Skip to content

Conversation

@ColeMurray
Copy link
Contributor

Fixes hardcoded log group in AWS IAM execution role policy that prevented using custom log groups with Fargate deployments.

Changes:

  • Add log_group parameter to get_execution_role_arn() function
  • Dynamically generate IAM policy with user-specified log group
  • Remove unused secretsmanager:GetSecretValue permission

This allows users to specify custom CloudWatch log groups via FargateDeploymentConfig.log_group and ensures the execution role has appropriate permissions for the configured log group.

Note: This change removes the secretsManager. It is unclear on what its intended usage was previously, as the policy has a mixed SecretManager action with Cloudwatch resources and would never match

Fixes hardcoded log group in AWS IAM execution role policy that prevented
using custom log groups with Fargate deployments.

Changes:
- Add log_group parameter to get_execution_role_arn() function
- Dynamically generate IAM policy with user-specified log group
- Remove unused secretsmanager:GetSecretValue permission

This allows users to specify custom CloudWatch log groups via
FargateDeploymentConfig.log_group and ensures the execution role has
appropriate permissions for the configured log group.
@klieret
Copy link
Member

klieret commented Sep 18, 2025

For this one I have to defer to @carlosejimenez , I'm not knowledgeable enough about AWS

@ColeMurray
Copy link
Contributor Author

@carlosejimenez when available, can you take a look?

@ColeMurray
Copy link
Contributor Author

@klieret @carlosejimenez any thoughts on this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants