Hello,
I am using AWS Managed Grafana (A), and I am trying to access CloudWatch logs in another account (B). In account B, I created a role with permissions to CloudWatch and I am using the following trust policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:sts::ACCOUNT_A_ID:root"
},
"Action": [
"sts:AssumeRole"
]
}
]
}
Yet, when I test the connection, it I get the following errors:
is not authorized to perform: sts:AssumeRole on resource
Has anyone had this issue before?