Table of Contents

Search

  1. Preface
  2. Runtime environments
  3. Hosted Agent
  4. Secure Agent groups
  5. Secure Agents
  6. Secure Agent installation in a cloud environment
  7. Secure Agent installation in a local environment
  8. Serverless runtime environment setup in AWS
  9. Serverless runtime environments

Runtime Environments

Runtime Environments

Configurations performed by the stack

Configurations performed by the stack

When you use the AWS CloudFormation template to create a VPC, the stack performs various configurations.
The stack performs the following configurations:
  • Associates the security group with the VPC and defines inbound and outbound rules.
  • Adds routes to the private route table and makes the private route table the default route table for the VPC.
  • Associates the NAT gateway with the public subnet for outbound traffic to the internet and assigns an elastic IP to the gateway.
  • Updates the NACL inbound rules that are associated with the public subnet.
  • Attaches the internet gateway to the VPC.
  • Assigns the following policy to the IAM role:
    { "Version":"2012-10-17", "Statement":[ { "Sid":"VisualEditor0", "Effect":"Allow", "Action":[ "ec2:DetachNetworkInterface", "ec2:DeleteTags", "ec2:DescribeTags", "ec2:CreateTags", "ec2:DeleteNetworkInterface", "ec2:DescribeSecurityGroups", "ec2:CreateNetworkInterface", "ec2:DeleteNetworkInterfacePermission", "ec2:DescribeNetworkInterfaces", "ec2:DescribeAvailabilityZones", "ec2:CreateNetworkInterfacePermission", "ec2:AttachNetworkInterface", "ec2:DescribeNetworkInterfacePermissions", "ec2:DescribeSubnets", "ec2:DescribeNetworkAcls" ], "Resource":"*" }, { "Sid":"VisualEditor1", "Effect":"Allow", "Action":[ "s3:PutObject", "s3:GetObject", "s3:ListBucket", "s3:DeleteObject", "s3:GetBucketAcl" ], "Resource":[ "arn:aws:s3:::<S3 location for supplementary files>", "arn:aws:s3:::<S3 location for supplementary files>/*" ] } ] }
  • Creates the following trust relationship in the IAM role:
    { "Version":"2012-10-17", "Statement":[ { "Effect":"Allow", "Principal":{ "AWS":"arn:aws:iam::<Informatica's account number>:root" }, "Action":"sts:AssumeRole", "Condition":{ "StringEquals":{ "sts:ExternalId":"<external ID>" } } } ] }

0 COMMENTS

We’d like to hear from you!