On the Stage Editor pane, choose the Logs/Tracing tab.ģ. In the API Gateway console, find the Stage Editor for your API.Ģ. Add the IAM role in the API Gateway consoleġ. You'll need this Amazon Resource Name (ARN) in the next section.įor more information, see Permissions for CloudWatch Logging. ![]() ![]() Then, choose the role from the search results.ġ0. On the Roles pane, in the search bar, enter the name of the role that you created. (Optional) For Role description, edit the description to your preferences.ĩ. The policy has all the required permissions.įor Role name, enter a meaningful name for the role. Under Attached permissions policies, note that the AWS managed policy AmazonAPIGatewayPushToCloudWatchLogs is selected by default. On the Create role page, do the following:įor Select type of trusted entity, choose AWS Service.įor Choose a use case, choose API Gateway.įor Select your use case, choose API Gateway.Ĥ. In the AWS Identity and Access Management (IAM) console, in the left navigation pane, choose Roles.Ģ.
0 Comments
Leave a Reply. |