-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
403 errors when deploying aggregation-service #47
Comments
Hi @yanghuang1028 , Thanks for reaching out. Just to check, did you use the terraform script when deploying your aggregation service deploy and worker? You will need to run this when creating/updating your worker so that they are provided with the appropriate access. You can update the section below in the
|
Hi maybellineboon, As a result, I change the main.tf of the path "terraform/gcp/modules/frontend" so that terraform can run properly. I don't know if this change caused this problem. our project_id: ecs-1709881683838 Here are my changes in "terraform/gcp/modules/frontend/main.tf" If convenient, please help to look at this! I've been stuck at this step for a long time... Thanks anyway!! |
Hi @yanghuang1028, it looks like you're running into the issue described here: https://stackoverflow.com/questions/68579808/how-to-solve-error-creating-service-googleapi-error-403-permission-iam-servi The service account / user you use to run terraform needs permission to actAs the service account attached to the Cloud Run Service. --> you need to give that service account / user you use to run terraform the ServiceAccountUser permission. |
Hi @maybellineboon @hostirosti , I used the service account "sa-aggregation-service@microsites-sa.iam.gserviceaccount.com" to run the terraform script, and actually the service accounts I used all have the ServiceAccountUser permission. However, it still threw the Permission 'iam.serviceaccounts.actAs' error, which is a bit wired... |
Hi @yanghuang1028, can you try to grant that permission for I also noticed your |
Hi @hostirosti , ecs-1709881683838 is our exact project id, while "microsites-sa" is a public project which all service accounts in our company are created under this project for managment easily. |
Hi @yanghuang1028, you can ask for a consultation meeting through your partner manager contact on Google side. They'll schedule one. To my knowledge, the service accounts used as part of the deployment need to be created in the project you deploy the aggregation service to. I did some non-extensive testing in this area in the past and was unsuccessful to use a service account created in a different project in some parts of the aggregation service (notably the worker service account, and I assume same for the frontend service account used by Cloud Run). It looks like the way your company likes to organize / manage service accounts is not supported by GCP to run aggregation service. |
Hi @hostirosti, okay, thanks a lot !! I'll contact with our partner manager to discuss about this. really thanks!! |
Hi team,
I’m trying to set up our deployment environment. But I encountered this error. Could you please help to look at it ? Thanks a lot !!!
These are the roles of our service accounts. Do I need to add some additional role permissions?
our projectId: ecs-1709881683838
The text was updated successfully, but these errors were encountered: