Issue with AWS Control Tower Decommissioning and StackSet Deletion

0

Hello all, It all began with the accidental deletion of the Control Tower Stack. Consequently, I proceeded to initiate the decommissioning process, anticipating a fresh start upon its completion. Unfortunately, the decommissioning process failed to finish and instead produced an error message saying

"AWS Control Tower has failed to decommission your landing zone. An error occurred while decommissioning your landing zone: An error occurred while setting up your landing zone. Try again later. If this error persists, contact AWS Support."

leaving all this behind, I then proceeded to manually remove AWS Control Tower resources by referring AWS documentation page. steps I did are... 1- Detach and Delete SCPs [ was successfully deleted] 2- Delete StackSets and Stacks [ was successfully deleted except StackSet named: AWSControlTowerBP-BASELINE-SERVICE-LINKED-ROLE ] below is the Status Reason for each AWS Account a) Account ************ should have 'AWSControlTowerExecution' role with trust relationship to Role 'service-role/AWSControlTowerStackSetRole'. b) ResourceLogicalId:ControlTowerServiceRole, ResourceType:AWS::IAM::ServiceLinkedRole, ResourceStatusReason:Resource of type 'AWS::IAM::ServiceLinkedRole' with identifier 'AWSServiceRoleForAWSControlTower' has a conflict. Reason: SLR [AWSServiceRoleForAWSControlTower] is in use by other resources: [[RoleUsageType(Region=us-east-2, Resources=[arn:aws:organizations::***********:account/-********/**********])]]..

I find myself in a challenging situation and would appreciate assistance or guidance on how to proceed. Thanks in advance.

profile picture
Meden
已提問 5 個月前檢視次數 301 次
1 個回答
0
已接受的答案

Hey Meden,

you could check the following:

"a)" by checking if the AWSControlTowerExecution-role exists in that account and if not just create it manually. Then try again.

"b)", it looks like the role is still in use by the resource you censored. Analyze that resource, delete the controltower configuration in that resource and then try again.

If you are stuck, I would book a developer supportplan for 30$ for one month and let aws support analyze this issue from the backend in your case.

Sincerely Heiko

profile picture
HeikoMR
已回答 5 個月前
  • Hello Heiko,

    I sincerely appreciate the prompt response. Fortunately, I resolved the situation by closing the account from the AWS organization utilizing the 'AWS::IAM::ServiceLinkedRole' with the identifier 'AWSServiceRoleForAWSControlTower'. However, I realized I might have overlooked properly deleting Amazon S3 Buckets in the Log Archive Account before closing the account. I assumed they would vanish after the 90-day account deletion deadline. If I'm mistaken, please correct me. Nonetheless, thank you for your guidance and the solution you provided.

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南