Skip to content

3.14.2 possible regression: not authorized to perform: cloudwatch:TagResource on cloudwatch #7331

@ezrizhu

Description

@ezrizhu

using pcluster API 3.14.2, cluster fails on creation of HeadNodeAlarmD6381F07 Due to
Resource handler returned message: "Encountered a permissions error performing a tagging operation, please add required tag permissions. See https://repost.aws/knowledge-center/cloudformation-tagging-permission-error for how to resolve. Resource handler returned message: "Unauthorized tagging operation"" (RequestToken: 5d0428cd-9eba-7b8d-e27c-56bafd52bf6f, HandlerErrorCode: UnauthorizedTaggingOperation)

{
    "eventVersion": "1.11",
    "userIdentity": {
        "type": "AssumedRole",
        "principalId": "AROAXXXXXXXXXXXXXXXXX:pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX",
        "arn": "arn:aws-us-gov:sts::XXXXXXXXXXXX:assumed-role/ParallelClusterLambdaRole-XXXXXXXX/pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX",
        "accountId": "XXXXXXXXXXXX",
        "accessKeyId": "ASIAXXXXXXXXXXXXXXXX",
        "sessionContext": {
            "sessionIssuer": {
                "type": "Role",
                "principalId": "AROAXXXXXXXXXXXXXXXXX",
                "arn": "arn:aws-us-gov:iam::XXXXXXXXXXXX:role/ParallelClusterLambdaRole-XXXXXXXX",
                "accountId": "XXXXXXXXXXXX",
                "userName": "ParallelClusterLambdaRole-XXXXXXXX"
            },
            "attributes": {
                "creationDate": "2026-04-10T08:30:07Z",
                "mfaAuthenticated": "false"
            }
        },
        "invokedBy": "cloudformation.amazonaws.com",
        "inScopeOf": {
            "issuerType": "AWS::Lambda::Function",
            "credentialsIssuedTo": "arn:aws-us-gov:lambda:us-gov-west-1:XXXXXXXXXXXX:function:pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX"
        }
    },
    "eventTime": "2026-04-10T08:34:59Z",
    "eventSource": "monitoring.amazonaws.com",
    "eventName": "PutCompositeAlarm",
    "awsRegion": "us-gov-west-1",
    "sourceIPAddress": "cloudformation.amazonaws.com",
    "userAgent": "cloudformation.amazonaws.com",
    "errorCode": "AccessDenied",
    "errorMessage": "User: arn:aws-us-gov:sts::XXXXXXXXXXXX:assumed-role/ParallelClusterLambdaRole-XXXXXXXX/pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX is not authorized to perform: cloudwatch:TagResource on resource: arn:aws-us-gov:cloudwatch:us-gov-west-1:XXXXXXXXXXXX:alarm:pcluster-XXXXX-HeadNode because no identity-based policy allows the cloudwatch:TagResource action",
    "requestParameters": null,
    "responseElements": null,
    "requestID": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
    "eventID": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
    "readOnly": false,
    "eventType": "AwsApiCall",
    "managementEvent": true,
    "recipientAccountId": "XXXXXXXXXXXX",
    "eventCategory": "Management"
}

(untested yet) Seems to be fixed by #7296 Resolved on 3.15.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions