You probably have ever obtained the next error isn't approved to create managed-rule
when working a Step Operate via Terraform’s AWS Supplier, then you will have jumped via many alternative hoops attempting to determine what was incorrect.
What’s the Fast Repair?
Open the position
in IAM
and connect the CloudWatchEventsFullAccess
AWS managed coverage to the permissions insurance policies.
Want Extra Info?
IAM Function Principal Coverage required to AssumeRole
{
"Model" : "2012-10-17",
"Assertion" : [
{
"Effect" : "Allow",
"Principal" : {
"Service" : "states.amazonaws.com"
},
"Action" : "sts:AssumeRole"
}
]
}
IAM Function Coverage GetEvents For StepFunctions Execution Rule
{
"Impact": "Enable",
"Motion": [
"events:PutTargets",
"events:PutRule",
"events:DescribeRule"
],
"Useful resource": [
"arn:aws:events:[[region]]:[[account]]:rule/StepFunctionsGetEventsForStepFunctionsExecutionRule"
]
}
IAM Function Coverage underneath StepFunctions CloudFormation
- Impact: Enable
Motion:
- occasions:PutTargets
- occasions:PutRule
- occasions:DescribeRule
Useful resource:
- !Sub arn:${AWS::Partition}:occasions:${AWS::Area}:${AWS::AccountId}:rule/StepFunctionsGetEventsForStepFunctionsExecutionRule
If you have to restrict it to a useful resource, then StepFunctionsGetEventsForStepFunctionsExecutionRule
is the one you’re on the lookout for!