Leon Kozlowski
12/08/2021, 4:18 PMEnvironment:*
from the agent? I am having issues persisting a service account and role ARN that give flows privileges to hit aws resources (details in thread)Leon Kozlowski
12/08/2021, 4:19 PMEnvironment:
AWS_DEFAULT_REGION: us-west-1
AWS_REGION: us-west-1
AWS_ROLE_ARN: arn:aws:iam::<ID>:role/<ROLE_NAME>
AWS_WEB_IDENTITY_TOKEN_FILE: <TOKEN_LOCATION>
Leon Kozlowski
12/08/2021, 4:21 PMbotocore.exceptions.ClientError: An error occurred (AccessDeniedException) when calling the Query operation: User <USER> is not authorized to perform: dynamodb:Query
When the role listed in the agent is authorized to preform the queryLeon Kozlowski
12/08/2021, 4:23 PMSERVICE_ACCOUNT_NAME
in the run config in the UI for a quick test and still got the same errorKevin Kho
Leon Kozlowski
12/08/2021, 4:30 PMJamie Zieziula
12/08/2021, 4:58 PMJamie Zieziula
12/08/2021, 4:59 PMLeon Kozlowski
12/08/2021, 5:01 PMLeon Kozlowski
12/08/2021, 5:02 PMLeon Kozlowski
12/08/2021, 5:03 PMkubectl get deployment <NAME> -o yaml
- I can see the serviceAccount
and serviceAccountName
as they should beLeon Kozlowski
12/08/2021, 5:08 PMEnvironment:
or the mountJamie Zieziula
12/08/2021, 5:44 PMJamie Zieziula
12/08/2021, 5:45 PMLeon Kozlowski
12/08/2021, 5:51 PMLeon Kozlowski
12/08/2021, 5:51 PMkubectl describe pod prefect-job-XXXXXX-XXXXX
Jamie Zieziula
12/08/2021, 6:00 PMJamie Zieziula
12/08/2021, 6:31 PMJamie Zieziula
12/08/2021, 6:34 PMJamie Zieziula
12/08/2021, 6:35 PMservice_account_name = arn:aws:iam::<ID>:role/<ROLE_NAME>
or you can define it when you whereever you are starting the prefect agentLeon Kozlowski
12/08/2021, 7:00 PMJamie Zieziula
12/08/2021, 7:03 PMLeon Kozlowski
12/08/2021, 7:17 PMLeon Kozlowski
12/08/2021, 7:35 PMserviceAccountName
in my job_template.yaml
- thanks @Jamie ZieziulaMariia Kerimova
12/08/2021, 7:35 PMAnna Geller
Leon Kozlowski
12/08/2021, 7:54 PM