- Newest
- Most votes
- Most comments
https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/setting-up-route53.html -> ITAR limits this.
In general, you can't create cross-account roles between AWS and AWS Gov for ANY AWS service. Ran into something similar while running a Cloud Formation template. See explanation below:
"AWS groups Regions into partitions. Every Region is in exactly one partition, and each partition has one or more Regions. Partitions have independent instances of AWS Identity and Access Management (IAM) and provide a hard boundary between Regions in different partitions. AWS commercial Regions are in the aws partition, Regions in China are in the aws-cn partition, and AWS GovCloud Regions are in the aws-us-gov partition. Some AWS services are designed to provide cross-Region functionality, such as Amazon S3 Cross-Region Replication or AWS Transit Gateway Inter-Region peering. These types of capabilities are only supported between Regions in the same partition. You cannot use IAM credentials from one partition to interact with resources in a different partition"
Relevant content
- Accepted Answerasked 10 months ago
- asked 3 months ago
- asked 3 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
Thanks! It makes sense. I will play around with dns and route53.