- Más nuevo
- Más votos
- Más comentarios
When dealing with AWS Lake Formation blueprints, especially those related to AWS CloudTrail, it's important to ensure that the IAM role you are trying to use is correctly configured and meets the requirements.
Verify IAM Role Trust Relationship
{
"Effect": "Allow",
"Principal": {
"Service": [
"lakeformation.amazonaws.com"
]
},
"Action": "sts:AssumeRole"
}
Verify the IAM Role policies
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudtrail:PutObject",
"cloudtrail:CreateTrail",
"cloudtrail:StartLogging"
// Add other necessary permissions
],
"Resource": "*"
}
]
}
Make sure AWS CloudTrail is configured properly and is logging events to an S3 bucket. The IAM role used by Lake Formation should have the necessary permissions to interact with CloudTrail events.Ensure that AWS CloudTrail, S3, and Lake Formation are all in the same AWS region.Sometimes, the AWS Management Console might not reflect the latest changes immediately. Try refreshing your browser or logging out and logging back into the AWS Management Console to ensure that you are working with the latest information If the issue persists and you've gone through the above steps, consider reaching out to AWS Support for more detailed assistance. They can help investigate the issue specific to your AWS account and region
Hope it clarifies and if does I would appreciate answer to be accepted so that community can benefit for clarity, thanks ;)
Thank you Debolek, I did a thorough review of every action you mentioned above and unfortunately, it didn't work. I'll be in contact with AWS support team. Cheers
Contenido relevante
- OFICIAL DE AWSActualizada hace un año
- OFICIAL DE AWSActualizada hace 2 años