The following describes the general methods for troubleshooting a CloudFormation issue encountered while deploying eMAM using CFT on AWS. You can use the AWS CloudFormation console to monitor the status of eMAM CloudFormation stack.
CloudFormation console Events tab: While deploying eMAM using CFT, in AWS CloudFormation console, click on the Events tab to find information on stack creation, updates, and deletions. If the stack fails to create, information on the Events tab usually gives you a general idea what has gone wrong. From this list, find the failure event and then view the status reason for that event. The status reason might contain an error message from AWS CloudFormation or from a particular service that can help you troubleshoot your problem.
CloudWatch log group: The eMAM system CloudFormation template creates a CloudWatch log group into which the log files are copied from the EC2 instance. The CloudWatch log group contains log streams, which include the ID of the instance with the log file name. This allows you to identify to which EC2 instance the log file pertains. If CloudFormation stack creation succeeds, the stack output parameters provide a link to the log group in the AWS Management Console.
If stack creation fails, go to the CloudFormation Resources list in the AWS Management Console to find the log group. Note that if stack creation fails before any instances are launched, a log group might not be created.
Use the CloudFormation console to view the status of your stack. In the console, you can view a list of stack events while your stack is being created, updated, or deleted. From this list, find the failure event and then view the status reason for that event. The status reason might contain an error message from AWS CloudFormation or from a particular service that can help you troubleshoot your problem.
Some resources must be empty before they can be deleted. For example, you must delete all objects in an Amazon S3 bucket or remove all instances in an Amazon EC2 security group before you can delete the bucket or security group.
Ensure that you have the necessary IAM permissions to delete the resources in the stack. In addition to AWS CloudFormation permissions, you must be allowed to use the underlying services, such as Amazon S3 or Amazon EC2.
You can use AWS-specific parameter types to ensure that you use valid values. For resource property names and values, update your template to use valid names and values. For a list of all the resources and their property names, see AWS resource and property types reference
Also, Amazon Rekognition is not available in all AWS Regions. For a list of all regions where Amazon Rekognition is available, see the AWS Region table.
Login failed: Ensure the login credentials used are correct and taken from the Outputs tab of the CloudFormation Stack console.
Default Username: admin@emamcloud.com
Default Password: Check the Outputs tab
Login screen does not appear: This could happen when the server is still in initializing stage, so please wait for 5 minutes and then try again.