Leon Kozlowski
12/08/2021, 4:18 PMEnvironment:*
from the agent? I am having issues persisting a service account and role ARN that give flows privileges to hit aws resources (details in thread)Environment:
AWS_DEFAULT_REGION: us-west-1
AWS_REGION: us-west-1
AWS_ROLE_ARN: arn:aws:iam::<ID>:role/<ROLE_NAME>
AWS_WEB_IDENTITY_TOKEN_FILE: <TOKEN_LOCATION>
botocore.exceptions.ClientError: An error occurred (AccessDeniedException) when calling the Query operation: User <USER> is not authorized to perform: dynamodb:Query
When the role listed in the agent is authorized to preform the querySERVICE_ACCOUNT_NAME
in the run config in the UI for a quick test and still got the same errorKevin Kho
Leon Kozlowski
12/08/2021, 4:30 PMJamie Zieziula
12/08/2021, 4:58 PMLeon Kozlowski
12/08/2021, 5:01 PMkubectl get deployment <NAME> -o yaml
- I can see the serviceAccount
and serviceAccountName
as they should beEnvironment:
or the mountJamie Zieziula
12/08/2021, 5:44 PMLeon Kozlowski
12/08/2021, 5:51 PMkubectl describe pod prefect-job-XXXXXX-XXXXX
Jamie Zieziula
12/08/2021, 6:00 PMservice_account_name = arn:aws:iam::<ID>:role/<ROLE_NAME>
or you can define it when you whereever you are starting the prefect agentLeon Kozlowski
12/08/2021, 7:00 PMJamie Zieziula
12/08/2021, 7:03 PMLeon Kozlowski
12/08/2021, 7:17 PMserviceAccountName
in my job_template.yaml
- thanks @Jamie ZieziulaMariia Kerimova
12/08/2021, 7:35 PMAnna Geller
Leon Kozlowski
12/08/2021, 7:54 PM