IAM_ASSUME_ROLE_FAILURE - Failure while assuming role through STS for account

I created a new quicksight account → manage quicksight → added IAM, s3, athena permissions. Then I saw it created three roles in IAM. aws-quicksight-s3-consumers-role-v0, aws-quicksight-secretsmanager-role-v0 and aws-quicksight-service-role-v0. Now when I try to add data source → select Athena → it is showing the above error

IAM_ASSUME_ROLE_FAILURE
sourceErrorMessage:Failure while assuming role through STS for account
Service Type: ATHENA, Role: arn:aws:iam::<account_id>:role/service-role/aws-quicksight-s3-consumers-role-v0

I see both the STS assume role is allow for quicksight.amazonaws.com in both the roles → aws-quicksight-service-role-v0 and aws-quicksight-s3-consumers-role-v0

@Atmanand, can you confirm if aws-quicksight-s3-consumers-role-v0 includes AWSQuickSightAthenaAccess policy. If yes, and it is still issue, can you revoke Athena access from the “Manage QuickSight” and grant access again.

image

Thanks for the message. There is an “IAM policy assignments” in my account when I disabled it worked.