1 Resposta
- Mais recentes
- Mais votos
- Mais comentários
0
Hello.
Is the following policy set in Lambda's access policy?
https://docs.aws.amazon.com/lambda/latest/dg/access-control-resource-based.html
https://repost.aws/knowledge-center/lambda-invoke-error-s3-bucket-permission
{
"Version": "2012-10-17",
"Id": "example-ID",
"Statement": [
{
"Sid": "s3invoke",
"Effect": "Allow",
"Principal": {
"Service": "s3.amazonaws.com"
},
"Action": "lambda:InvokeFunction",
"Resource": "arn:aws:lambda:Region:account-id:function:function-name",
"Condition": {
"StringEquals": {
"AWS:SourceAccount": "bucket-owner-account-id"
},
"ArnLike": {
"AWS:SourceArn": "arn:aws:s3:::awsexamplebucket1"
}
}
}
]
}
Conteúdo relevante
- AWS OFICIALAtualizada há um ano
- AWS OFICIALAtualizada há 8 meses
- AWS OFICIALAtualizada há 2 anos
Thanks for your revert, My question is that can we add triggers to lambda function alias using command line.
Yes, it is possible to set triggers using commands. And I think the error you shared may occur when there is a problem with Lambda's resource-based policy, so I think you need to check it.