1 Resposta
- Mais recentes
- Mais votos
- Mais comentários
0
Hi, I have checked one of our functioning EventBridge rules with AWS Batch jobs target. Provided Role has following Trust Relationship:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "events.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
And following permission in the Policy:
{
"Statement": [
{
"Action": [
"batch:SubmitJob"
],
"Effect": "Allow",
"Resource": [
"arn:aws:batch:region:account-number:job-definition/our-job-xxxxxxx",
"arn:aws:batch:region:account-number:job-definition/our-job-xxxxxxx:*",
"arn:aws:batch:region:account-number:job-queue/our-job-xxxxxxx"
]
}
],
"Version": "2012-10-17"
}
Also check, whether your Cron expression is OK.
respondido há 2 anos
Conteúdo relevante
- AWS OFICIALAtualizada há um ano
- AWS OFICIALAtualizada há 2 anos
- AWS OFICIALAtualizada há 2 anos
- AWS OFICIALAtualizada há 2 anos
Thanks a ton for responding, it's very helpful.
I have mine scheduled to run every 1 minute right using the fixed rate option, so I think we are good on that front.
Will you confirm the use case you selected for your role and the name of permissions policy you used for your rule? I ask because I had to create an inline policy to give explicit permissions for my job definitions and queue.