ECS on Fargate æ§ç¯æã®ã¨ã©ã¼ä¸è¦§ã¨å¯¾å¿æ¹æ³ã§ãã
ç´åå¹´ãããåã«æ§ç¯ããå
容ã§èªåã¸ã®æ¯ãè¿ãã¨ãã¦çºãã¾ããã
åãã¦ECSãæ¥åã§å©ç¨ããã®ã§æ¯ãè¿ãã¨åæ©çãªã¨ã©ã¼ã°ããã§ãã
ä¸é¨ç°å¢ã§ããã以ä¸æ§æã¤ã¡ã¼ã¸ã§ããï¼CI/CDå«ãï¼

ï¼ãAWSServiceRoleForECSãåå¨ããªãã¨ã©ã¼
ã¨ã©ã¼ã¡ãã»ã¼ã¸
CloudFormationã§ECS Clusterä½ææã«ã¨ã©ã¼ãçºç
Resource handler returned message: "Invalid request provided: CreateService error: Unable to assume the service linked role. Please verify that the ECS service linked role exists.
(Service: AmazonECS; Status Code: 400; Error Code: InvalidParameterException; Request ID: xxxxxxxxxx; Proxy: null)" (RequestToken: xxxxxxxxxx, HandlerErrorCode: InvalidRequest)
åå
IAMãã¼ã«ãAWSServiceRoleForECSããåå¨ããªã
対å¿æ¹æ³
以ä¸ã®ã©ã¡ããã§å¯¾å¿
対å¿ãã¿ã¼ã³â AWSããã¸ã¡ã³ãã³ã³ã½ã¼ã«ããECSãä½æãã
ãããããããâãAWSServiceRoleForECSããèªåã§çæ
対å¿ãã¿ã¼ã³â¡ CloudFormationã§AWSServiceRoleForECSãä½æã
IAMRoleAWSServiceRoleForECS:
Type: "AWS::IAM::ServiceLinkedRole"
Properties:
AWSServiceName: "ecs.amazonaws.com"
Description: "Role to enable Amazon ECS to manage your cluster."
è¤æ°ã®ç°å¢ã§ECSãä½æãããããç§ã¯â¡ï¼CloudFormationï¼ã§å¯¾å¿ãã¾ããã
ç°ãªãã¨ã©ã¼ã³ã¼ããã¡ãã»ã¼ã¸ã§ããAWSServiceRoleForECSããåå¨ããªãããã«çºçããã¨ã©ã¼ãããããããã®IAMãã¼ã«ã®åå¨ã¯ç¢ºèªããã»ããè¯ãã§ãã
詳細ã«ã¤ãã¦ã¯ä»¥ä¸ã®ãµã¤ãã«èª¬æããã¦ãã¾ãã
IAMのService-Linked RolesがCloudFormationに対応したので、とてもナイスなリリースということを詳しく書いてみた。 | DevelopersIO
ï¼ãIAMããªã·ã¼ã®ä¸è¶³
ã¨ã©ã¼ã¡ãã»ã¼ã¸
CodePipelineã®CodeCommitã§ã¨ã©ã¼ãçºç
The service role or action role doesnât have the permissions required to
access the
Amazon S3 bucket named æ¤è¨¼ç°å¢S3
ãã±ããå
Update the IAM role permissions, and then try again. Error:
Amazon S3:AccessDenied:User: arn:
aws:
sts::111111111111:assumed-role/ãã¼ã«å/222222222222 is not authorized to perform:
kms:GenerateDataKey on this resource because no identity-based policy allows the kms:GenerateDataKey action
(Service:
Amazon S3; Status Code: 403; Error Code: AccessDenied; Request ID: xxxxx; S3 Extended Request ID: xxxxx; Proxy: null)
åå
devç°å¢(111111111111)ã®ãã¼ã«ã«KMSã®ããªã·ã¼ãä¸è¶³ãã¦ãã¦ãæ¤è¨¼ç°å¢ã®S3ãã±ãããåç
§ã§ããªã
対å¿æ¹æ³
devç°å¢(111111111111)ã®ãã¼ã«ã«KMSã®ããªã·ã¼ï¼kms:GenerateDataKeyï¼ã追å
ï¼ãKMSã®ã¨ã¤ãªã¢ã¹ãå©ç¨ã§ããªãã¨ã©ã¼
ã¨ã©ã¼ã¡ãã»ã¼ã¸
CodePipelineã®CodeCommitã§ã¨ã©ã¼ãçºç
The service role or action role doesnât have the permissions required to
access the
Amazon S3 bucket named xxx. Update the IAM role permissions, and then try again.
Error:
Amazon S3:AccessDenied:
Access Denied (Service:
Amazon S3; Status Code: 403; Error Code: AccessDenied; Request ID: xxxxx; S3 Extended Request ID: xxxxx; Proxy: null)
åå
KMSãä½æãã¦ããªãã¢ã«ã¦ã³ã(æ§æå³ã§ã¯devç°å¢ï¼ããã ã¨KMSã®ã¨ã¤ãªã¢ã¹ã¯å©ç¨ã§ããªãããã¨ã©ã¼ã
対å¿æ¹æ³
KMSã®ã¨ã¤ãªã¢ã¹ãå©ç¨ããªãããã«å¤æ´ãã¾ããã
ä»æ¯ãè¿ãã¨ãã£ã¨è¯ã対å¿æ¹æ³ããã£ãã¯ãã
ï¼ãECRåç
§å
ãåå¨ããªã
ã¨ã©ã¼ã¡ãã»ã¼ã¸
CodePipelineã®CodeBuildã§ã¨ã©ã¼ãçºç
COMMAND_EXECUTION_ERROR: Error while executing command: docker push $REPOSITORY_
URI:latest. Reason: exit status 1
CLIENT_ERROR: no matching artifact paths found
åå
buildspec.ymlã«è¨å®ããECRåç
§å
ãåå¨ããªã
対å¿æ¹æ³
buildspec.ymlã«æ£ããECRã®åç
§å
ãè¨å®
ï¼ãbuildspec.ymlå
ã®å¤æ°ã®è¦å®å¤ã®æååï¼è¨å·ï¼ã使ç¨
ã¨ã©ã¼ã¡ãã»ã¼ã¸
CodePipelineã®CodeBuildã§ã¨ã©ã¼ãçºç
s3-cicd-
api: not a valid identifier
åå
buildspec.ymlå
ã®å¤æ°ã«ã-ãããã£ããã
対å¿æ¹æ³
buildspec.ymlã®å¤æ°ã«ã-ããªã©ã®è¨å·ãåã
詳細ã¯ä»¥ä¸ã®è¨äºã«ãã¾ããã
rikues2012.hatenablog.com
ï¼ãã¨ã³ããã¤ã³ããæªä½æ
ã¨ã©ã¼ã¡ãã»ã¼ã¸
CodePipelineã®CodeDeployã§ã¨ã©ã¼ãçºç
Resourceinitializationerror: unable to pull secrets or registry auth: execution resource retrieval failed:
unable to retrieve ecr registry auth: service call has been retried 3 time(s): RequestError: send request failed caused by:
Post "
https://api.ecr.ap-northeast-1.amazonaws.com/": dial
tcp xx.xx.xx.xx:443: i/o timeout
åå
ECRã®ã¨ã³ããã¤ã³ããæªä½æã®ãããã¤ã¡ã¼ã¸ãåå¾ã§ããªã
対å¿æ¹æ³
ECRã®ã¨ã³ããã¤ã³ããä½æ
ã»ãµã¼ãã¹åï¼com.amazonaws.ap-northeast-1.ecr.api
åèãµã¤ã
以ä¸ãFargateã®CI/CDãã¤ãã©ã¤ã³ã®ã¨ã©ã¼åå ãã¤ã³ããè¨è¼ããã¦ãã¾ãã
AWS Fargate with CI/CDパイプラインでデプロイ失敗する原因について | クラウド・AWSのIT技術者向けブログ SKYARCH BROADCASTING
以ä¸ãCodeBuildã®ã¨ã©ã¼åå ã®ãã¤ã³ããè¨è¼ããã¦ãã¾ãã
AWS CodeBuildで失敗したときに確認するポイント #AWS - Qiita