Make sure that your IAM policy allows you to create and delete QuickSight service and roles similar to the following:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"iam:GetRole",
"iam:DetachRolePolicy",
"iam:DeleteRole",
"iam:AttachRolePolicy",
"iam:CreateRole"
],
"Resource":[
"arn:aws:iam::<Account-id>:role/service-role/aws-quicksight-service-role-v0"
"arn:aws:iam::<Account-id>:role/service-role/aws-quicksight-s3-consumers-role-v0"
]
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": [
"iam:ListPolicies",
"iam:GetPolicyVersion",
"iam:GetRole",
"iam:GetPolicy",
"iam:ListPolicyVersions",
"iam:ListAttachedRolePolicies",
"iam:GenerateServiceLastAccessedDetails",
"iam:ListEntitiesForPolicy",
"iam:ListPoliciesGrantingServiceAccess",
"iam:ListRoles",
"iam:GetServiceLastAccessedDetails",
"iam:ListAccountAliases",
"iam:ListRolePolicies",
"s3:ListAllMyBuckets"
],
"Resource": "*"
},
{
"Sid": "VisualEditor2",
"Effect": "Allow",
"Action": [
"iam:DeletePolicy",
"iam:CreatePolicy",
"iam:CreatePolicyVersion",
"iam:DeletePolicyVersion"
],
"Resource": [
"arn:aws:iam::<Account-id>:policy/service-role/AWSQuickSightIAMPolicy",
"arn:aws:iam::<Account-id>:policy/service-role/AWSQuickSightRDSPolicy",
"arn:aws:iam::<Account-id>:policy/service-role/AWSQuickSightS3Policy",
"arn:aws:iam::<Account-id>:policy/service-role/AWSQuickSightRedshiftPolicy"
"arn:aws:iam::<Account-id>:policy/service-role/AWSQuickSightS3ConsumersPolicy"
]
}
]
}