Skip to content

HI i try to use cloudshell i am getting this error i added myself in IAM role cloudshell still not working

0

Enter image description here

if i try to delete cloudshell it may chance of lost ec2 and s3 bucket instances

asked a year ago184 views
2 Answers
0

Based on the error message you're seeing, it appears you're encountering an account verification issue with AWS CloudShell. This is not directly related to IAM roles or permissions, but rather to the status of your AWS account.

The error message "Unable to start the environment. You must verify your account before accessing CloudShell. To verify your account, contact AWS Support" indicates that there's a requirement for account verification before you can use CloudShell.

This issue cannot be resolved by adding yourself to an IAM role or adjusting CloudShell permissions. It's an account-level concern that requires intervention from AWS Support.

To resolve this, you need to contact AWS Support directly. Even if you're using the free tier, you can open a case with AWS Support for free under the "Account and billing" category. This is the appropriate channel to address account verification issues.

Regarding your concern about deleting CloudShell and potentially losing EC2 and S3 bucket instances - you don't need to worry about this. CloudShell is a separate service and deleting or having issues with CloudShell will not affect your EC2 instances or S3 buckets. These services operate independently of CloudShell.

To proceed, you should open a support case with AWS to verify your account. Once your account is verified, you should be able to use CloudShell without this error.
Sources
I cat't use cloudshell | AWS re:Post
Unable to start CloudShell must verify account.Contact AWS Support | AWS re:Post

answered a year ago
EXPERT
reviewed a year ago
0

It looks like you’re facing an IAM permission issue when trying to use AWS CloudShell. Even if you’ve added yourself to an IAM role, CloudShell requires specific permissions to work properly.

Steps to Fix:

1.Check IAM Policies: Ensure your IAM role has the necessary policies attached, such as AWSCloudShellFullAccess. You can check this in the IAM Console--> Roles--> [Your Role]-->Permissions.

2.Verify Service Control Policies (SCPs): If you’re in an AWS Organization, SCPs might be blocking CloudShell access.

3.Look at AWS Config & Guardrails: Some AWS Config rules or Organizational Service Control Policies might be restricting CloudShell use.

4.Try Another Region: Some AWS services behave differently across regions. If possible, test CloudShell in a different region.

Regarding Deletion:

No, deleting CloudShell will NOT affect your EC2 instances or S3 buckets. CloudShell is a separate service and does not directly interact with running instances or storage.

However, any temporary files stored in the CloudShell environment will be lost.

If it still doesn’t work, try running this AWS CLI command to check your current permissions:

aws sts get-caller-identity

This will confirm the active IAM role and its permissions.

answered a year ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.