Difference between revisions of "Error: updating CloudWatch Logs Log Group"
Jump to navigation
Jump to search
(Created page with " Error: updating CloudWatch Logs Log Group (yourpath) tags: untagging resource (yourpath): operation error CloudWatch Logs: UntagLogGroup, https response error StatusCode: 40...") |
|||
Line 8: | Line 8: | ||
== See also == | == See also == | ||
* {{tf apply}} | * {{tf apply}} | ||
+ | * {{CW}} | ||
[[Category:TF]] | [[Category:TF]] |
Revision as of 10:38, 19 February 2024
Error: updating CloudWatch Logs Log Group (yourpath) tags: untagging resource (yourpath): operation error CloudWatch Logs: UntagLogGroup, https response error StatusCode: 400, RequestID: 123456, api error AccessDeniedException: User: user1234:assumed-role/role123456/gitHubSession is not authorized to perform: logs:UntagLogGroup on resource: 1234567:/aws/eks/cc-prd-design-use1-01/cluster:log-stream: because no identity-based policy allows the logs:UntagLogGroup action │ │ with module.yourmodule.this[0], │ on .terraform/modules/yourclusters/main.tf line 106, in resource "yourlogsgroup" "this": │ 106: resource "yourlogsgroup" "this" {
See also
terraform apply
[-auto-approve
|-refresh-only, -destroy | --help ]
, Terraform examples,Still creating...
, Terraform apply examples with errors- AWS monitoring: AWS CloudWatch: Logs, Logs Insights, Events, Alarms,
aws cloudwatch, aws logs
, Amazon CloudWatch Lambda Insights, AWS CloudWatch Container Insights, CloudWatch Dashboard, AWS CloudWatch Automatic Dashboards, Amazon RDS Performance Insights, Amazon CloudWatch Metric Streams, Amazon CloudWatch Lambda Insights,CloudwatchLogsGroup
, Amazon CloudWatch Anomaly Detection,cloudwatch kms key id
, CloudWatch agent, Amazon CloudWatch Evidently, namespace, Synthetics, Synthetics Canaries, YACE, Prometheus cloudwatch exporter, Amazon CloudWatch Observability Access Manager, Amazon CloudWatch Live Tail
Advertising: