I understood that when you are unable to create a policy when you are using log-group-name which has "/" in its name. and getting error message as "This policy defines some actions, resources, or conditions that do not provide permissions. To grant access, policies must have an action that has an applicable resource or condition."
I replicated the same in my environment and was able to specify the log-group-name with "/" successfully in the policy using the visual editor like that of yours.
I was able to confirm that there is no error message being listed while creating the policy but the message you specified is just an additional warning message and not the error which IAM generates to ensure that you have included all actions which support particular resource in the policy. You can refer  for more information.
 Search for "This policy defines some actions, resources, or conditions that do not provide permissions." - https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_policies.html#troubleshoot_policies-polsum
Once after editing the policy through Visual Editor, if you navigate to the JSON view of your policy, you will find " Errors: 0 and Warnings: 0 ". This means that your policy is not throwing any errors. If your policy have any issues, you can switch to the JSON view of the policy and can check if there is any error message or warning listed.
You can find the format of "Resource types defined by Amazon CloudWatch Logs" in below documentation :
Also, you can refer below documentation  to get the supported resource for each action, by just scrolling to the fourth column of each action listed and the respective format for that resource is specified in above documentation  :
Even after passing the correct resource in the policy IAM throws this warning message. This is the known issue. You can simply ignore the warning message if you consider that the resource you specified according to the action is appropriate and continue to save the policy.
You stated that : When I come back, the Arn I just entered is now listed on "log-group" instead of "log-streams" !
During the replication, I also observed the same behaviour. But when you switch to the JSON format of the policy, you will find the same Arn mentioned in the resource section of your policy. So, it will not have any impact on the policy implementation and will be taken in the log-stream format only at the time of evaluation of the policy as the Arn is specified in the log-stream format .
The Arns with "/" in their log-group names are recognized as "log-group names" as well as "log-streams" as log group name will have "/" and when we specify log-streams Arn we use log-group name so automatically that will be included in the "log-streams" Arns as well.
- How can I resolve the IAM trust policy error "Failed to update trust policy. Invalid principal in policy"?AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- How do I stream log data from CloudWatch Logs to a cross-Region and cross-account Kinesis data stream?AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 days ago
- EXPERTpublished 10 months ago