Deployment Guide
Prerequisites
Before deploying the CloudFormation template, ensure you have:
AWS account with permissions to create IAM roles and CloudFormation stacks
AWS CLI installed and configured, or access to AWS Console
List of S3 bucket names that e6data needs to access
Required account IDs and External IDs will be provided by e6data
Deployment Parameters
Stack name
<your-chosen-stack-name>
e.g., e6data-s3-access-prod
BucketNames
<comma-separated-bucket-names>
List your buckets, e.g., bucket1,bucket2 or * for all buckets
e6dataAccountId
<E6DATA_ACCOUNT_ID>
e6data AWS Account ID (pre-filled)
ExternalId
<EXTERNAL_ID>
Security token for cross-account access (pre-filled)
VPCEndpointId
<VPC_ENDPOINT_ID>
Your VPC Endpoint ID for S3 (pre-filled)
Deployment Options
Option 1: AWS Console (Recommended)
Access CloudFormation Console
Log in → CloudFormation → Create stack → With new resources (standard)
Upload Template
Select Upload a template file → Choose your CloudFormation YAML → Next
Configure Parameters
Stack name, BucketNames, E6dataAccountId, ExternalId, VPCEndpointId
Click Next
Configure Options (Optional)
Add tags if needed
Leave other settings default → Next
Review & Create
Acknowledge IAM resources creation
Click Submit
Monitor Deployment
Wait for CREATE_COMPLETE status (2–5 minutes)
Option 2: AWS CLI
Create Parameters File (
parameters.json)
Deploy Stack
Monitor Deployment
Wait until CREATE_COMPLETE.
Post-Deployment: Outputs
RoleArn: IAM role ARN (e.g.,
arn:aws:iam::<account-id>:role/...)FailedBuckets: Buckets where policy application failed (should be empty)
Via CLI
Info to Send to e6data
CloudFormation Stack Name
IAM Role ARN
AWS Region
Email Template Example:
Verification
Verify IAM Role
Verify Lambda Function
Check CloudWatch Logs
Verify S3 Bucket Policies
Troubleshooting
Insufficient permissions → Check IAM permissions for CloudFormation, Lambda, S3
FailedBuckets not empty → Bucket policy conflicts, size limits, or cross-region issues
Lambda timeout → Increase timeout or deploy in batches
VPC Endpoint issues → Verify endpoint is active
Updating the Stack
Via Console: CloudFormation → Select stack → Update → Modify BucketNames → Submit
Via CLI:
Deleting the Stack
Removes IAM role, policies, Lambda, VPC endpoint policies
Does not delete your S3 buckets or data
Via Console: CloudFormation → Select stack → Delete Via CLI:
Security Best Practices
Monitor Role usage (CloudTrail, CloudWatch alarms)
Regular audits of bucket access
Keep External ID secure; rotate periodically
Grant access only to necessary buckets
Support
Template deployment → Check CloudFormation events & CloudWatch logs
e6data platform → Contact support with Stack Name and Role ARN
AWS services → Refer to AWS docs or AWS Support
Last updated
