Difference between revisions of "Error: updating CloudWatch Logs Log Group"
Jump to navigation
Jump to search
Line 7: | Line 7: | ||
== See also == | == See also == | ||
+ | * {{aws_cloudwatch_log_group}} | ||
* {{tf apply}} | * {{tf apply}} | ||
* {{CW}} | * {{CW}} | ||
[[Category:TF]] | [[Category:TF]] |
Revision as of 10:41, 19 February 2024
Error: updating CloudWatch Logs Log Group (yourpath) tags: untagging resource (yourpath): operation error CloudWatch Logs: UntagLogGroup, https response error StatusCode: 400, RequestID: 123456, api error AccessDeniedException: User: user1234:assumed-role/role123456/gitHubSession is not authorized to perform: logs:UntagLogGroup on resource: 1234567:cluster: because no identity-based policy allows the logs:UntagLogGroup action │ │ with module.yourmodule.this[0], │ on .terraform/modules/yourclusters/main.tf line 106, in resource "yourlogsgroup" "this": │ 106: resource "aws_cloudwatch_log_group" "this" {
See also
aws_cloudwatch_log_group
terraform apply
[-auto-approve
|-refresh-only, -destroy | --help ]
, Terraform examples,Still creating...
, Terraform apply examples with errors- AWS monitoring: AWS CloudWatch: Logs, Logs Insights, Events, Alarms,
aws cloudwatch, aws logs
, Amazon CloudWatch Lambda Insights, AWS CloudWatch Container Insights, CloudWatch Dashboard, AWS CloudWatch Automatic Dashboards, Amazon RDS Performance Insights, Amazon CloudWatch Metric Streams, Amazon CloudWatch Lambda Insights,CloudwatchLogsGroup
, Amazon CloudWatch Anomaly Detection,cloudwatch kms key id
, CloudWatch agent, Amazon CloudWatch Evidently, namespace, Synthetics, Synthetics Canaries, YACE, Prometheus cloudwatch exporter, Amazon CloudWatch Observability Access Manager, Amazon CloudWatch Live Tail
Advertising: