Software Engineering

How you can Repair “shouldn’t be licensed to create managed-rule” in AWS Step Features

How you can Repair “shouldn’t be licensed to create managed-rule” in AWS Step Features
Written by admin


If in case you have ever acquired the next error shouldn't be licensed to create managed-rule when operating a Step Perform by Terraform’s AWS Supplier, then you will have jumped by many various hoops attempting to determine what was improper.

What’s the Fast Repair?

Open the position in IAM and fix the CloudWatchEventsFullAccess AWS managed coverage to the permissions insurance policies.

Want Extra Info?

IAM Position Principal Coverage required to AssumeRole

{
    "Model" : "2012-10-17",
    "Assertion" : [
        {
        "Effect" : "Allow",
        "Principal" : {
            "Service" : "states.amazonaws.com"
        },
        "Action" : "sts:AssumeRole"
        }
    ]
}

IAM Position Coverage GetEvents For StepFunctions Execution Rule

{
    "Impact": "Permit",
    "Motion": [
        "events:PutTargets",
        "events:PutRule",
        "events:DescribeRule"
    ],
    "Useful resource": [
        "arn:aws:events:[[region]]:[[account]]:rule/StepFunctionsGetEventsForStepFunctionsExecutionRule"
    ]
}

IAM Position Coverage beneath StepFunctions CloudFormation

- Impact: Permit
  Motion:
  - occasions:PutTargets
  - occasions:PutRule
  - occasions:DescribeRule
  Useful resource: 
  - !Sub arn:${AWS::Partition}:occasions:${AWS::Area}:${AWS::AccountId}:rule/StepFunctionsGetEventsForStepFunctionsExecutionRule

If you’ll want to restrict it to a useful resource, then StepFunctionsGetEventsForStepFunctionsExecutionRule is the one you’re in search of!

About the author

admin

Leave a Comment