generated from amazon-archives/__template_Apache-2.0
-
Notifications
You must be signed in to change notification settings - Fork 11
Open
Description
When executing neptune-export with a java project, IAM role of the ECS is not able to access the neptune cluster with the below error. I have attached the below policy to the IAM role but still see the same error. How do I set up neptune export to look for one specific cluster instead of cluster:*?
An error occurred while exporting from Neptune: User: arn:aws:sts::xxxxxxxxxx:assumed-role/ecs-task-v2/xxxxxxxxxx is not authorized to perform: rds:DescribeDBClusters on resource: arn:aws:rds:us-east-1:xxxxxxxxxx:cluster:* because no identity-based policy allows the rds:DescribeDBClusters action (Service: AmazonNeptune; Status Code: 403; Error Code: AccessDenied;
Policy: {
"Version": "",
"Statement": [
{
"Action": [
"rds:DescribeDBInstances",
"rds:ListTagsForResource"
],
"Effect": "Allow",
"Resource": [
"Arn:aws:rds:us-east-1:xxxxxxxxxx:db:neptune”
],
"Sid": "AllowSpecificRDS1"
},
{
"Action": [
"rds:DescribeDBClusters",
"rds:ListTagsForResource",
"rds:DescribeDBClusterParameters"
],
"Effect": "Allow",
"Resource": [
"arn:aws:rds:us-east-1:xxxxxxxxxxcluster:neptune-cluster"
],
"Sid": "AllowSpecificRDS2"
}
]
}
Metadata
Metadata
Assignees
Labels
No labels