• Products
  • Get started
  • Documentation
  • Resources

Configure Amazon action channels after data residency moves

If you’re using any of the following Amazon action channels in Opsgenie and you’ve made a data residency move, be sure to update the SNS topics and IAM roles in your AWS accounts for them to continue to work as expected.

For any new Amazon action channels you’re adding however, the CloudFormation Template will automatically take the account ID of your new data residency location.

For Amazon System Manager Channel

  1. Log in to your Opsgenie account (in the location you moved your data residency to).

  2. Reconfigure the action channel by using any of the following options:

Option 1: Create an SNS topic

  1. Go to the CloudFormation Template page, select the template, and run it again to create an IAM role.

  2. Update the rest of the configuration as needed.

Image showing the field where you can select the CloudFormation template

Option 2. Update an existing IAM role

  1. Select a team and go to Actions.

  2. Go to the ClouldFormation template page:

    1. Enter any character in AWS Role, for the CloudFormation template icon to show.

    2. Select the arrow icon to open the template page.

  3. Select CloudFormation Template and copy the AccountID.

  4. Go to your AWS account and update the opsgenie-automation-action-* rule:

    1. Go to AWS > IAM > Roles > opsgenie-automation-action-* > Trust Relationship

    2. Update “AWS”:
      The current value should read something like:

      1 "arn:aws:iam::<your_old_accountID>:role/opsgenie-actions-app"

      Add a comma at the end and add another entry for the new AccountID you copied in Step c.

      For example:

      1 "AWS": [ "arn:aws:I am::<your_old_accountID>:role/opsgenie-actions-app", "arn:aws:I am::<your_new_accountID>:role/opsgenie-actions-app" ]
  5. Select Save changes.

For Outgoing Amazon SNS, Amazon Security Hub, and Amazon SNS Channels

Option 1: Create an SNS topic

  1. Go to the CloudFormation Template page, select the template, and run it again to create an SNS topic.

  2. Update the rest of the configuration as needed.

Image showing the field where you can select the CloudFormation template

Option 2. Update an existing IAM role

  1. Select an Outgoing Amazon SNS, Amazon Security Hub, or Amazon SNS channel.

  2. Select CloudFormation template and copy the AccountID.

  3. Open the AWS console.

  4. Go to AWS > Topic > <topicName> > Edit > Access Policy.

  5. Update "AWS":
    The current value should read something like:

    1 "arn:aws:iam::<your_old_accountID>:root"

    Add a comma to the end and add another entry for the new AccountID you copied in Step 2.

    For example:

    1 "AWS": [ "arn:aws:I am::<your_old_accountID>:root", "arn:aws:I am::<your_new_accountID>:root" ]

 

Additional Help