-
We are having an issue deploying an RDS instance in our RA. When using the for-production example in the service catalog, we are able to terragrunt apply locally, but when committing the changes to the repo Github actions returns an error: access denied because no identify-based policy allows rds:DescribeDBSSubnetGroups action. We have added RDS permissions to the deploy_permissions.yml and read_only_permissions.yml RDSDeployAccess:
But still, we get this error: Error: AccessDenied: User: arn:aws:sts::xxxxxxxx:assumed-role/ecs-deploy-runner-terraform-planner/xxxxxx is not authorized to perform: rds:DescribeDBSubnetGroups on resource: arn:aws:rds:us-east-1:xxxxxxxxx:subgrp:rds-xxxxx because no identity-based policy allows the rds:DescribeDBSubnetGroups action We copied these two files from the service catalog: Are we overlooking something obvious? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hi @drafie, I wonder if github has the permission to assume the role that has those permissions. When setting up the account baseline with the landingzone module, have you enabled If you haven't yet, here are some varibles you might find useful from
You might want to use them as input here if you want to enable it for all environments ( |
Beta Was this translation helpful? Give feedback.
Hi @drafie, I wonder if github has the permission to assume the role that has those permissions. When setting up the account baseline with the landingzone module, have you enabled
var.enable_github_actions_access
?If you haven't yet, here are some varibles you might find useful from
https://github.com/gruntwork-io/terraform-aws-service-catalog/blob/master/modules/landingzone/account-baseline-app/variables.tf :