You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
we would like to use an existing role for logging configuration because our permission setup, but when the attribute is set, it is still trying to create a new role
appsync configuration
Works fine with v1 but currently upgrading to v2 and I have to comment logging part as cause an error:
...
logging:
roleArn: !Sub arn:aws:iam::${AWS::AccountId}:role/${self:service}-${self:provider.stage}-appsync-cloudwatch-role
enable: true
level: ALL # Logging Level: NONE | ERROR | ALL
...
Getting error
CREATE_FAILED: GraphQlApiLogGroupRole (AWS::IAM::Role)
Resource handler returned message: "Encountered a permissions error performing a tagging operation, please add required tag permissions. See https://repost.aws/knowledge-center/cloudformation-tagging-permission-error for how to resolve. Resource handler returned message: "User: arn:aws:sts::xxxxxxxxxxxx:assumed-role/serverless-cloudformation-execution-role/AWSCloudFormation is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::xxxxxxxxxxx:role/app-GraphQlApiLogGroupRole-MJ5cSpD5M4a7 because no identity-based policy allows the iam:CreateRole action
we would like to use an existing role for logging configuration because our permission setup, but when the attribute is set, it is still trying to create a new role
appsync configuration
here is the output
The text was updated successfully, but these errors were encountered: