The KMSAccessDeniedException
error occurs when an IAM role is deleted, then another role created with the same name. IAM roles have an internal ID, and the Lambda function is now referring to a deleted IAM role.
Fix procedure:
- go to AWS console
- go to AWS lambda services and search for
stackstate-topo-cron
function - go to Configuration tab
- change Execution role
StackStateTopoCronRole
to any other role you currently have (if you don’t have any other role, create a temporary one by selection the option Create a new role from AWS policy templates) - save
- change Execution role back to
StackStateTopoCronRole
- save again
- go to Test tab and execute the
stackstate-topo-cron
Lambda by pressing test button (usehello-world
sample for creating test event)
Comments
0 comments
Article is closed for comments.