Unable to attach the Instance Profile Role to EC2

0

Hi,

I'm getting this error while trying to attach an instance profile role under EC2 -> Security -> modify IAM Role:-

Enter image description here

Failed to describe Instance Profiles
Failed to describe Instance Profiles. User: arn:aws:sts::336247864862:assumed-role/test/vkshs is not authorized to perform: iam:ListInstanceProfiles on resource: arn:aws:iam::336247864862:instance-profile/ because no identity-based policy allows the iam:ListInstanceProfiles action.

It seems like policy issue attached to my identity. Kindly suggest me its root cause and what policy is required here to fix it.

Regards, Vinod Kumar

1回答
1
承認された回答

<<Remove your account id from the question error message at earliest.>>

You need to add following permission to your user/role for resource "instance profile name" through which you are logging to. this account:

Action:

 iam:ListInstanceProfiles

Policy to list EC2 and InstanceProfile would look like as below:

  {
        "Sid": "ListEc2AndListInstanceProfiles",
        "Effect": "Allow",
        "Action": [
            "iam:ListInstanceProfiles",
            "ec2:Describe*",
            "ec2:Search*",
            "ec2:Get*"
        ],
        "Resource": "*"
    }

Reference documentation

Once you add this to your role, you should be able to list instance profile.

Important point to note here is, AmazonEC2FullAccess managed policy doesn't have this permission however IAMReadOnlyAccess policy provides this access to all profiles, you may consider adding this policy too.

Hope you find this useful.

Abhishek.

profile pictureAWS
エキスパート
回答済み 9ヶ月前
profile pictureAWS
エキスパート
iBehr
レビュー済み 9ヶ月前
  • Thanks, your solution worked however when I select this role and submit the button for 'Update IAM role' then I get this following error as well:-

    Failed to attach instance profile You are not authorized to perform this operation. Encoded authorization failure message: 0v498g_npaKBtWgAS6pJbH.......................

  • There are two things here, that you need to do:

    aws sts decode-authorization-message --encoded-message "encode failure message" -> This will give you the details of the failure.

    Please follow this re:Post Knowledge center article, Attach or replace instance profile also see if you have iam:PassRole permissions already as I have see that to be an issue as well.

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ