Cloudwatch logs role arn must be set in account settings to enable logging - However, it seems there is no parameter to set them in awsapigatewaystage although it has access loggging configuration parameters.

 
UPDATE For APIGatewayV2 - Access Logs only (Execution logs aren&x27;t available for http). . Cloudwatch logs role arn must be set in account settings to enable logging

Cloudwatch logs role arn must be set in account settings to enable logging. September 8, 2021 Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. In the AWS Identity and Access Management (IAM) console, in the navigation pane, choose Roles. Wondering if there are another resources to use or simply those parameters have not been implemented. Enter the ARN of the IAM role we just created in the CloudWatch log role ARN field and hit Save. Web. Exception encountered (stack trace below). tabindex"0" title"Explore this page" aria-label"Show more" role"button" aria-expanded"false">. Select System > Logging. Select your API . For Target bucket, enter the name of the bucket that you want to receive the log record objects. Some API operations can require permissions for more than one action in order to perform the API operation. Exception encountered (stack trace below). Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Role permission. stagename method. tf line 233, in resource "awsapigatewaystage" "MyApiGatewayStage" 233 resource "awsapigatewaystage" "MyApiGatewayStage. addmanagedpolicy (iam. com; Rank 37,268 Visitors 11,000;. Role permission. Select your API project from the left panel, select Stages, then pick the stage you want to enable logging for. Feb 1, 2023 Overview This guide provides instructions to set up single sign-on (SSO) with OneLogin using the SAML 2. Listen CloudWatch Logs role ARN must be set in account settings to enable logging To fix this you have to add code. Create a policy document. tf line 233, in resource "awsapigatewaystage" "MyApiGatewayStage" 233 resource "awsapigatewaystage" "MyApiGatewayStage. Web. Managing access to resources A permissions policy describes who has access to what. Additionally, permissions must be granted to AWS to. Choose Settings from the primary navigation panel and enter an ARN of an IAM role with appropriate permissions in CloudWatch log role ARN. Create role in IAM with next policy. Sign in to the API Gateway console at httpsconsole. stagename method. Create role in IAM with next policy. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Choose LogsTracing in the Stage Editor. This is the value you&39;re going to paste into the API Gateway configuration. Copy and paste the following JSON policy document into the JSON tab. CloudWatch Logs role ARN must be set in account settings to enable logging (Service. Oct 25, 2019 When enabling logging using the setting cloudwatchloglevel an exception will get thrown if the API Gateway Settings has not configured an ARN with permissions to write to Cloudwatch. Select the Send log messages to these WatchGuard Log Servers check box. CloudWatch ARN ARN CloudWatch Logs CloudWatch Logs IAM IAM IAM IAM AWS API Gateway. The above error appeared because we have not yet set up the CloudWatch log role ARN under Settings. Choose a name, I recommend the format apigateway-logs-<region>. Enter the ARN of the IAM role we just created in the CloudWatch log role ARN field and hit Save. Copy and paste the following JSON policy document into the JSON tab. To be able to set up sending any of these types of logs to CloudWatch Logs for the first time, you must be logged into an account with the following permissions. This is the value you&x27;re going to paste into the API Gateway configuration. You must also have configured an appropriate CloudWatch Logs role ARN for your account. Step 5 Test Logging. Select System > Logging. In the content pane, choose Create policy. September 8, 2021 Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. Stack building is failed because of "CloudWatch Logs role ARN must be set in account settings to enable logging" 20 Closed tarunjangra opened this issue on Jul 23, 2020 7 comments commented on Jul 23, 2020 tarunjangra mentioned this issue Added required CloudWatch policy 21 completed Sign up for free to join this conversation on GitHub. For example, the following command must run in the recipientdestination account 222222222222 that creates the log destination in the recipient account 222222222222 in us-east-1. For use case, choose API Gateway. Create role in IAM with next policy. For detailed instructions, see Creating a role for an AWS service in the AWS Identity and Access Management User Guide. Your AWS account, to which the role belongs, owns the CloudWatch Logs resources. htmlRK2RStp1IUiaPq4BgiE7xfQ1MwFLllSE- referrerpolicyorigin targetblankSee full list on docs. aws apigateway update-account &92; --patch-operations op &39;replace&39; ,path &39;cloudwatchRoleArn&39; ,value &39;<ApiGatewayToCloudWatchLogs ARN>&39;. Finally, set the IAM role ARN on the cloudWatchRoleArn property on your API Gateway Account settings. Some of these AWS services use a common infrastructure to send their logs to CloudWatch Logs, Amazon S3, or Kinesis Data Firehose. Managing access to resources A permissions policy describes who has access to what. A possible option here is to periodically . id stagename aws apigateway stage. logsCreateLogDelivery logsPutResourcePolicy logsDescribeResourcePolicies logsDescribeLogGroups. Web. For detailed instructions, see Creating a role for an AWS service in the AWS Identity and Access Management User Guide. samCloudWatchLogsCloudWatch Logs role ARN must be set in account settings to enable logging ·  . In the Server access logging section, choose Edit. You must also have configured an appropriate CloudWatch Logs role ARN for your account. When enabling logging using the setting cloudwatchloglevel an exception will get thrown if the API Gateway Settings has not configured an . After this you should see API logs in CloudWatch. Choose Properties. Stack building is failed because of "CloudWatch Logs role ARN must be set in. MyApiGatewayStage, on main. This will take you to the monitors page. Create role in IAM with next policy AmazonS3FullAccess, AmazonAPIGatewayPushToCloudWatchLogs, AWSLambdaBasicExecutionRole. Feb 1, 2023 Overview This guide provides instructions to set up single sign-on (SSO) with OneLogin using the SAML 2. Configure logging in each API Now you have the API Gateway region configured to log your APIs. Once created, click on the new Role and copy the "Role ARN" to your clipboard. A key component of enterprise multi-account environments is logging. To grant permissions for these API operations, CloudWatch Logs defines a set of actions that you can specify in a policy. It&39;s a long string of the form arnawsiam<account id>role<role name>. Enter the ARN of the IAM role we just created in the CloudWatch log role ARN field and hit Save. Introduction On October 16th, 2019, AWS released the news Amazon . Open the IAM console with your user that has administrator permissions. For each CloudWatch Logs resource, the service defines a set of API operations. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. id stagename aws apigateway stage. In the AWS Identity and Access Management (IAM) console, in the navigation pane, choose Roles. Conclusion 1. Managing access to resources A permissions policy describes who has access to what. logsCreateLogDelivery logsPutResourcePolicy logsDescribeResourcePolicies logsDescribeLogGroups. This is a one time operation that must be performed on each AWS account to allow API Gateway to push logs to CloudWatch. 1. CloudWatch also includes the capability to detect anomalous behavior, visualize logs, and set alarms. API Gateway stage editor has the execution logging configurations. So to enable logging for a stage of your HTTP API, reach . Under Server access logging, select Enable. com; Rank 37,268 Visitors 11,000;. To grant permissions for these API operations, CloudWatch Logs defines a set of actions that you can specify in a policy. vm; vq. Set the --region for the --role-arn to the same Region as the source CloudWatch logs. cloudwatch logs role arn must be set in account settings to. Choose the API Gateway radio button. Your AWS account, to which the role belongs, owns the CloudWatch Logs resources. Exception encountered (stack trace below). com")), rolename this. Log In My Account tv. Some of these AWS services use a common infrastructure to send their logs to CloudWatch Logs, Amazon S3, or Kinesis Data Firehose. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Also here we can enable detailed CloudWatch metrics. This is a one time operation that must be performed on each AWS account to allow API Gateway to push logs to CloudWatch. If you add the following Trust Relationship policy, it should work. CloudWatch Logs role ARN must be set in account settings to enable logging (Service. Web. Managing access to resources A permissions policy describes who has access to what. Listen CloudWatch Logs role ARN must be set in account settings to enable logging To fix this you have to add code. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Click Roles. This is a one time operation that must be performed on each AWS account to allow API Gateway to push logs to CloudWatch. 2; Python version 3. Once created, click on the new Role and copy the "Role ARN" to your clipboard. This is a one time operation that must be performed on each AWS account to allow API Gateway to push logs to CloudWatch. To be able to set up sending any of these types of logs to CloudWatch Logs for the first time, you must be logged into an account with the following permissions. In the Buckets list, choose the name of the bucket that you want to enable server access logging for. For each CloudWatch Logs resource, the service defines a set of API operations. Error ApiEndpoint https5hnofpe0i5. It&39;s a long string of the form arnawsiam<account id>role<role name>. Managing access to resources A permissions policy describes who has access to what. For the case of our Notes App API, we deployed to the prod stage. MyApiGatewayStage, on main. Additionally, permissions must be granted to AWS to. Refresh the page, check Medium s site. To enable the AWS services listed in the following table to send their logs to these destinations, you must be logged in as a user that has certain permissions. Create Lambda function · Log Group. You need to do this once. Under Select Role Type choose "Amazon API Gateway". Stack building is failed because of "CloudWatch Logs role ARN must be set in account settings to enable logging" 20 Closed tarunjangra opened this issue on Jul 23, 2020 7 comments commented on Jul 23, 2020 tarunjangra mentioned this issue Added required CloudWatch policy 21 completed Sign up for free to join this conversation on GitHub. UPDATE For APIGatewayV2 - Access Logs only (Execution logs aren&x27;t available for http). Note This blog post was updated June 6, 2019. Finally, set the IAM role ARN on the cloudWatchRoleArn property on your API Gateway Account settings. Choose Properties. aws-api-gateway amazon-cloudwatch. Web. Sign up. To be able to set up sending any of these types of logs to CloudWatch Logs for the first time, you must be logged into an account with the following permissions. Exception encountered (stack trace below). To fix this you. Click your new role in the roles listing. AWS KMS Key Set up you KMS key and assign roles to it. Enter the ARN of the IAM role we just created in the CloudWatch log role ARN field and hit Save. Additionally, permissions must be granted to AWS to. API Gateway stage editor has the execution logging configurations. If you specify an account, user, or role in this policy, you must sign your. Sign In. Trigger your API multiple times to generate logs. To create a custom IAM role and role policy, do the following 1. Some of these AWS services use a common infrastructure to send their logs to CloudWatch Logs, Amazon S3, or Kinesis Data Firehose. For CloudWatch logs we can select from two logging levels INFO to generate execution logs for all requests or ERROR to generate execution logs only for requests that result in an error. To be able to set up sending any of these types of logs to CloudWatch Logs for the first time, you must be logged into an account with the following permissions. You can obtain a log group ARN in the CloudWatch console, provided that the ARN column is selected for display. Nadtakan Jones. However, keep in mind that very little of this extended functionality is available out-of-the-box. Additionally, permissions must be granted to AWS to. com Stack gabiras-coffee-menu-websocket Status failed Error CloudWatch Logs role ARN must be. If you create an IAM role in your AWS account with permissions to create CloudWatch Logs resources, anyone who can assume the role can create CloudWatch Logs resources. aws apigateway update-account &92; --patch-operations op &39;replace&39; ,path &39;cloudwatchRoleArn&39; ,value &39;<ApiGatewayToCloudWatchLogs ARN>&39;. Clear out the field for Cloudwatch ARN in API Gateway Account Settings. Web. You can set these logging levels either at the entire "stage" level or override the stage level and define it at the method level as in this example (notice the "methodpath" value here) resource "awsapigatewaymethodsettings" "s" restapiid awsapigatewayrestapi. Select your API project from the left panel, select Stages, then pick the stage yo. Error Updating API Gateway Stage failed BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging with awsapigatewaystage. Cloudwatch logs role arn must be set in account settings to enable logging. Arn as a result I receive such error during stack creation The role ARN does not have required permissions set to API Gateway. Configure Permissions for API Gateway Logging to CloudWatch Instructions for enabling account level logging from API Gateway to CloudWatch. There is a lot that can go wrong, but we hope that if you followed this guide, you&x27;ll have prevented many of the common problems. Web. For the case of our Notes App API, we deployed to the prod stage. Error Updating API Gateway Stage failed BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging with awsapigatewaystage. API Gateway logging with Terraform by Edoardo Nosotti RockedScience Medium Write Sign up Sign In 500 Apologies, but something went wrong on our end. Create Lambda function · Log Group. For the case of our Notes App API, we deployed to the prod stage. Sign in to the API Gateway console at httpsconsole. Log driver returns an error by default if the log group does not exist. aws-api-gateway amazon-cloudwatch. ow; mp. Select your API . In the Logs tab Check Enable CloudWatch Logs. Jan 27, 2020 CloudWatch Logs role ARN must be set in account settings to enable logging by Nadtakan Jones Medium Sign up Sign In 500 Apologies, but something went wrong on our end. For the case of our Notes App API, we deployed to the prod stage. To create the CloudWatch Logs IAM role for user pool import (AWS CLI, API) Sign in to the AWS Management Console and open the IAM console at httpsconsole. Additionally, permissions must be granted to AWS to. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. To enable CloudWatch Logs for all or only some of the methods, you must also specify the ARN of an IAM role that enables API Gateway to write information to CloudWatch Logs on behalf of your IAM user. CloudWatch ARN ARN CloudWatch Logs CloudWatch Logs IAM IAM IAM IAM AWS API Gateway. Set up CloudWatch API logging using Amazon CloudFormation. Choose Settings from the primary navigation panel and enter an ARN of an IAM role with appropriate permissions in CloudWatch log role ARN. ke; jd. Apr 12, 2022 4. Copy and paste the following JSON policy document into the JSON tab. addmanagedpolicy (iam. For detailed instructions, see Creating a role for an AWS service in the AWS Identity and Access Management User Guide. To be able to set up sending any of these types of logs to CloudWatch Logs for the first time, you must be logged into an account with the following permissions. Migrated BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging Issue 793 zappaZappa GitHub zappa Zappa Public Notifications Migrated BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging 793 Open jneves opened this issue on Feb 20, 2021 0 comments. In the AWS Identity and Access Management (IAM) console, in the navigation pane, choose Roles. Step 1 Create an IAM role for logging to CloudWatch. Web. Exception encountered (stack trace below). Migrated BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging Issue 793 zappaZappa GitHub zappa Zappa Public Notifications Migrated BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging 793 Open jneves opened this issue on Feb 20, 2021 0 comments. Apr 12, 2022 To create a custom IAM role and role policy, do the following 1. Log In My Account mx. Finally, set the IAM role ARN on the cloudWatchRoleArn property on your API Gateway Account settings. AWS KMS Key Set up you KMS key and assign roles to it. tf line 233, in resource "awsapigatewaystage" "MyApiGatewayStage" 233 resource "awsapigatewaystage" "MyApiGatewayStage. Set a log group during setup in Cloudwatch Logs . CloudWatch ARN ARN CloudWatch Logs CloudWatch Logs IAM IAM IAM IAM AWS API Gateway. Sign in to the API Gateway console at httpsconsole. Role permission. May 10, 2019 API Gateway logging with Terraform by Edoardo Nosotti RockedScience Medium Write Sign up Sign In 500 Apologies, but something went wrong on our end. In the navigation pane, choose Roles and then choose Create role. vm; vq. But I have set the iamRoleStatements iamRoleStatements - Effect Allow Action - cloudwatch - logs Resource - "" update 2 I have added the role in provider part, but still get same error. defaultChild property. Web. API Gateway logging with Terraform by Edoardo Nosotti RockedScience Medium Write Sign up Sign In 500 Apologies, but something went wrong on our end. 2; Python version 3. off the books jobs nyc, skipthe gamescom

· Creates a Cloudwatch Logs Export Task · It only exports logs from Log . . Cloudwatch logs role arn must be set in account settings to enable logging

Listen CloudWatch Logs role ARN must be set in account settings to enable logging To fix this you have to add code. . Cloudwatch logs role arn must be set in account settings to enable logging craigslist free rockford

To create the CloudWatch Logs IAM role for user pool import (AWS CLI, API) Sign in to the AWS Management Console and open the IAM console at httpsconsole. In the content pane, choose Create policy. It&39;s a long string of the form arnawsiam<account id>role<role name>. Web. Click Save. Web. However, keep in mind that very little of this extended functionality is available out-of-the-box. Choose Settings from the primary navigation panel and enter an ARN of an IAM role with appropriate permissions in CloudWatch log role ARN. Web. sh The script will Create a role called APIGatewayCloudWatchLogsRole Attach the managed policy AmazonAPIGatewayPushToCloudWatchLogs, which allows API Gateway to. It&39;s a long string of the form arnawsiam<account id>role<role name>. json; Run zappa deploy stage Deploy should fail with the above stack trace. sh The script will Create a role called APIGatewayCloudWatchLogsRole Attach the managed policy AmazonAPIGatewayPushToCloudWatchLogs, which allows API Gateway to. Events sent to the log source will trigger your Lambda function. Cloudwatch logs role arn must be set in account settings to enable logging. CloudWatch Logs role ARN must be set in account settings to enable logging (Service. Create Lambda function · Log Group. Choose Settings from the primary navigation panel and enter an ARN of an IAM role with appropriate permissions in CloudWatch log role ARN. May 10, 2019 API Gateway logging with Terraform by Edoardo Nosotti RockedScience Medium Write Sign up Sign In 500 Apologies, but something went wrong on our end. aws-api-gateway amazon-cloudwatch. To create a custom IAM role and role policy, do the following 1. 1. To enable the AWS services listed in the following table to send their logs to these destinations, you must be logged in as a user that has certain permissions. json Run zappa deploy stage Deploy should fail with the above stack trace. For detailed instructions, see Creating a role for an AWS service in the AWS Identity and Access Management User Guide. In the content pane, choose Create policy. Apr 12, 2022 To create a custom IAM role and role policy, do the following 1. In the Logs tab Check Enable CloudWatch Logs. addmanagedpolicy (iam. May 10, 2019 CloudWatch Logs role ARN must be set in account settings to enable logging The first thing you need to know is that CloudWatch permissions for API Gateway are account-wide, per region. For each CloudWatch Logs resource, the service defines a set of API operations. Feb 1, 2023 Overview This guide provides instructions to set up single sign-on (SSO) with OneLogin using the SAML 2. Choose a REST API. However, it seems there is no parameter to set them in awsapigatewaystage although it has access loggging configuration parameters. Also here we can enable detailed CloudWatch metrics. On the Roles pane, choose Create role. Select System > Logging. You don&39;t need to redeploy the API when you update the stage settings, logs, or stage variables. Set the --region for the --role-arn to the same Region as the source CloudWatch logs. AWS Managed Microsoft AD has critical information, so CloudWatch logs are enabled on the Managed Active Directory Service in the primary account in the four AWS. On the Create role page, do the following For Trusted entity type, choose AWS Service. On the LogsTracing tab, under CloudWatch Settings, do the following to turn on execution logging Choose the Enable CloudWatch Logs check . tf line 233, in resource "awsapigatewaystage" "MyApiGatewayStage" 233 resource "awsapigatewaystage" "MyApiGatewayStage. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. Enter the ARN of the IAM role we just created in the CloudWatch log role ARN field and hit Save. logsCreateLogDelivery logsPutResourcePolicy logsDescribeResourcePolicies logsDescribeLogGroups. Additionally, permissions must be granted to AWS to. Oct 17, 2012 Update Account Api Gateway settings with correct permissions. ow; mp. Additionally, permissions must be granted to AWS to. Error ApiEndpoint https5hnofpe0i5. CloudWatch Logs role ARN must be set in account settings to enable logging. Open the IAM console with your user that has administrator permissions. This is the value you&39;re going to paste into the API Gateway configuration. Can you tell me what other settings I need. Web. Your AWS account, to which the role belongs, owns the CloudWatch Logs resources. . Listen CloudWatch Logs role ARN must be set in account settings to enable logging To fix this you have to add code. Try to activate checkbox Enable CloudWatch Logs but got CloudWatch Logs role ARN must be set in account settings to enable logging. To create a custom IAM role and role policy, do the following 1. Under Server access logging, select Enable. Choose Settings from the primary navigation panel and enter an ARN of an IAM role with appropriate permissions in CloudWatch log role ARN. Select your API project from the left panel, select Stages, then pick the stage you want to enable logging for. logsCreateLogDelivery logsPutResourcePolicy logsDescribeResourcePolicies logsDescribeLogGroups. Skip directly to the demo 042For more details see the Knowledge Center article with this video . Once created, click on the new Role and copy the "Role ARN" to your clipboard. If you specify an account, user, or role in this policy, you must sign your. To do so, choose Settings from the APIs main navigation pane. When I try to set the cloudwatch log arn in the console, I get an error The role ARN does not have required permissions configured. An error occurred ApiGatewayStage - CloudWatch Logs role ARN must be set in account settings to enable logging. This will take you to the monitors page. Step 2 Add the IAM role in the API Gateway console. September 8, 2021 Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. CloudWatch Logs role ARN must be set in account settings to enable logging. com Stack gabiras-coffee-menu-websocket Status failed Error CloudWatch Logs role ARN must be. Centralized logging provides a single point of access to all salient logs generated across accounts and regions, and is critical for auditing, . "Empty" is the default value. Jun 14, 2017 Follow the steps here to enable cloudwatch logging on the api-gateway httpsaws. But got The role ARN does not have required permissions set to API Gateway. Navigate to Services -> API Gateway Choose the region you want Click Settings Paste the ARN for the role you created in the CloudWatch log role ARN field. Open the IAM console with your user that has administrator permissions. To be able to set up sending any of these types of logs to CloudWatch Logs for the first time, you must be logged into an account with the following permissions. sh The script will Create a role called APIGatewayCloudWatchLogsRole Attach the managed policy AmazonAPIGatewayPushToCloudWatchLogs, which allows API Gateway to. In the AWS Identity and Access Management (IAM) console, in the navigation pane, choose Roles. CloudWatch Logs role ARN must be set in account settings to enable logging (Service AmazonApiGateway; Status Code 400; Error Code BadRequestException; . CloudWatch Logs role ARN must be set in account settings to enable logging (Service. Select your API project from the left panel, select Stages, then pick the stage you want to enable logging for. UPDATE For APIGatewayV2 - Access Logs only (Execution logs aren&x27;t available for http). Configure Permissions for API Gateway Logging to CloudWatch Instructions for enabling account level logging from API Gateway to CloudWatch. Additionally, permissions must be granted to AWS to. Log driver returns an error by default if the log group does not exist. Also here we can enable detailed CloudWatch metrics. MyApiGatewayStage, on main. Copy and paste the following JSON policy document into the JSON tab. apigw-dynamodb-terraform CloudWatch Logs role ARN must be set in account settings to enable logging 620 Closed FredericHeem opened this issue on Apr 15 3 comments Contributor FredericHeem on Apr 15 mentioned this issue Solving issue 620 628 jbesw closed this as completed on Apr 18 Sign up for free to join this conversation on GitHub. For detailed instructions, see Creating a role for an AWS service in the AWS Identity and Access Management User Guide. Create a policy document. Web. On the Create role page, do the following For Trusted entity type, choose AWS Service. stagename method. To create a custom IAM role and role policy, do the following 1. Additionally, permissions must be granted to AWS to. This is the value you&39;re going to paste into the API Gateway configuration. SAM template. Enter the ARN of the IAM role we just created in the CloudWatch log role ARN field and hit Save. For detailed instructions, see Creating a role for an AWS service in the AWS Identity and Access Management User Guide. og Error Updating API Gateway Stage failed BadRequestException CloudWatch Logs role ARN must be set in account settings to enable logging with awsapigatewaystage. . hiring in fresno