- Newest
- Most votes
- Most comments
Well I resolved this issue with support's help. For anyone facing this issue, the fix was pretty simple (isn't it always!?). For anyone else having this issue here is what the resolution was in my case. I created a task definition in ECS using a .json file and specified the logDriver = awslogs. Pretty standard and well documented. In my use case the task and the network configuration from the lambda had to be overriden to pass in different parameters. The subnets that I was specifying in the lambda had themselves had public IP enabled BUT from the lambda I was not specifying that this should be the case, hence the task was being called but was failing. The task needed to specify AssignPublicIp property in the network config and set it to true, for the task to do anything meaningful. Once I made this change, everything worked like a champ.
Yes, actually out of frustration I have given it AdministratorAccess. Still no dice
Does the ECS Task have the correct IAM Permissions to create/put log groups and streams to cloudwatch?
Relevant content
- Accepted Answerasked 8 months ago
- Accepted Answerasked 2 years ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 months ago
Assuming your using AWS Log Driver?
https://docs.aws.amazon.com/AmazonECS/latest/userguide/using_awslogs.html