1 Answer
- Newest
- Most votes
- Most comments
0
Are the required policies set for the IAM roles as described in this document?
https://docs.aws.amazon.com/amplify/latest/userguide/ssr-CloudWatch-logs.html
Relevant content
- Accepted Answerasked a year ago
- asked 3 years ago
- asked a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a month ago
- AWS OFFICIALUpdated 2 months ago
- AWS OFFICIALUpdated 5 months ago
Yes, the role has the following policies established: { "Sid": "PushLogs", "Effect": "Allow", "Action": [ "logs:CreateLogStream", "logs:PutLogEvents" ], "Resource": "arn:aws:logs:us-east-1::log-group:/aws/amplify/:log-stream:" }, { "Sid": "CreateLogGroup", "Effect": "Allow", "Action": "logs:CreateLogGroup", "Resource": "arn:aws:logs:us-east-1::log-group:/aws/amplify/" }, { "Sid": "DescribeLogGroups", "Effect": "Allow", "Action": "logs:DescribeLogGroups", "Resource": "arn:aws:logs:us-east-1:***********:log-group:" }
Additionally, I share with you what only the cloudwatch registers for me:
[ { "@timestamp": "2023-06-22 21:11:39.740", "@message": "REPORT RequestId: 56ad9253-f559-4f59-ab59-0fddcf0a37b4\tDuration: 7.19 ms\tBilled Duration: 8 ms\tMemory Size: 1024 MB\tMax Memory Used: 213 MB\t\n" }, { "@timestamp": "2023-06-22 21:11:39.733", "@message": "START RequestId: 56ad9253-f559-4f59-ab59-0fddcf0a37b4 Version: $LATEST\n" } ]