteph Jul 28, 2022
1292314
clean comments (#627)
iakov-aws Aug 1, 2022
5c73a14
rm qupotes
awssteph Aug 1, 2022
a652725
added note about a double slash (//) in CUR path prefix
Aug 2, 2022
d7dab2a
Fix for ticket P68382019
Aug 3, 2022
740d9c9
Merge pull request #628 from awslabs/ticket-P68382019
jmoran8888 Aug 3, 2022
5c32c6d
Fixed broken link
oktab1 Aug 3, 2022
d48df5d
fix typo
iakov-aws Aug 4, 2022
91595b7
Append new lab for custom lens creation (#620)
juntinyeh Aug 5, 2022
06a590d
tried to fix athean
awssteph Aug 8, 2022
41d1e42
cw role error
awssteph Aug 8, 2022
c3fb876
Update _index.md to fix introduction brief
juntinyeh Aug 9, 2022
911f673
Merge pull request #632 from juntinyeh/lab_watool_custom_lens_patch20…
sssalim-aws Aug 9, 2022
65d94ad
Assume role for CW in the main loop
Aug 9, 2022
78c907a
Merge pull request #633 from pbazard/master
awssteph Aug 9, 2022
071ecfa
edit owners
awssteph Aug 9, 2022
f256d19
edit owners
awssteph Aug 9, 2022
eda4b5c
Fix next page and Parameter store commands on B&R
Aug 11, 2022
1d801d2
improve the readability (#637)
juntinyeh Aug 12, 2022
dd62bf1
No fix necessary - S3 public access step needs to be first to fix the…
Aug 12, 2022
2ec3431
Move S3 access step to before primary region step to avoid permission…
Aug 12, 2022
0ca0a7a
Merge pull request #638 from awslabs/ticket-AWSCE-1956
jmoran8888 Aug 12, 2022
17a413a
removed ='s
awssteph Aug 15, 2022
32de71d
Merge pull request #640 from awssteph/rds_assume
awssteph Aug 15, 2022
3621349
added confition for priocing
awssteph Aug 15, 2022
9c78e5c
Fix typo in Reliability/_index.md (#636)
dougshamoo Aug 16, 2022
44bf16c
style: fix dtypos in documentation (#584)
TheMasquerader Aug 16, 2022
d13c0cf
Add TA/CO Integration Lab files
Aug 16, 2022
c2f10ad
Add TA/CO static lab files
Aug 16, 2022
6ae356b
Add Sustainability hardware patterns static lab files
Aug 16, 2022
374e85e
Add Sustainability Lab Content files
Aug 16, 2022
3e32aa3
update python3.6 lambdas to 3.9
setheliot Aug 16, 2022
733d4a7
add Lambda TagResource action to VPC policy
setheliot Aug 17, 2022
7b6b04d
update canary syn-nodejs-puppeteer-3.3 to syn-nodejs-puppeteer-3.6
setheliot Aug 17, 2022
a43be9e
Merge pull request #645 from awslabs/seliot
setheliot Aug 17, 2022
531e424
add blank line to display numbered list right
Aug 18, 2022
5c80e28
Merge branch 'awslabs:master' into sustainability-hardware-pattern-opt
awswa Aug 19, 2022
a10a821
Replaced screenshots and instance type
awswa Aug 19, 2022
f5878da
added new code for question7, updated screenshot, correct spelling
awswa Aug 22, 2022
75780a3
update screenshots
awswa Aug 22, 2022
35e3c0b
Merge branch 'awslabs:master' into watool-trusted-advisor-integration
awswa Aug 22, 2022
40e5ced
update description of cloudformation
awswa Aug 22, 2022
1a84781
Merge branch 'watool-trusted-advisor-integration' of https://github.c…
awswa Aug 22, 2022
c69395d
add saving opportunity
awswa Aug 22, 2022
4132c3c
added hash for lamabda
awssteph Aug 22, 2022
4c24759
updated screenshots
awswa Aug 22, 2022
828582f
changed repo location
awswa Aug 22, 2022
688b823
new immersion-day-app-php7.zip uploaded
awswa Aug 22, 2022
9263940
replaced screenshots and cloudformation template for c6large
awswa Aug 22, 2022
537d3da
correct spelling and rephrase sentences
awswa Aug 22, 2022
5e43135
correct spelling
awswa Aug 22, 2022
fc81392
added joins
awssteph Aug 22, 2022
53e65bf
added single quotes on bucket
awssteph Aug 22, 2022
18adf00
Merge pull request #648 from awssteph/pricing_lambda
awssteph Aug 22, 2022
ab90538
Merge branch 'master' into hash
awssteph Aug 22, 2022
77ec869
corrected number of TA check id in configure_env.md
awswa Aug 23, 2022
c3be062
Merge branch 'awslabs:master' into watool-trusted-advisor-integration
awswa Aug 23, 2022
601cd21
Merge branch 'awslabs:master' into sustainability-hardware-pattern-opt
awswa Aug 23, 2022
cc0b23e
replaced screenthos at review section(4)
awswa Aug 23, 2022
3d78568
Merge branch 'watool-trusted-advisor-integration' of https://github.c…
awswa Aug 23, 2022
c9e156d
Merge pull request #647 from enricogaensler/master
thomasattree Aug 23, 2022
eb5babb
replace memory metrics with business metrics
awswa Aug 24, 2022
a32fba7
Merge branch 'sustainability-hardware-pattern-opt' of https://github.…
awswa Aug 24, 2022
c52576a
add note at step 5.1
awswa Aug 24, 2022
92fb497
changed from load.php to business.php with screenshots
awswa Aug 24, 2022
6a9b071
corrected typos
awswa Aug 24, 2022
f0bac0e
corrected typos
awswa Aug 24, 2022
458442d
corrected typos
awswa Aug 24, 2022
700c146
added query
awssteph Aug 24, 2022
226ad1d
added joins for all functions and crawlers- to be teste
awssteph Aug 24, 2022
cc49bb1
added msk content
awssteph Aug 24, 2022
fcbaa2e
ADDED Multi Account Setup section in 200 CII
tbuatois Aug 25, 2022
fcf03ac
RE-ADD FAQ
tbuatois Aug 25, 2022
de9a88c
updated instructions and screenshots
awswa Aug 25, 2022
9a4d6cb
removed lines from screenshots
awswa Aug 25, 2022
706bd6e
Merge branch 'awslabs:master' into watool-trusted-advisor-integration
awswa Aug 25, 2022
679a0cb
Merge branch 'awslabs:master' into sustainability-hardware-pattern-opt
awswa Aug 25, 2022
bbb1e2e
add schedule parameter to cost data collection (#577)
iakov-aws Aug 25, 2022
29bdff6
replaced screenshot
awswa Aug 26, 2022
7c5d033
Merge branch 'watool-trusted-advisor-integration' of https://github.c…
awswa Aug 26, 2022
453c59a
removed Graviton3 details
awswa Aug 26, 2022
b43a32b
Merge branch 'sustainability-hardware-pattern-opt' of https://github.…
awswa Aug 26, 2022
f87f667
Merge branch 'awslabs:master' into watool-trusted-advisor-integration
awswa Aug 26, 2022
7f56333
added next button
awswa Aug 26, 2022
cc5624e
Merge branch 'watool-trusted-advisor-integration' of https://github.c…
awswa Aug 26, 2022
5f7a9d8
Merge pull request #643 from awswa/watool-trusted-advisor-integration
sssalim-aws Aug 26, 2022
309dedb
added picture
awssteph Aug 26, 2022
7b02e1a
Minor editorial changes
thomasattree Aug 26, 2022
bda0f67
updated instructions and replaced screenshots.
awswa Aug 27, 2022
7d67396
revised instructions and cloudformation template
awswa Aug 29, 2022
bea1063
Merge pull request #629 from oktab1/master
setheliot Aug 29, 2022
1103319
Delete immersion-day-app-php7.zip
awswa Aug 30, 2022
740d5f6
Add files via upload
awswa Aug 30, 2022
7d4d723
update screenshot and re-write instructions
awswa Aug 30, 2022
f3c7f60
Add files via upload
awswa Aug 30, 2022
ffffcde
businessapi.php
awswa Aug 30, 2022
f54f87a
repalced screenshot for business.php
awswa Aug 30, 2022
a9a8832
changed join to sub
awssteph Aug 30, 2022
be5f2a5
changed join to sub
awssteph Aug 30, 2022
00056e0
rm pictire
awssteph Aug 30, 2022
e164eb9
rm pictire
awssteph Aug 30, 2022
1b358c2
updated des
awssteph Aug 30, 2022
a0ff039
added hash to lambda
awssteph Aug 30, 2022
380a0ab
rm _dev from testing
awssteph Aug 30, 2022
7c4b9db
updated CF template and corrected typos
awswa Aug 30, 2022
8dca70b
update repo in CF
awswa Aug 30, 2022
1a4ce64
swapped for stack name
awssteph Aug 30, 2022
31db0ce
removed dev
awssteph Aug 30, 2022
947ce0c
rm dup crawler in name
awssteph Aug 30, 2022
6c26439
ACO may need up to 42(30+12) hours to provide recommendation
awswa Aug 31, 2022
bb3e33e
change job title
awswa Aug 31, 2022
f95c00e
corrected typos
awswa Aug 31, 2022
f803b93
put names back on ODC
awssteph Aug 31, 2022
b223d3f
put names back on ODC
awssteph Aug 31, 2022
e66d6c8
Merge pull request #657 from awssteph/msk
awssteph Aug 31, 2022
fe6ff5b
pull upstream
awssteph Aug 31, 2022
6125bf5
removed head
awssteph Aug 31, 2022
c3d8244
updated budget code to miss planned budget
awssteph Aug 31, 2022
6d30bb6
Merge pull request #658 from awssteph/hash
awssteph Aug 31, 2022
5e7c2e3
fixed name
awssteph Aug 31, 2022
89db12e
Merge pull request #660 from awssteph/master
awssteph Aug 31, 2022
1060fe1
pulled from master
awssteph Aug 31, 2022
0e37129
removed 2
awssteph Aug 31, 2022
6234acf
Merge pull request #644 from awswa/sustainability-hardware-pattern-opt
thomasattree Sep 1, 2022
8963f24
Major Update and Simplification (#661)
aaronedell Sep 2, 2022
da7f8a8
match WA url to lab title (#664)
awswa Sep 2, 2022
1852c28
d
awssteph Sep 2, 2022
8d26022
fix cid naviation
iakov-aws Sep 2, 2022
77ca416
removed hard code crawler
awssteph Sep 2, 2022
7e06e8d
removed hard code crawler
awssteph Sep 2, 2022
4e80520
Merge pull request #666 from awssteph/crawer_fix
awssteph Sep 2, 2022
b544768
update navigation in CID
iakov-aws Sep 2, 2022
cc04402
Merge branch 'master' into rds_pricing
awssteph Sep 2, 2022
b062f1c
Update 2_budget_ec2actual.md (#646)
YouGeeOh Sep 2, 2022
0ea9322
Update 1_CF_stack.md (#619)
jernestosuarez Sep 2, 2022
d373446
Level 100-AWS Account Setup-5. Configure Account Settings - update (#…
mugdhapv Sep 3, 2022
aa8cf15
added dev to rds
awssteph Sep 5, 2022
15a1f02
Merge pull request #668 from awssteph/rds_pricing
awssteph Sep 5, 2022
91da8e9
rm dev
awssteph Sep 5, 2022
3d47403
rm dev
awssteph Sep 5, 2022
43e61ec
Merge branch 'master' into rds_pricing
awssteph Sep 5, 2022
7c3109d
Merge pull request #669 from awssteph/rds_pricing
awssteph Sep 5, 2022
d2b8ded
Harden Bucket security (#670)
darken99 Sep 5, 2022
a6e09f6
Update 1_prerequistes.md
iakov-aws Sep 6, 2022
5ecb9b9
Updated to accommodate UI changes in creating stacks and replicating …
RodneyLester Sep 6, 2022
36cf772
Scaled down to 1200 pix wide
RodneyLester Sep 13, 2022
c1fdeb4
Merge pull request #672 from RodneyLester/master
setheliot Sep 13, 2022
0a4decf
fix report url
Sep 17, 2022
4440b0c
Merge branch 'master' into multi-account-setup
Sep 17, 2022
426d841
restructure - wip
Sep 17, 2022
727e2a6
more docs
Sep 17, 2022
4bc040b
more docs
Sep 17, 2022
90221c0
more docs
Sep 17, 2022
caa5ff5
pretty json + schema
Sep 17, 2022
05a87e7
more docs
Sep 17, 2022
0ccb43e
Only cur-aggregation template
tbuatois Sep 20, 2022
5d033f9
refactor documentation
tbuatois Sep 20, 2022
de9a88c
more docs
Sep 20, 2022
1ad2f03
more docs
Sep 20, 2022
27ffc73
more docs
Sep 20, 2022
f575c5e
Change source/destination order
tbuatois Sep 21, 2022
b37d8fb
merge
Sep 21, 2022
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
13 changes: 10 additions & 3 deletions config.toml
Original file line number Diff line number Diff line change
@@ -1,9 +1,16 @@
baseURL = "https://wellarchitectedlabs.com/"
languageCode = "en-us"
title = "AWS Well-Architected Labs"
defaultContentLanguage = "en"
theme = "learn"


[languages]
[languages.en]
languageName = 'English'
title = 'AWS Well-Architected Labs'
weight = 1
[languages.es]
languageName = 'Español'
title = 'AWS Well-Architected Labs'
weight = 2
[params]
themeVariant = "walabs"
disableShortcutsTitle = true
Expand Down
15 changes: 15 additions & 0 deletions content/Contributing/04_UpdatingExisting/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,3 +38,18 @@ Please write a descriptive commit message following [this](https://git-scm.com/b

![Images/gitcommit.png](/Contributing/Images/gitcommit.png?classes=lab_picture_small)
All your changes will be in the remote repository in GitHub, which can now be merged into the Well-Architected Labs repository


### Picture Updates
When you update a lab picture please ensure it had the following:
* Black boarder
* Orange box's to show the item the customer is looking for
* Role/AccountID hidden using the same colour as the section
* Image needs to be 800 wide to avoid wrap
* The description above the image much match the image e.g. if you say use 2688Mb then the picture must have 2688Mb

An example can be seen below:

**Step example** :
1. Role name LambdaOrgRole, click Create role:
![Images/create_role.png](/Cost/300_Organization_Data_CUR_Connection/Images/create_role.png)
15 changes: 15 additions & 0 deletions content/Contributing/05_CreatingNew/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,21 @@ hidden: false
- Image width MUST always be `>800px`, which stops images from being placed next to text. Create the image border and then resize with whitespace
- Ensure there is a black border around the images by formatting your images using the following structure `![Images/(your image.png)](/(shortpillarname)/(content folder for lab)/Images/(your image.png)?classes=lab_picture_small)`

### Picture Formatting
When you update a lab picture please ensure it had the following:
* Black boarder
* Orange box's to show the item the customer is looking for
* Role/AccountID hidden using the same colour as the section
* Image width MUST always be `>800px`, which stops images from being placed next to text. Create the image border and then resize with whitespace
* The description above the image much match the image e.g. if you say use 2688Mb then the picture must have 2688Mb

An example can be seen below:

**Step example** :
1. Role name LambdaOrgRole, click Create role:
![Images/create_role.png](/Cost/300_Organization_Data_CUR_Connection/Images/create_role.png)


### Verify your edits and/or additions
After making the changes or additions test and verify locally
- Navigate back to the aws-well-architected-labs parent folder
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ To cancel your QuickSight subscription follow the steps below.
2. Click on **Account settings**:
![Images/AWSQuicksight76.png](/Cost/100_1_AWS_Account_Setup/Images/AWSQuicksight76.png)

3. Cluck on **Unsubscribe**:
3. Click on **Unsubscribe**:
![Images/AWSQuicksight77.png](/Cost/100_1_AWS_Account_Setup/Images/AWSQuicksight77.png)

4. Review the notifications, click **Unsubscribe**:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ pre: "<b>1. </b>"
To allow access to your billing information without using the root credentials you need to enable IAM access. This allows other users (non-root) to access billing information in the management account. This approach provides individual sign-in information for each user, and you can grant each user only the permissions they need to work with your account. For example, you can grant your financial teams access to the billing information only, and ensure they dont have access to resources in the account.


1. Log in to your management account as the root user, Click on the account name in the top right, and click on **My Account** from the menu:
1. Log in to your management account as the root user, Click on the account name in the top right, and click on **Account** from the menu:
![Images/AWSAcct4.png](/Cost/100_1_AWS_Account_Setup/Images/AWSAcct4.png)

2. Scroll down to **IAM User and Role Access to Billing Information**, and click **Edit**:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,52 +21,47 @@ You will create an AWS Organization with the management account.
2. Click on **Create organization**:
![Images/AWSOrg2.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg2.png)

3. To create a fully featured organization, Click on **Create organization**

3. You will receive a verification email, click on **Verify your email address** to verify your account:
![Images/AWSOrg3.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg3.png)

4. You will receive a verification email, click on **Verify your email address** to verify your account:
4. You will then see a verification message in the console for your organization:
![Images/AWSOrg4.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg4.png)

5. You will then see a verification message in the console for your organization:
![Images/AWSOrg5.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg5.png)

You now have an organization that you can join other accounts to.

### Join member accounts
You will now join other accounts to your organization. You need to create and join an account that will be used to perform Cost Optimization work, as well as other member accounts used to run workloads.

1. From the AWS Organizations console click on **Add account**:
![Images/AWSOrg5.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg5.png)

2. Click on **Invite an existing AWS Account**:
![Images/AWSOrg6.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg6.png)

2. Click on **Invite account**:
3. Enter in the **Email or account ID**, enter in any relevant **Notes** and click **Send invitation**:
![Images/AWSOrg7.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg7.png)

3. Enter in the **Email or account ID**, enter in any relevant **Notes** and click **Invite**:
![Images/AWSOrg8.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg8.png)

4. You will then have an open request:
![Images/AWSOrg9.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg9.png)
![Images/AWSOrg8.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg8.png)

5. Log in to your **member account**, and go to **AWS Organizations**:
![Images/AWSOrg1.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg1.png)

6. You will see an invitation in the menu, click on **Invitations**:
![Images/AWSOrg9.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg9.png)

7. Verify the details in the request (they are hidden here), and click on **Accept**:
![Images/AWSOrg10.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg10.png)

7. Verify the details in the request (they are blacked out here), and click on **Accept**:
8. You are shown that the account is now part of your organization:
![Images/AWSOrg11.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg11.png)

8. Verify the Organization ID (blacked out here), and click **Confirm**:
![Images/AWSOrg12.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg12.png)

9. You are shown that the account is now part of your organization:
![Images/AWSOrg13.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg13.png)

10. The member account will receive an email showing success:
![Images/AWSOrg14.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg14.png)
![Images/AWSOrg12.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg12.png)

11. The management account will also receive email notification of success:
![Images/AWSOrg15.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg15.png)
![Images/AWSOrg13.png](/Cost/100_1_AWS_Account_Setup/Images/AWSOrg13.png)

Repeat the steps above for each additional member account in your organization.

Expand Down
68 changes: 49 additions & 19 deletions content/Cost/100_Labs/100_1_AWS_Account_Setup/4_configure_sso.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ You will create an AWS Organization with the management account.
4. Click **Create group**:
![Images/ssogroups_create.png](/Cost/100_1_AWS_Account_Setup/Images/ssogroups_create.png)

5. Enter a Group name of **Cost_Optimization** and a description, click **Create**:
5. Enter a Group name of **Cost_Optimization** and a description, click **Create group**:
![Images/ssogroup_details.png](/Cost/100_1_AWS_Account_Setup/Images/ssogroup_details.png)

6. Click **Users**:
Expand All @@ -38,35 +38,42 @@ You will create an AWS Organization with the management account.

8. Enter the following details:
- **Username**
- **Password**
- **Password** -
- **Email address**
- **First name**
- **Last name**
- **Display name**
- Configure the optional fields as required
click **Next: Groups**:
click **Next**:
![Images/ssouser_detail.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_detail.png)

9. Select the **Cost_Optimization** group and click **Add user**:
9. Select the **Cost_Optimization** group and click **Next**:
![Images/ssouser_group.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_group.png)

10. The user will receive an email, with a link to **Accept invitation**, the **Portal URL** and their **Username**:
10. Review user details and click **Add User**
![Images/ssouser_addusersubmit.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_addusersubmit.png)

11. The user will receive an email, with a link to **Accept invitation**, the **Portal URL** and their **Username**:
![Images/ssouser_email.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_email.png)

11. When the user goes to the portal, they will enter in a **Password** and click **Update user**:
12. When the user goes to the portal, they will enter in a **Password** and click **Set new password**:
![Images/ssouser_login.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_login.png)

12. The user will then Click **Continue**:
13. Enter the new SSO Username and Password click **Sign In**:
![Images/ssouser_activate.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_activate.png)

{{% notice note %}}
Users will not have permissions until you complete the rest of this step.
A management and member permission set will be created
{{% /notice %}}

13. Click on **AWS accounts**, select **Permission sets**, and click **Create permission set**:
14. Create the management permission set. Click on **Permission sets**, and click **Create permission set**:
![Images/ssoaccount_createpermission.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_createpermission.png)

14. Select **Create a custom permission set**, enter a name of **management_CostOptimization**, enter a **Description**, set the **Session duration**, select **Create a custom permissions policy**. Use the policy below as a starting point, modify it to your requirements and paste it in the policy field, click **Create**.
15. Select **Custom permission set** and click **Next**:
![Images/ssouser_permission.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_permission.png)

16. Select **Inline Policy**. Use the policy below as a starting point, modify it to your requirements and paste it in the policy field, click **Next**.

{{% notice warning %}}
You **MUST** work with your security team/specialist to ensure you create the policies inline with least privileges for your organization.
Expand Down Expand Up @@ -97,12 +104,21 @@ You **MUST** work with your security team/specialist to ensure you create the po
]
}
{{% /expand%}}
![Images/ssouser_inlinepolicy.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_inlinepolicy.png)

17. Enter a Permission set name of **management_CostOptimization**, enter a **Description**, set the **Session duration**, click **Next**.
![Images/ssouser_permissionsetdetails.png](/Cost/100_1_AWS_Account_Setup/Images/permissionsetdetails.png)

18. Review and **Create** the custom permissions policy.
![Images/ssopermissionset_create.png](/Cost/100_1_AWS_Account_Setup/Images/ssopermissionset_create.png)

15. Click **Create permission set**
19. Create the member permission set. Click on **Permission sets**, and click **Create permission set**:
![Images/ssoaccount_createpermission.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_createpermission.png)

20. Select **Custom permission set** and click **Next**:
![Images/ssouser_permission.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_permission.png)

16. Select **Create a custom permission set**, enter a name of **Member_CostOptimization**, enter a **Description**, set the **Session duration**, select **Create a custom permissions policy**. Use the policy below as a starting point, modify it to your requirements, replace **(management CUR bucket)** and **(Cost Optimization Member Account ID)** and paste it in the policy field, click **Create**.
21. Select **Inline Policy**. Use the policy below as a starting point, replace **(management CUR bucket)** and **(Cost Optimization Member Account ID)** click **Next**.

{{% notice warning %}}
You **MUST** work with your security team/specialist to ensure you create the policies inline with least privileges for your organization.
Expand Down Expand Up @@ -199,29 +215,43 @@ You **MUST** work with your security team/specialist to ensure you create the po
]
}
{{% /expand%}}
![Images/ssouser_inlinepolicy.png](/Cost/100_1_AWS_Account_Setup/Images/ssouser_inlinepolicy.png)

22. Enter a Permission set name of **member_CostOptimization**, enter a **Description**, set the **Session duration**, click **Next**.
![Images/ssouser_memberpermissionsetdetails.png](/Cost/100_1_AWS_Account_Setup/Images/memberpermissionsetdetails.png)

23. Review and **Create** the custom permissions policy.
![Images/ssopermissionset_create.png](/Cost/100_1_AWS_Account_Setup/Images/ssopermissionset_create.png)

17. Click **AWS organization**, select the **management account**, click **Assign users**:
24. Setup the Cost Optimization management account. Click **AWS accounts**, select the **management account**, click **Assign users or groups**:
![Images/ssoaccount_organizationusers.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_organizationusers.png)

18. Select **Groups**, select the **Cost_Optimization** group, click **Next: Permission sets**:
25. Select **Groups**, select the **Cost_Optimization** group, click **Next**:
![Images/ssoaccount_groups.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_groups.png)

19. Select the **management_CostOptimization** Permission set, click **Finish**:
26. Select the **management_CostOptimization** Permission set, click **Next**:
![Images/ssoaccount_grouppermission.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_grouppermission.png)

20. Click **Proceed to AWS accounts**:
27. Review and **Submit**:
![Images/ssoaccount_permissionsubmit.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_permissionsubmit.png)

28. Verify account was updated with permission set:
![Images/ssoaccount_success.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_success.png)

21. setup the Cost Optimization member account, select the **Member account**, click **Assign users**
29. Setup the Cost Optimization member account. Click **AWS accounts**, select the **member account**, click **Assign users or groups**:
![Images/ssoaccount_memberorganizationusers.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_memberorganizationusers.png)

22. Select **Groups**, select the **Cost_Optimization** group, click **Next: Permission sets**:
30. Select **Groups**, select the **Cost_Optimization** group, click **Next**:
![Images/ssoaccount_groups.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_groups.png)

23. Select the **Member_CostOptimization** Permission set, click **Finish**
31. Select the **member_CostOptimization** Permission set, click **Next**:
![Images/ssoaccount_membergroups.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_membergroups.png)

24. Click **Proceed to AWS accounts**
32. Review and **Submit**:
![Images/ssoaccount_memberpermissionsubmit.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_memberpermissionsubmit.png)

33. Verify account was updated with permission set:
![Images/ssoaccount_success.png](/Cost/100_1_AWS_Account_Setup/Images/ssoaccount_success.png)


{{% notice tip %}}
Expand Down
43 changes: 37 additions & 6 deletions content/Cost/100_Labs/100_1_AWS_Account_Setup/6_QuickSight.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,20 +32,51 @@ This will setup Amazon QuickSight, so that users in the Cost Optimization Accoun

1. Go to the **IAM Dashboard**

2. Click **Policies** and search for the **AWSQuickSightS3Policy**, click on the **AWSQuickSightS3Policy** policy:
2. Click **Policies** and select **Create Policy**:
![Images/IAMPolicy_editQS.png](/Cost/100_1_AWS_Account_Setup/Images/IAMPolicy_editQS.png)

3. Click **Edit policy**,
3. Go to **JSON Editor**. We will add the s3 resource **arn:aws:s3:::cost\*** below the existing s3 bucket. This will allow QuickSight to access any S3 bucket starting with **cost**, so Cost Optimization users can easily create new datasets without requiring additional QuickSight privileges. Copy the policy given below into JSON editor and Click **Next**:

{{%expand "Click here for Custom permissions policy" %}}
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:ListBucket",
"s3:GetObjectVersion"
],
"Resource": "arn:aws:s3:::cost*"
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": "s3:ListAllMyBuckets",
"Resource": "*"
}
]
}
{{% /expand%}}
![Images/IAMPolicy_editpolicy.png](/Cost/100_1_AWS_Account_Setup/Images/IAMPolicy_editpolicy.png)

4. We will add the s3 resource **arn:aws:s3:::cost\*** below the existing s3 bucket. This will allow QuickSight to access any S3 bucket starting with **cost**, so Cost Optimization users can easily create new datasets without requiring additional QuickSight privileges. Click **Review policy**:
4. Name your policy to **AWSQuickSightS3Policy**, add **Description** and click **Create Policy**:
![Images/IAMPolicy_editreview.png](/Cost/100_1_AWS_Account_Setup/Images/IAMPolicy_editreview.png)

5. Click **Save changes**:
![Images/IAMPolicy_save.png](/Cost/100_1_AWS_Account_Setup/Images/IAMPolicy_save.png)
5. Click **AWSQuickSightS3Policy** policy to attach it to QuickSight role:
![Images/awsQSIAM1.png](/Cost/100_1_AWS_Account_Setup/Images/awsQSIAM1.png)

6. Go to **Policy Usage** tab and click **Attach**:
![Images/AWSQSIAM2.png](/Cost/100_1_AWS_Account_Setup/Images/AWSQSIAM2.png)

7. Select AWS QuickSight Service role and click **Attach Policy**:
![Images/AWSQSIAM3.png](/Cost/100_1_AWS_Account_Setup/Images/AWSQSIAM3.png)


{{% notice tip %}}
Congratulations - QuickSight is now setup for your users. The Cost Optimization team can self manage QuickSight, and access to data sets in S3 with the correct bucket name.
{{% /notice %}}

{{< prev_next_button link_prev_url="../5_account_settings/" link_next_url="../7_cost_explorer/" />}}
{{< prev_next_button link_prev_url="../5_account_settings/" link_next_url="../7_cost_explorer/" />}}
Loading