IAM errors when extending ECS Deploy Runner with AWS Systems Manager permissions #76
-
A customer asked:
The error we receive when attempting to launch
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
It looks like the In most cases, this includes In a couple of cases, even if you have sufficient permissions to take an action in IAM, but that action (say, Otherwise, you get these really opaque and confusing access denied exceptions. Your policy above doesn't include the
One other tip for debugging these kinds of things in the future: You can always check in your account's CloudTrail event history and see if there are any API calls around KMS, grants, etc that failed due to permissions issues. So, tldr, please try adding |
Beta Was this translation helpful? Give feedback.
It looks like the
allow-ops-admin-access-from-other-accounts
role, by default, is configured with the same permissions that our Elastic Deploy Runner in the security account's mgmt folder shows in thedeploy_permissions.yml
file.In most cases, this includes
KMS:*
, which would in turn include actions such asKMS:Decrypt
andKMS:Encrypt
. Why are the KMS permissions relevant?In a couple of cases, even if you have sufficient permissions to take an action in IAM, but that action (say,
ssm:PutParameter
in this case) will end up making use of a KMS key, whether it be customer managed or a default one managed by AWS, then you still need sufficient permissions for that KMS key, too.Otherwise, y…