How do I resolve the "Log group does not exist" error for Lambda function logs in the CloudWatch console?

2 minute read

When I try to view logs for my AWS Lambda function in the Amazon CloudWatch console, I get a "Log group does not exist" error. How do I resolve the error?

Short description

If there's no log group for your Lambda function when you try to view your function's logs, then CloudWatch returns the following error:

"Log group does not exist. The specific log group: <log group name> does not exist in this account or region."

Logs are generated after you run your function for the first time. If there's no log group after invoking the function, it's usually because there's an issue with the function's AWS Identity and Access Management (IAM) permissions.

To troubleshoot a Log group does not exist error from CloudWatch, confirm the following:

  • Your Lambda function's execution role has sufficient permissions to write logs to CloudWatch.
  • The log group resource in the IAM policy includes the name of your function.

Note: For information on permissions-related logging issues with Lambda@Edge, see Service-linked roles for Lambda@Edge.


In the IAM console, review and edit the IAM policy for the Lambda function's execution role so that the following is true:

  • The write actions CreateLogGroup and CreateLogStream are allowed.
    Note: If you don't need custom permissions for your function, then you can attach the managed policy AWSLambdaBasicExecutionRole. This managed policy allows Lambda to write logs to CloudWatch.
  • The AWS Region specified in the Amazon Resource Name (ARN) is the same as your Lambda function's Region.
  • The log-group resource includes the name of your Lambda function. For example, if your function is named myLambdaFunction, the associated log-group is /aws/lambda/myLambdaFunction.

Below is an example policy that includes the required permissions for a Lambda role to access CloudWatch logs:

    "Version": "2012-10-17",
    "Statement": [
            "Effect": "Allow",
            "Action": "logs:CreateLogGroup",
            "Resource": "arn:aws:logs:region:accountId:*"
            "Effect": "Allow",
            "Action": [
            "Resource": [

Related information

AWS Lambda permissions

AWS OFFICIALUpdated 3 years ago

Thanks! It helped me to solve the problem.

replied 3 months ago

My IAM role's JSON is perfect, looks the same as the example but every time I create a new function and try to check CloudWatch I get the error.

replied 3 months ago

Thank you for your comment. We'll review and update the Knowledge Center article as needed.

profile pictureAWS
replied 3 months ago