-
Notifications
You must be signed in to change notification settings - Fork 312
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sanity check error when providing custom EC2 instance role #1439
Comments
Hi @reisingerf, Thanks |
Attached. |
Can you provide your config file? |
|
Did you run into #1241 ? |
Does not sound familiar, no. https://github.com/umccr/infrastructure/tree/parallel_cluster/parallel_cluster/testcluster |
nice use of |
Thanks! |
@reisingerf yep, we're going in that direction. Until recently I was not able to reproduce the issue you're seeing. I've created the exact same role and config and tried with pcluster 2.4.1 and it's working for me. Can you run |
|
OK, some progress...
When I detach that policy I run into the error you mentioned earlier:
I still can't see the connection with the |
This is just the Can you run |
The variable was not set, but even setting it did not change the behaviour.
|
I think the |
BTW: could the pcluster user policy here: aws-parallelcluster/cli/pcluster/config/validators.py Lines 374 to 383 in 52e5fb9
be changed to separate out the ec2:AttachVolume action with region and account bound Resources ?
Something like:
Perhaps other actions would need to be treated similarly... Not sure if that would help, but it might just allow us to keep our region restriction SCP? Or do you see any particular downside? |
@reisingerf Unfortunately for |
That would work. |
Thanks for all the help! |
Issue with sanity_check got released as part of version 2.5.0. |
Environment:
Bug description and how to reproduce:
When I try to provide a custom
ec2_iam_role
andsanity_check
is enabled I receive an error:IAM role error on user provided role parallelcluster-ec2-instance-role: action ec2:DescribeVolumes is implicitDeny
When turning
sanity_check
off, the cluster creation seems to work fine and the permissions seem to be added as expected. A quick test showed the cluster working with no apparent issues.Additional context:
My IAM policy is pretty much a copy of the one use by default (or documented). I just add permissions for SSM, so I can login without SSH. I even used a role name that is compatible with the existing
PassRole
permission.I also double checked that the
ec2:DescribeVolumes
permission is Allowed on all resources.Any pointers would be much appreciated.
The text was updated successfully, but these errors were encountered: