New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS Lambda getting AccessDeniedException
when spinning up with vpc_config
#13175
Comments
Is there any update on this? |
We are facing this issue. Someone please comment and help. Thanks in advance! |
I am facing the same issue. Please provide any solution. Thanks in advance. |
I figured it out, it turned out that my lambda source file was not accessible.
make sure that your zip file is accessible. |
For me. there was an issue with IAM: PassRole for my role. |
add depends_on in lambda function to wait for policies to be attached to role before lambda is being provisioned. |
I just did stupid mistake, that mean I use different lambda layers. Normally I use ap-northeast-1 for development. In this case I switched region to us-west-2 for practical use. Like me, some people may misconfigure on other region resouces Before layers = [
"arn:aws:lambda:ap-northeast-1:770693421928:layer:Klayers-python38-requests:9"
] After solved😄
|
I came across the same error message, while my problem is that the S3 bucket specified in the config file doesn't exist. |
Hey all 👋 Thank you for taking the time to discuss this issue. It looks like the original issue may be a result of a few different possible configuration issues rather than a bug with the provider. I'm going to go ahead and close this issue for now. If you feel I've done this in error, please do let me know. |
Bonjour, comment je peux assuré que mon fichier zip est accessible |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
I'm trying to spin up Lambda function with vpc_config, but I'm getting
AccessDeniedException
error. The role getting used in Lambda hasAWSLambdaVPCAccessExecutionRole
policy attached to it which give Lambda permission to create necessary resources. I have also manually (via console) created a Lambda with VPC_config using the same role created via terraform.Terraform Version
Terraform v0.11.10
Affected Resource(s)
Terraform Configuration Files
Debug Output
aws_lambda_function.dummy: 1 error(s) occurred:
aws_lambda_function.dummy: Error modifying Lambda Function Configuration dummy-lambda: AccessDeniedException:
status code: 403, request id: 74e2661b-99c8-425a-98f1-11f5eef89a98
Expected Behavior
Lamba should get created as I'm able to create the Lambda using the console with the same set of permissions.
Actual Behavior
Getting AccessDenied
Steps to Reproduce
terraform apply
The text was updated successfully, but these errors were encountered: