As of the 2.13 release it became much easier to add AWS GovCloud accounts to cloudtamer.io running in AWS Commercial and vice versa. The steps below document how to manage other AWS partitions from a single cloudtamer.io installation (i.e., manage GovCloud if you're currently running Commercial, or manage Commercial if you're currently running GovCloud).
You should schedule downtime because any AWS accounts in a separate partition will not be accessible until these steps are completed.
- Ensure you are upgraded to cloudtamer.io 2.13 or higher and logged in as the built-in administrator.
- Choose an AWS account as the central point of authentication. We recommend using an empty account for partition access.
- In the cloudtamer.io application, navigate to Settings > System Settings > AWS Partitions.
- Click Download CloudFormation to download the
- Choose the AWS partition type in the Select An AWS Partition drop-down menu.
- In the AWS account that is chosen as the central point of authentication, if the cloudtamer-service-role already exists, perform an update stack operation in CloudFormation. If the
cloudtamer-service-roledoes not exist, perform a create stack operation in CloudFormation.
- Generate IAM access keys from the IAM user:
- Return to the cloudtamer.io application and enter the IAM access keys into the Settings > System Settings > AWS Partitions page.
- Click Save.
- Within 5-10 minutes (depending on the number of linked accounts in this partition), all the AWS accounts will be migrated to use the AWS account as the central point of authentication.