Skip to content

add missing permission in examples/iam-policy.json #413

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jun 25, 2018

Conversation

neerfri
Copy link

@neerfri neerfri commented Jun 24, 2018

Adds a missing permission in the examples/iam-policy.json referenced from the walkthrough in the docs.

Fixes the error:

I0624 16:12:19.419873       1 targetgroup.go:316] [ALB-INGRESS] [default/some-ingress] [INFO]: Failed TargetGroup modification. Unable to change attributes: AccessDenied: User: arn:aws:sts::1122334455:assumed-role/my-role/session-name is not authorized to perform: elasticloadbalancing:ModifyTargetGroupAttributes on resource: arn:aws:elasticloadbalancing:us-east-1:1122334455:targetgroup/something-32555-HTTP-fd25f48/60bd46e9f1eeb72d
I0624 16:12:19.419885       1 targetgroup.go:316] [ALB-INGRESS] [default/some-ingress] [INFO]: 	status code: 403, request id: 5e9a919a-77c9-11e8-864b-c174c9d69364.
E0624 16:12:19.419893       1 albingress.go:332] [ALB-INGRESS] [default/some-ingress] [ERROR]: Failed to reconcile state on this ingress
E0624 16:12:19.419902       1 albingress.go:334] [ALB-INGRESS] [default/some-ingress] [ERROR]:  - AccessDenied: User: arn:aws:sts::1122334455:assumed-role/my-role/session-name is not authorized to perform: elasticloadbalancing:ModifyTargetGroupAttributes on resource: arn:aws:elasticloadbalancing:us-east-1:1122334455:targetgroup/something-32555-HTTP-fd25f48/60bd46e9f1eeb72d

@k8s-ci-robot k8s-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Jun 24, 2018
@k8s-ci-robot k8s-ci-robot requested a review from bigkraig June 24, 2018 20:57
@k8s-ci-robot
Copy link
Contributor

Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA.

It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.


  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Check your existing CLA data and verify that your email is set on your git commits.
  • If you signed the CLA as a corporation, please sign in with your organization's credentials at https://identity.linuxfoundation.org/projects/cncf to be authorized.
  • If you have done the above and are still having issues with the CLA being reported as unsigned, please email the CNCF helpdesk: [email protected]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Jun 24, 2018
@rifelpet
Copy link
Contributor

Based on this recent PR its going to need elasticloadbalancing:DescribeTargetGroupAttributes as well

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Jun 25, 2018
@bigkraig
Copy link

@neerfri can you also include elasticloadbalancing:DescribeTargetGroupAttributes and keep it sorted alphabetically?

@k8s-ci-robot k8s-ci-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Jun 25, 2018
@bigkraig bigkraig merged commit 87413e3 into kubernetes-sigs:master Jun 25, 2018
@neerfri neerfri deleted the add-missing-iam-permission branch July 14, 2018 12:38
bigkraig added a commit that referenced this pull request Oct 1, 2018
add missing permission in examples/iam-policy.json
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants