General AWS SNS subscription to GovCloud SQS - ARN Validation Fails

0

We have an architecture in which events will be generated from general AWS and consumed by services within GovCloud.

The intended architecture was to pipe events into SNS on general AWS side, then from there to SQS on GovCloud side, but through the console on general side, adding SNS subscription to SQS topic fails claiming the GovCloud ARN is invalid.

I was hoping to clarify whether this is a console level issue that could be bypassed by performing equivilent operations over CLI?

Our workaround is to use lambdas off of the SNS for pushing into GovCloud SQS, but would rather not add this complexity if not necessary.

已提问 4 年前463 查看次数
1 回答
0

Turns out cross-partition permissioning is not supported for IAM or resource-based policies.
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html

已回答 4 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则