{
"eventVersion": "1.11",
"userIdentity": {
"type": "AssumedRole",
"principalId": "AROAXXXXXXXXXXXXXXXXX:pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX",
"arn": "arn:aws-us-gov:sts::XXXXXXXXXXXX:assumed-role/ParallelClusterLambdaRole-XXXXXXXX/pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX",
"accountId": "XXXXXXXXXXXX",
"accessKeyId": "ASIAXXXXXXXXXXXXXXXX",
"sessionContext": {
"sessionIssuer": {
"type": "Role",
"principalId": "AROAXXXXXXXXXXXXXXXXX",
"arn": "arn:aws-us-gov:iam::XXXXXXXXXXXX:role/ParallelClusterLambdaRole-XXXXXXXX",
"accountId": "XXXXXXXXXXXX",
"userName": "ParallelClusterLambdaRole-XXXXXXXX"
},
"attributes": {
"creationDate": "2026-04-10T08:30:07Z",
"mfaAuthenticated": "false"
}
},
"invokedBy": "cloudformation.amazonaws.com",
"inScopeOf": {
"issuerType": "AWS::Lambda::Function",
"credentialsIssuedTo": "arn:aws-us-gov:lambda:us-gov-west-1:XXXXXXXXXXXX:function:pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX"
}
},
"eventTime": "2026-04-10T08:34:59Z",
"eventSource": "monitoring.amazonaws.com",
"eventName": "PutCompositeAlarm",
"awsRegion": "us-gov-west-1",
"sourceIPAddress": "cloudformation.amazonaws.com",
"userAgent": "cloudformation.amazonaws.com",
"errorCode": "AccessDenied",
"errorMessage": "User: arn:aws-us-gov:sts::XXXXXXXXXXXX:assumed-role/ParallelClusterLambdaRole-XXXXXXXX/pcluster-api-ParallelClusterFunction-XXXXXXXXXXXX is not authorized to perform: cloudwatch:TagResource on resource: arn:aws-us-gov:cloudwatch:us-gov-west-1:XXXXXXXXXXXX:alarm:pcluster-XXXXX-HeadNode because no identity-based policy allows the cloudwatch:TagResource action",
"requestParameters": null,
"responseElements": null,
"requestID": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"eventID": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"readOnly": false,
"eventType": "AwsApiCall",
"managementEvent": true,
"recipientAccountId": "XXXXXXXXXXXX",
"eventCategory": "Management"
}
using pcluster API 3.14.2, cluster fails on creation of
HeadNodeAlarmD6381F07Due toResource handler returned message: "Encountered a permissions error performing a tagging operation, please add required tag permissions. See https://repost.aws/knowledge-center/cloudformation-tagging-permission-error for how to resolve. Resource handler returned message: "Unauthorized tagging operation"" (RequestToken: 5d0428cd-9eba-7b8d-e27c-56bafd52bf6f, HandlerErrorCode: UnauthorizedTaggingOperation)(untested yet) Seems to be fixed by #7296Resolved on 3.15.0