- Newest
- Most votes
- Most comments
Hello there,
I understand you would like to create a CloudFormation stack but you are not able to see any IAM role for CloudFormation to use for all operations performed on the stack.
For you to be able to see an IAM role when launching a CloudFormation stack, you must have an IAM service role that trusts the CloudFormation service. Instead of using your account credentials, CloudFormation then uses the role's credentials to create your stack.
The CloudFormation console will only be able to display roles that are created to be assumed by the CloudFormation service. Any other IAM roles not trusting the CloudFormation service will not show up on the drop down since it will not be useful for the service to use it for launching or managing your resources.
Please refer here for more on CloudFormation service role : https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-servicerole.html
Should you continue to encounter challenges please feel free to open a case from the account facing this issue so that you can share more information that would allow AWS Support access to the resources for further troubleshooting.
[+] https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/GettingStarted.Walkthrough.html [+] https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-service.html
Hi
Check your Trusted policy have the cloudofmration "Service": "cloudformation.amazonaws.com"
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs-self-managed.html
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "cloudformation.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
Relevant content
- asked 3 years ago
- asked 2 years ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 11 days ago
- AWS OFFICIALUpdated 2 years ago