Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Winston Cloudwatch doesn't work with EC2 and Assumed Role #220

Open
markolucky7 opened this issue Sep 7, 2023 · 0 comments
Open

Winston Cloudwatch doesn't work with EC2 and Assumed Role #220

markolucky7 opened this issue Sep 7, 2023 · 0 comments

Comments

@markolucky7
Copy link

I've tried to set up Winston Cloudwatch and it works perfectly if I have the AWS credentials in the .aws directory, or if I pass AWS credentials directly to WinstonCloudwatch.

It doesn't work when deployed to EC2, where we have an assumed role - with the correct policies. I keep getting:

 AccessDeniedException: User: xyz is not authorized to perform: logs:DescribeLogStreams 

The problem is that the xyz user is not the correct user from the Assumed role.

When I try to run the AWS CLI commands directly on EC2 they do work with the correct assumed role and I'm able to access CloudWatch Logs.

Has somebody tried that setup?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant