From 7040c84ed8d8a4618f65d4368ef490880ed80431 Mon Sep 17 00:00:00 2001 From: Keith Cantrell Date: Thu, 6 Feb 2025 16:04:28 -0600 Subject: [PATCH] Updated based no comments received. --- .../NetApp-FSxN-Custom-Resources-Samples/README.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/CloudFormation/NetApp-FSxN-Custom-Resources-Samples/README.md b/CloudFormation/NetApp-FSxN-Custom-Resources-Samples/README.md index d9a7d98..7bd02c6 100644 --- a/CloudFormation/NetApp-FSxN-Custom-Resources-Samples/README.md +++ b/CloudFormation/NetApp-FSxN-Custom-Resources-Samples/README.md @@ -56,7 +56,7 @@ Outputs: ``` You can use the above template to create the role by running the following command: ``` -aws cloudformation create-stack --stack-name create_execution_role_for_NetApp_CF_extensions --template-body file:// --capabilities CAPABILITY_NAMED_IAM +aws cloudformation create-stack --stack-name CreateExecutionRoleForNetAppCFextensions --template-body file:// --capabilities CAPABILITY_NAMED_IAM ``` ### Step 2: Activate the Extensions @@ -86,7 +86,8 @@ Where: - `` is the AWS region you want to activate the extensions in. - `,` are the subnet(s) you want to deploy the link in. No spaces between the subnet IDs. Only one is required, but is recommended to have at least two. These subnets must have access to the FSxN management endpoint. -- `,` are the security group that will be attached to the Lambda Link function. +- `,` are the security group(s) that will be attached to the Lambda Link function. +The security groups must allow access to the FSxN management endpoint over port 443. No spaces between the security group IDs. Only one is required. - `` is the name you want to give the link. It is also used as the name assigned to the link Lambda function.