- Newest
- Most votes
- Most comments
Hello.
Have you created the DMS Fleet service link role correctly?
I think the service-linked role needs to have the following trust policy set.
https://docs.aws.amazon.com/dms/latest/userguide/slr-services-fa.html#create-slr-fa
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"Service": [
"dms.amazonaws.com",
"dms-fleet-advisor.amazonaws.com"
]
},
"Action": "sts:AssumeRole"
}
]
}
This does not work for me either.
I followed the guide here: https://docs.aws.amazon.com/dms/latest/userguide/fa-resources.html and created the roles VIA Cloudformation. (thus they should be 100% correct!)
Now regardless of I choose the FleetAdvisorS3Role OR the AWSServiceRoleForDMSFleetAdvisor role to create the collector, I receive the same error.
And since there are no real details as to exactly what is broken it is very impossible to triage to fix.
So, as I was playing with other areas of DMS (setting up a source endpoint using secrets in SecretManager) it yelped with a PROPER error message for the role I created to grant access to the secret. It stated it needed DMS trust access to dms.us-east-1.amazonaws.com!
So I added that domain to the list of Principal Services in the FleetAdvisorS3Role and it actually worked and created the collector.
Can we have the documentation updated to reflect this need of having the service with the region in the domain as being required?
I also struggled with documentation.
- Have used the cloudformation: https://docs.aws.amazon.com/dms/latest/userguide/samples/dms-fleetadvisor-iam-slr-s3.zip
- Wanted to create dta collector with very general error message
- And as described by Edwards extending: FleetAdvisorS3Role helped: console.aws.amazon.com/iam/home?region=eu-central-1#/roles/details/FleetAdvisorS3Role-eu-central-1?section=trust_relationships
- So please adapt the Cloudformation templates or documentation here.
Relevant content
- asked 25 days ago
- asked a year ago
- AWS OFFICIALUpdated 3 years ago

Yes my policy is exacly like that.
The steps i follow are really simples :
I checked the policy applied with this configuration and it's indeed exactly the same JSON as yours.