Cloudformation FirewallPolicy UPDATE_FAILED

Cloudformation FirewallPolicy UPDATE_FAILED

Table of Contents

While I have a fond love for Cloudformation, sometimes I find myself banging my head against a wall when trying to get past an error.

This time it’s related to AWS::NetworkFirewall::FirewallPolicy.

The Issue

The policy associated with an AWS Network firewall can be configured in either DEFAULT_ACTION_ORDER or STRICT_ORDER ordering for stateful rules.

For more info on this see the documentation here and the cloudformation reference here

However, one thing the documentation doesn’t state is that this cannot be changed once the policy is created. The cloudformation reference above states the update requires no interruption.

If you attempt to change from default to strict, the following error will rear its ugly head.

Resource handler returned message: “parameter is invalid, parameter: [STRICT_ORDER] (Service: NetworkFirewall, Status Code: 400, Request ID: xxx)” (RequestToken: xxx, HandlerErrorCode: InvalidRequest)

I found this post moaning about this issue from December 2021.

https://www.reddit.com/r/aws/comments/rivrun/cfn\_networkfirewall\_help/

How to fix it

The fix for this is easy, just create another policy and associate it with your firewall, then remove the old one from your template.

The AWS::NetworkFirewall::RuleGroup StatefulRuleOptions suffers from the same issue and cannot be adjusted once provisioned.

I hope this helps someone else and removes any unnecessary head-banging!

Cheers

Share :

Related Posts

How to sync containers to AWS ECS the easy way

How to sync containers to AWS ECS the easy way

Back in November 2021 AWS announced that you can cache containers from DockerHub through to ECS.

Read More
Bootstrap Terraform on AWS

Bootstrap Terraform on AWS

The Challenge Terraform is a great product for managing infrastructure on AWS however many people start by creating an iam user and sharing access keys into configuration files. This is really bad from a security aspect as these often get checked into version control and even worse in a public repo.

Read More
AWS Config Rules Blessed with Cloudformation cfn-guard Support!

AWS Config Rules Blessed with Cloudformation cfn-guard Support!

They said it was coming, and here it is! Support for defining custom cfn-guard rules for AWS Config via Cloudformation.

Read More