2 Answers
- Newest
- Most votes
- Most comments
1
Hello.
Is it possible to see which IAM policies are currently attached?
The error is due to insufficient permissions to operate CloudWatch.
The permission "cloudwatch:PutMetricAlarm" must be set to edit CloudWatch Alarm.
The following documents may be helpful regarding CloudWatch permissions.
https://repost.aws/knowledge-center/cloudwatch-restrict-console-access
https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudwatch.html
0
Thanks, I've created the role, but now I can't assign the role, how do I get permissions to do that? I'm reviewing access denied troubleshooting.
answered 8 months ago
Relevant content
- How can I monitor daily EstimatedCharges and trigger a CloudWatch alarm based on my usage threshold?AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated a month ago
- AWS OFFICIALUpdated 19 days ago
- AWS OFFICIALUpdated 2 months ago