You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to the Nomad documentation, the "write" policy includes the "read-logs" capability, so I don't understand why I am unable to get the logs using the same token with which I am able to submit a job.
Notes
I was unable to get the logs after updating the policy to explicitly include the "read-logs" capability (as well as the "write" policy)
I was able to get the logs using the root/bootstrap ACL token
The text was updated successfully, but these errors were encountered:
I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
I am using Vault for secrets management to generate short-lived Nomad ACL tokens with which my deployment agent can authenticate against Nomad:
vault read -field=secret_id nomad/creds/deployment-agent
My ACL policy is:
I am using my deployment agent to submit Nomad jobs for deployment:
Both of the above steps work as expected. However, when I try to get the logs of a failed Nomad deployment using
I am getting
"Error reading file: Unexpected response code: 403 (Permission denied)"
According to the Nomad documentation, the
"write"
policy includes the"read-logs"
capability, so I don't understand why I am unable to get the logs using the same token with which I am able to submit a job.Notes
The text was updated successfully, but these errors were encountered: