1 Answer
- Newest
- Most votes
- Most comments
0
Currently, AWS CodePipeline does not automatically create the correct IAM policy for log access when using the latest Amazon Linux 2 platform for Elastic Beanstalk. This requires manual intervention to update the policy and grant necessary permissions.
Continue to manually edit the auto-generated IAM role to include log access permissions. Add the following permissions:
{
"Effect": "Allow",
"Action": [
"logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents",
"logs:DescribeLogStreams"
],
"Resource": "arn:aws:logs:*:*:*"
}
Stay updated with AWS release notes for any announcements regarding this issue.
