-
-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
InvalidCloudWatchLogsRoleArnException #2
Comments
|
@Jamie-BitFlight any idea why it might not be working? |
Yes, I think it’s because of the change I made to the resources in the policy today. It should be a quick fix. Sorry guys. I’ll be online in about 10 hours and will fix it then. |
@oddietaco I have just submitted a PR for the fix. data "aws_iam_policy_document" "policy" {
statement {
effect = "Allow"
actions = ["logs:CreateLogStream"]
resources = [
"arn:aws:logs:${var.region}:${data.aws_caller_identity.current.account_id}:log-group:${aws_cloudwatch_log_group.default.name}:log-stream:*",
]
}
statement {
effect = "Allow"
actions = ["logs:PutLogEvents"]
resources = [
"arn:aws:logs:${var.region}:${data.aws_caller_identity.current.account_id}:log-group:${aws_cloudwatch_log_group.default.name}:log-stream:*",
]
}
} |
Closing for now. Please reopen if the problem persists. |
When I run
apply
, I get the following error message:The code I'm running is a direct copy/paste from your example.
The text was updated successfully, but these errors were encountered: