General AWS SNS subscription to GovCloud SQS - ARN Validation Fails

0

We have an architecture in which events will be generated from general AWS and consumed by services within GovCloud.

The intended architecture was to pipe events into SNS on general AWS side, then from there to SQS on GovCloud side, but through the console on general side, adding SNS subscription to SQS topic fails claiming the GovCloud ARN is invalid.

I was hoping to clarify whether this is a console level issue that could be bypassed by performing equivilent operations over CLI?

Our workaround is to use lambdas off of the SNS for pushing into GovCloud SQS, but would rather not add this complexity if not necessary.

已提問 4 年前檢視次數 463 次
1 個回答
0

Turns out cross-partition permissioning is not supported for IAM or resource-based policies.
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html

已回答 4 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南