自动AWS DynamoDB到S3导出失败,"role/DataPipelineDefaultRole无效"

I Z*_*I Z 9 export amazon-emr amazon-dynamodb amazon-iam amazon-data-pipeline

正是按照本页的逐步说明,我试图将我的一个DynamoDB表的内容导出到S3存储桶.我完全按照指示创建了一个管道,但它无法运行.它似乎无法识别/运行EC2资源来执行导出.当我通过AWS Console访问EMR时,我看到如下条目:

Cluster: df-0..._@EmrClusterForBackup_2015-03-06T00:33:04Terminated with errorsEMR service role arn:aws:iam::...:role/DataPipelineDefaultRole is invalid
Run Code Online (Sandbox Code Playgroud)

为什么我收到此消息?我是否需要为管道设置/配置其他东西?

更新:在IAM->RolesAWS控制台下我看到这个DataPipelineDefaultResourceRole:

{
    "Version": "2012-10-17",
    "Statement": [{
    "Effect": "Allow",
    "Action": [
        "s3:List*",
        "s3:Put*",
        "s3:Get*",
        "s3:DeleteObject",
        "dynamodb:DescribeTable",
        "dynamodb:Scan",
        "dynamodb:Query",
        "dynamodb:GetItem",
        "dynamodb:BatchGetItem",
        "dynamodb:UpdateTable",
        "rds:DescribeDBInstances",
        "rds:DescribeDBSecurityGroups",
        "redshift:DescribeClusters",
        "redshift:DescribeClusterSecurityGroups",
        "cloudwatch:PutMetricData",
        "datapipeline:PollForTask",
        "datapipeline:ReportTaskProgress",
        "datapipeline:SetTaskStatus",
        "datapipeline:PollForTask",
        "datapipeline:ReportTaskRunnerHeartbeat"
    ],
    "Resource": ["*"]
    }]
}
Run Code Online (Sandbox Code Playgroud)

这个用于DataPipelineDefaultRole:

{
    "Version": "2012-10-17",
    "Statement": [{
    "Effect": "Allow",
    "Action": [
        "s3:List*",
        "s3:Put*",
        "s3:Get*",
        "s3:DeleteObject",
        "dynamodb:DescribeTable",
        "dynamodb:Scan",
        "dynamodb:Query",
        "dynamodb:GetItem",
        "dynamodb:BatchGetItem",
        "dynamodb:UpdateTable",
        "ec2:DescribeInstances",
        "ec2:DescribeSecurityGroups",
        "ec2:RunInstances",
        "ec2:CreateTags",
        "ec2:StartInstances",
        "ec2:StopInstances",
        "ec2:TerminateInstances",
        "elasticmapreduce:*",
        "rds:DescribeDBInstances",
        "rds:DescribeDBSecurityGroups",
        "redshift:DescribeClusters",
        "redshift:DescribeClusterSecurityGroups",
        "sns:GetTopicAttributes",
        "sns:ListTopics",
        "sns:Publish",
        "sns:Subscribe",
        "sns:Unsubscribe",
        "iam:PassRole",
        "iam:ListRolePolicies",
        "iam:GetRole",
        "iam:GetRolePolicy",
        "iam:ListInstanceProfiles",
        "cloudwatch:*",
        "datapipeline:DescribeObjects",
        "datapipeline:EvaluateExpression"
    ],
    "Resource": ["*"]
    }]
}
Run Code Online (Sandbox Code Playgroud)

这些是否需要以某种方式进行修改?

Gon*_*fva 2

AWS论坛中有一个类似的问题,它似乎与托管策略的问题有关

https://forums.aws.amazon.com/message.jspa?messageID=606756

在这个问题中,他们建议对访问和信任策略使用特定的内联策略来定义那些更改某些权限的角色。奇怪的是,具体的内联策略可以在以下位置找到:

http://docs.aws.amazon.com/datapipeline/latest/DeveloperGuide/dp-iam-roles.html