Replies: 1 comment 2 replies
-
We also received the same note (probably many have). Currently, Serverless does not seem to add the logs:TagResource permission to the default policy created for Lambda roles. The info sounds like this may lead at least to new Lambda LogGroups not being tagged when created by AWS Lambda. I am not sure if this applies only to new accounts or also to existing ones, I find the info a bit fuzzy regarding this, also says "we RECOMMEND you add logs:TagResouce ..." for new log groups. So it may even be not required at all... To be safe, you could add the following IAM policy statement in serverless.yml (for Lambda): service: <servicename>
stage: ...
provider:
name: aws
...
iam:
role:
statements:
- Effect: "Allow"
Action:
- "logs:TagResource"
Resource:
- !Sub "arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/${self:service}-${sls:stage}*:*" or similar. Or open a PR for adding this to the default role ;) |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I got the following email from AWS this week:
Will this affect Serverless if trying to deploy resources to a new account that hasn't used the old APIs before?
Beta Was this translation helpful? Give feedback.
All reactions