2 Respostas
- Mais recentes
- Mais votos
- Mais comentários
1
Looks like this was indeed self-inflicted. When I went to the IAM role, I discovered that logging was authorized only for a specific ARN. Checking the "authorize for all in this group" button resulted in my starting to get logs again.
I don't remember when I would have changed that, but.... Whew.
respondido há 2 anos
0
Please check if your Lambda function's execution Role has permissions to write logs to CloudWatch. You can use the AWS managed policy AWSLambdaBasicExecutionRole or if you are creating the IAM role/policy manually (and follow least privilege), refer to this document: https://docs.aws.amazon.com/lambda/latest/operatorguide/access-logs.html
respondido há 2 anos
Conteúdo relevante
- AWS OFICIALAtualizada há 3 anos
- AWS OFICIALAtualizada há um ano
- AWS OFICIALAtualizada há 3 anos
- AWS OFICIALAtualizada há 2 anos