Difference between revisions of "Iam:CreateRole"
Jump to navigation
Jump to search
Line 7: | Line 7: | ||
│ 128: resource "aws_iam_role" "cluster" { | │ 128: resource "aws_iam_role" "cluster" { | ||
+ | |||
+ | User: arn:aws:sts::1234567890:assumed-role/xxxxx is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::1234567890:role/xxxxx [[with an explicit deny in an identity-based policy]] | ||
== Related == | == Related == |
Revision as of 09:15, 1 September 2023
│ Error: error creating IAM Role (education-eks-Z0u0TjYd20220217012453602100000003): AccessDenied: User: arn:aws:iam::123456789:user/YOUR_USER is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::123456789:role/education-eks-Z0u0TjYd20220217012453602100000003 │ status code: 403, request id: a98095c0-38b9-44bc-8243-da0a7c87e523 │ │ with module.eks.aws_iam_role.cluster[0], │ on .terraform/modules/eks/main.tf line 128, in resource "aws_iam_role" "cluster": │ 128: resource "aws_iam_role" "cluster" {
User: arn:aws:sts::1234567890:assumed-role/xxxxx is not authorized to perform: iam:CreateRole on resource: arn:aws:iam::1234567890:role/xxxxx with an explicit deny in an identity-based policy
Related
See also
- Terraform EKS, Terraform EKS module, Deploy EKS cluster using Terraform, Terraform EKS apply output,
terraform show, ~/.kube/config
,aws_eks_cluster, aws_eks_addon, module.eks_managed_node_group, eks-cluster.tf, node_groups, worker_groups
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer
Advertising: