logs:FilterLogEvents
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
25
Allow (Action)
25
Deny (Action)
0
NotAction
2
Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: Amazon CloudWatch Logs
Access level
ReadDescription
Grants permission to retrieve log events, optionally filtered by a filter pattern from the specified log group
Resource types
- log-group*
Allow (Action)
- AIDevOpsAgentAccessPolicy
- AIOpsAssistantPolicy
- AWSAuditManagerServiceRolePolicy
- AWSBatchFullAccess
- AWSLambda_FullAccess
- AWSLambda_ReadOnlyAccess
- AWSPanoramaFullAccess
- AmazonAPIGatewayPushToCloudWatchLogs
- AmazonBraketFullAccess
- AmazonDataZoneEnvironmentRolePermissionsBoundary
- AmazonDevOpsGuruConsoleFullAccess
- AmazonDevOpsGuruFullAccess
- AmazonDevOpsGuruReadOnlyAccess
- AmazonDevOpsGuruServiceRolePolicy
- AmazonECS_FullAccess
- AmplifyBackendDeployFullAccess
- BedrockAgentCoreFullAccess
- CloudWatchLogsReadOnlyAccess
- CloudWatchReadOnlyAccess
- CloudWatchSyntheticsFullAccess
- CloudwatchApplicationInsightsServiceLinkedRolePolicy
- DatabaseAdministrator
- ReadOnlyAccess
- SageMakerStudioProjectUserRolePermissionsBoundary
- SageMakerStudioProjectUserRolePolicy
Deny (Action)
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 4/7/2026, 3:29:24 AM