问题
I am trying to create IAM Role in AWS, but while I am creating I am facing error
"We encountered the following errors while processing your request: Problem in attaching permission to role. Role will be created without permission. The policy failed legacy parsing "
{"Version": "2012-10-17", "Statement": [
{
"Effect": "Allow",
"Action": [
"logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents"
],
"Resource": "arn:aws:logs:*:*:*"
},
{
"Action": [
"sqs:SendMessage",
"sqs:GetQueueUrl"
],
"Effect": "Allow",
"Resource": "arn:aws:sqs:ap-northeast-1:SOME_ID_HERE:test-messages"
}]}
回答1:
I got this error, and couldn't figure it out. A colleague and I poured over it, and then we spotted that I had left a substitution variable without the Fn::Sub
, e.g.
"Resource": "arn:aws:logs::${AWS::AccountId}:*
will cause this error, and of course should be
"Resource": { "Fn::Sub": "arn:aws:logs::${AWS::AccountId}:*" }
BTW, in my experience, I agree with E.J. Brennan above, you cannot use a wildcard for region, instead leave it blank as I did there.
回答2:
If it fails for s3, ensure that you are using the correct arn format:
Correct one is 3 ::: arn:aws:s3:::AccountABucketName
"Resource": "arn:aws:s3:::AccountABucketName"
Wrong one 2 :: arn:aws:s3::AccountABucketName
"Resource": "arn:aws:s3::AccountABucketName"
回答3:
A fun new error state I found today:
If:
- you have a CFN template where you provide an Account ID via a parameter
- AND you use the
Default
prop of the parameter to provide the Account ID - AND the Account ID starts with a
0
CFN will actually read the parameter as an integer (and cast it to like 9.3476294382E10)
- regardless of whether you have Type: String
on the parameter, or use !!str
to explicitly cast it.
So the solution is to manually provide the parameter to the deployment instead of using the Default: "093476294382"
.
Hope I can save someone else some time.
回答4:
I don't think you can wildcard the region on the arn, so you may need something like this instead:
arn:aws:logs:us-east-1:*:*
, where you specify the region you are using in place of us-east-1.
More information here:
http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html#arn-syntax-cloudwatch-logs
回答5:
One issue you may have is cloudwatch Logs ARNS can have 6 : symbols because there is an extra between log group and log stream. For example:
"Resource": "arn:aws:logs:us-west-2:123456789012:/my/log/group:log-stream"
or for your case:
"Resource": "arn:aws:logs:*:*:*:*
I have found that some ARNS such as the more specific example above give this error if a 6th : is not added. I realize this does contradict the docs (including doc provided by E.J) so perhaps it's a bug within AWS somewhere
http://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/iam-identity-based-access-control-cwl.html
回答6:
I would think you could do
"Resource": "arn:aws:logs:us-west-2:123456789012:*"
but if not, you can map your accounts to the region with a mapping:
"mAWSRegionToAccountsMap": {
"us-west-2": {
"prod": "444444444673",
"dev": "678333333333"
},
"us-gov-west-1": {
"dev": "12345678903",
"prod": "234345345345"
}
}
Then integrate the mapping into a join using a ":" for the delimiter
"Resource": {
"Fn::Join": [
":",
[
"arn:aws:logs",
{
"Ref": "AWS::Region"
},
{
"Fn::FindInMap": [
"mAWSRegionToAccountsMap", {
"Ref": "AWS::Region"
},
"prod"
]
},
"/*"
]
]
}
May need to tweak the ending
来源:https://stackoverflow.com/questions/43045029/the-policy-failed-legacy-parsing