Problem statement
A long time ago, we used public third-party CloudFormation extensions to deploy the EKS cluster with deployed Helm charts as part of a single CloudFormation template. AWS introduced many cool things since then, for example, EKS add-ons, so such an approach may not be entirely relevant nowadays. But in our case, the customer returned with the request to deploy the same code in a different AWS Region. For context, we used a Control Tower Customization Pipeline and consequently deployed an extensive set of AWS resources. First of all, third-party public CloudFormation extensions:
### omitted code Resources: EKSClusterExtensionRole: Type: AWS::IAM::Role Properties: ### omitted code EKSClusterExtension: Type: AWS::CloudFormation::TypeActivation DependsOn: EKSClusterExtensionRole Properties: AutoUpdate: false ExecutionRoleArn: !GetAtt EKSClusterExtensionRole.Arn PublicTypeArn: !Sub "arn:aws:cloudformation:${AWS::Region}::type/resource/408988dff9e863704bcc72e7e13f8d645cee8311/AWSQS-EKS-Cluster" ### omitted code HelmResourceExecutionRole: Type: AWS::IAM::Role ### omitted code HelmCustomResource: Type: AWS::CloudFormation::TypeActivation DependsOn: HelmResourceExecutionRole Properties: AutoUpdate: false ExecutionRoleArn: !GetAtt HelmResourceExecutionRole.Arn PublicTypeArn: !Sub "arn:aws:cloudformation:${AWS::Region}::type/resource/408988dff9e863704bcc72e7e13f8d645cee8311/AWSQS-Kubernetes-Helm" Type: "RESOURCE"
Once they were deployed, we could see them in the extensions list:
And could proceed with the custom EKS stack:
AWSTemplateFormatVersion: '2010-09-09' Resources: ### omitted code EKSCluster: Type: "AWSQS::EKS::Cluster" Properties: Name: !Sub "${ProjectName}-${ClusterName}" Version: !Ref KubernetesVersion RoleArn: !GetAtt serviceRole.Arn LambdaRoleName: !ImportValue 'Fn::Sub': "${ProjectName}-EKSClusterExtensionRoleName" ResourcesVpcConfig: SubnetIds: - !ImportValue 'Fn::Sub': "${ProjectName}-PrivateSubnetA" - !ImportValue 'Fn::Sub': "${ProjectName}-PrivateSubnetB" - !ImportValue 'Fn::Sub': "${ProjectName}-PrivateSubnetC" SecurityGroupIds: - !Ref EKSSecurityGroup EndpointPrivateAccess: true EndpointPublicAccess: false EnabledClusterLoggingTypes: !If [ ControlPlaneLoggingEnabled, !Ref EKSClusterLoggingTypes, !Ref "AWS::NoValue" ] KubernetesApiAccess: Roles: - Arn: !GetAtt AdminEKSRole.Arn Username: "AdminRole" Groups: ["system:masters"] - Arn: !ImportValue 'Fn::Sub': "${ProjectName}-${Env}-HelmResourceExecutionRoleARN" Username: "DeployRole" Groups: ["system:masters"] - Arn: !Sub "{{resolve:ssm:/iam/deploy-role/arn}}" Username: JenkinsRole Groups: ["system:masters"] - Arn: !GetAtt NodeInstanceRole.Arn Username: "system:node:{{EC2PrivateDNSName}}" Groups: - "system:nodes" - "system:bootstrappers" ### omitted code NginxIngress: DependsOn: - Listener - EKSCluster Type: "AWSQS::Kubernetes::Helm" Condition: DeployNginxIngress Properties: ClusterID: !Sub "${ProjectName}-${ClusterName}" Namespace: ingress-nginx Chart: ingress-nginx Repository: "https://kubernetes.github.io/ingress-nginx" ValueYaml: !Sub | controller: service: enabled: true type: NodePort nodePorts: http: ${HttpIngressPort} https: ${HttpsIngressPort}
So, long story short, CloudFormation extensions were deprecated, and our template stopped working with the following error:
Template contains errors.: Template format error: Unrecognized resource types: [AWSQS::EKS::Cluster, AWSQS::Kubernetes::Helm]
Investigation
So the first place where we go to check the issue is a CloudFormation console, Activated extensions. Every extension should contain a valid Schema, which looks like this (example for “AWSQS::EKS::Cluster”):
But we saw this (Schema is not valid anymore, and we can not use this extension):
And the GitHub repository is archived:
Proposed solution
- The best solution would be to remove extensions and rewrite the CloudFormation stack, but this one did not fit due to time constraints.
- Alternative – as was said in the edited Schema above: “Fork the code and use it as a private resource type (at your own risk).”
So we chose the second one as a fast and temporary solution. We did not build extensions from sources; we just took an artifact from the public S3 bucket and created a Private CloudFormation Extension via the CF template:
--- AWSTemplateFormatVersion: "2010-09-09" Parameters: ProjectName: Type: String AllowedPattern: "^[a-zA-Z][a-zA-Z0-9_-]*$" Resources: HelmResourceExecutionRole: Type: AWS::IAM::Role Metadata: cfn_nag: rules_to_suppress: - id: F38 reason: 'official documentation https://github.com/aws-quickstart/quickstart-amazon-eks-cluster-resource-provider/blob/main/execution-role.template.yaml' Properties: MaxSessionDuration: 8400 AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: - "lambda.amazonaws.com" - "resources.cloudformation.amazonaws.com" Action: sts:AssumeRole Path: "/" Policies: - PolicyName: ResourceTypePolicy PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - "secretsmanager:GetSecretValue" - "kms:Decrypt" - "eks:DescribeCluster" - "s3:GetObject" - "sts:AssumeRole" - "iam:PassRole" - "ec2:CreateNetworkInterface" - "ec2:DescribeNetworkInterfaces" - "ec2:DeleteNetworkInterface" - "ec2:DescribeVpcs" - "ec2:DescribeSubnets" - "ec2:DescribeRouteTables" - "ec2:DescribeSecurityGroups" - "logs:CreateLogGroup" - "logs:CreateLogStream" - "logs:PutLogEvents" - "lambda:UpdateFunctionConfiguration" - "lambda:DeleteFunction" - "lambda:GetFunction" - "lambda:InvokeFunction" - "lambda:CreateFunction" - "lambda:UpdateFunctionCode" - "cloudformation:ListExports" - "ecr:GetAuthorizationToken" - "ecr:BatchCheckLayerAvailability" - "ecr:GetDownloadUrlForLayer" - "ecr:BatchGetImage" Resource: "*" HelmCustomResource: Type: AWS::CloudFormation::ResourceVersion Properties: TypeName: AWSQS::Kubernetes::Helm SchemaHandlerPackage: s3://aws-quickstart/quickstart-helm-resource-provider/awsqs-kubernetes-helm.zip ExecutionRoleArn: !GetAtt HelmResourceExecutionRole.Arn HelmCustomResourceDefaultVersion: Type: AWS::CloudFormation::ResourceDefaultVersion Properties: TypeVersionArn: !Ref HelmCustomResource EKSClusterExtensionRole: Type: AWS::IAM::Role Metadata: cfn_nag: rules_to_suppress: - id: F38 reason: 'official documentation https://github.com/aws-quickstart/quickstart-amazon-eks-cluster-resource-provider/blob/main/execution-role.template.yaml' Properties: MaxSessionDuration: 8400 AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: [resources.cloudformation.amazonaws.com, cloudformation.amazonaws.com, lambda.amazonaws.com] Action: sts:AssumeRole Path: "/" Policies: - PolicyName: ResourceTypePolicy PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - "sts:GetCallerIdentity" - "eks:CreateCluster" - "eks:DeleteCluster" - "eks:DescribeCluster" - "eks:ListTagsForResource" - "eks:UpdateClusterVersion" - "eks:UpdateClusterConfig" - "eks:TagResource" - "eks:UntagResource" - "iam:PassRole" - "sts:AssumeRole" - "lambda:UpdateFunctionConfiguration" - "lambda:DeleteFunction" - "lambda:GetFunction" - "lambda:InvokeFunction" - "lambda:CreateFunction" - "lambda:UpdateFunctionCode" - "ec2:DescribeVpcs" - "ec2:DescribeSubnets" - "ec2:DescribeSecurityGroups" - "ec2:CreateNetworkInterface" - "ec2:DeleteNetworkInterface" - "ec2:DescribeNetworkInterfaces" - "kms:CreateGrant" - "kms:DescribeKey" - "logs:CreateLogGroup" - "logs:CreateLogStream" - "logs:DescribeLogGroups" - "logs:DescribeLogStreams" - "logs:PutLogEvents" - "cloudwatch:ListMetrics" - "cloudwatch:PutMetricData" Resource: "*" EKSClusterExtension: Type: AWS::CloudFormation::ResourceVersion Properties: TypeName: AWSQS::EKS::Cluster SchemaHandlerPackage: s3://aws-quickstart/quickstart-amazon-eks-cluster-resource-provider/awsqs-eks-cluster.zip ExecutionRoleArn: !GetAtt EKSClusterExtensionRole.Arn EKSClusterExtensionDefaultVersion: Type: AWS::CloudFormation::ResourceDefaultVersion Properties: TypeVersionArn: !Ref EKSClusterExtension
So, the old CloudFormation stack was changed from subscription to the public third-party extension to the creation of the Private CF extension:
Extensions names were used the same for further compatibility:
Conclusion
Cloudformation extensions are not used frequently, so if you face an issue with them, finding a solution is not an ordinary task. If you use a public third-party CloudFormation extension, it can be retired at any moment, and your IaC will stop working. We used extensions for deploying the EKS cluster with Helm charts (the story is here). So, as a fast solution with minimal changes in infrastructure, we took the code and created the same CloudFormation extension, but Privately registered. We used a standard CloudFormation resource, but you can also use AWS CLI. I would avoid using the CloudFormation extension without a special need, but if you use it, remember what was written in this post.