I'm trying to use Firehose API (JS) and I keep getting the following error:
"InvalidArgumentException: Firehose is unable to assume role arn:aws:iam::XXXXXXXXXX:role/NAME. Please check the role provided.
I check the role and I have set my custom policy to include all resources for STS and Firehose action. I have no clue why this error exists if I'm allowing AssumeRole
under STS.
Method Calling
The method I'm using is createDeliveryStream(params = {}, callback)
with S3DestinationConfiguration
.
Policy JSON
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"iam:*",
"kinesisvideo:*",
"s3:PutAccountPublicAccessBlock",
"s3:GetAccountPublicAccessBlock",
"s3:ListAllMyBuckets",
"s3:*",
"firehose:*",
"sts:*",
"s3:HeadBucket"
],
"Resource": "*"
}
]
}
I'm trying to use Firehose API (JS) and I keep getting the following error:
"InvalidArgumentException: Firehose is unable to assume role arn:aws:iam::XXXXXXXXXX:role/NAME. Please check the role provided.
I check the role and I have set my custom policy to include all resources for STS and Firehose action. I have no clue why this error exists if I'm allowing AssumeRole
under STS.
Method Calling
The method I'm using is createDeliveryStream(params = {}, callback)
with S3DestinationConfiguration
.
Policy JSON
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"iam:*",
"kinesisvideo:*",
"s3:PutAccountPublicAccessBlock",
"s3:GetAccountPublicAccessBlock",
"s3:ListAllMyBuckets",
"s3:*",
"firehose:*",
"sts:*",
"s3:HeadBucket"
],
"Resource": "*"
}
]
}
Share
Improve this question
edited Apr 25, 2019 at 19:03
Brian Nezhad
asked Apr 25, 2019 at 17:06
Brian NezhadBrian Nezhad
6,26810 gold badges47 silver badges70 bronze badges
7
|
Show 2 more comments
1 Answer
Reset to default 22Please check the trust relationship defined in the IAM role and verify that it is set to firehose.amazonaws.com
. Policy defined in Trust relationship enables services to assume the role. For Kinesis Firehose, refer this document which contains details about IAM roles for Firehose. Refer "Grant Kinesis Data Firehose Access to an Amazon S3 Destination" section in the document which mentions about trust policy.
Principal
element. – guest Commented Apr 25, 2019 at 17:31firehose.amazonaws.com
? – krishna_mee2004 Commented Apr 25, 2019 at 19:39