-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
0.6.12 "Unable to assume role and validate the listeners configured on your load balancer. Please verify the role being passed has the proper permissions." #5442
Comments
Hardcoding the ecs-service role attribute results in the same issue, I also switched off all dependency between iam/ecs to ensure no effect. The IAM role is a poweruser/administrator which has elb*
|
Removing the elb resource, ecs-service elb sub-resource and the iam_role param allowed creation of ecs-service. |
@russmac I beat my head against this for a couple of hours and then realized my issue and it may be the same as yours. The iam role for the service needs to have an assume_rule_policy that allows the principle _ecs_.amazonaws.com rather than ec2.amazonaws.com. E.g.
|
Sorry guys I was not subscribed, Thanks very much for explaining the issue, Easy to miss the /2/s/. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Ive read:
#5079
#2869
#4375
Which seem to indicate the issue was resolved in 0.6.12 however despite multiple applies or destroy apply apply apply or destroy apply destroy apply the ECS resource is never created due to Terraform not being able to validate the credentials for it.
I've read all the linked associated issues and they describe either someone figuring out their policy was wrong or further applies creating the resource. The role exists visibly in IAM and is assigned as an instance profile to my ECS Instance which has joined the cluster correctly indicating the policy is correct.
The text was updated successfully, but these errors were encountered: