Skip to content

Commit dc126cb

Browse files
whummerclaude
andcommitted
Add CloudWatch Logs permissions to Lambda execution role
Required for logs:PutLogEvents when IAM enforcement is enabled. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 3fe3266 commit dc126cb

1 file changed

Lines changed: 5 additions & 0 deletions

File tree

01-serverless-app/terraform/main.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -226,6 +226,11 @@ resource "aws_iam_role_policy" "lambda_policy" {
226226
policy = jsonencode({
227227
Version = "2012-10-17"
228228
Statement = [
229+
{
230+
Effect = "Allow"
231+
Action = ["logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutLogEvents"]
232+
Resource = "arn:aws:logs:*:*:*"
233+
},
229234
{
230235
# dynamodb:PutItem intentionally omitted for orders — see 03-iam-enforcement for the IAM demo
231236
Effect = "Allow"

0 commit comments

Comments
 (0)