1 Answer
- Newest
- Most votes
- Most comments
0
Hi, I have checked one of our functioning EventBridge rules with AWS Batch jobs target. Provided Role has following Trust Relationship:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "events.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
And following permission in the Policy:
{
"Statement": [
{
"Action": [
"batch:SubmitJob"
],
"Effect": "Allow",
"Resource": [
"arn:aws:batch:region:account-number:job-definition/our-job-xxxxxxx",
"arn:aws:batch:region:account-number:job-definition/our-job-xxxxxxx:*",
"arn:aws:batch:region:account-number:job-queue/our-job-xxxxxxx"
]
}
],
"Version": "2012-10-17"
}
Also check, whether your Cron expression is OK.
answered 3 years ago
Relevant content
- Accepted Answerasked a year ago
- Accepted Answerasked a year ago
- asked 2 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 3 years ago
Thanks a ton for responding, it's very helpful.
I have mine scheduled to run every 1 minute right using the fixed rate option, so I think we are good on that front.
Will you confirm the use case you selected for your role and the name of permissions policy you used for your rule? I ask because I had to create an inline policy to give explicit permissions for my job definitions and queue.