1 Answer
- Newest
- Most votes
- Most comments
1
Hello,
For the logging feature to function correctly, the IAM policy attached to the IAM principal used to configure the feature must include the following permissions as a minimum requirement: https://docs.aws.amazon.com/vpn/latest/s2svpn/monitoring-logs.html
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"logs:CreateLogDelivery",
"logs:GetLogDelivery",
"logs:UpdateLogDelivery",
"logs:DeleteLogDelivery",
"logs:ListLogDeliveries"
],
"Resource": [
"*"
],
"Effect": "Allow",
"Sid": "S2SVPNLogging"
},
{
"Sid": "S2SVPNLoggingCWL",
"Action": [
"logs:PutResourcePolicy",
"logs:DescribeResourcePolicies",
"logs:DescribeLogGroups"
],
"Resource": [
"*"
],
"Effect": "Allow"
}
]
}
Relevant content
- asked 2 years ago
- asked 3 years ago
- asked 2 years ago
- AWS OFFICIALUpdated a year ago

Thank you for your valuable guidance.
I have added this policy to my IAM user. but still problem exists, no log generating for Cloudwatch log group