Create and execute a SQL workflow in Dataform Reviews

22674 reviews

Final step did not work. Saw 'Failed to check permissions.' when tried to use Service Account to start execution. Then 'API request error: Service account must be set when strict act as checks are enabled.'

Jamie M. · Reviewed 7 days ago

จอมทัพ อ. · Reviewed 7 days ago

BURRA V. · Reviewed 7 days ago

there are always issues with the labs, it's rarely performing how it should even if you do exactly what is written.

David Ernesto G. · Reviewed 7 days ago

vinit s. · Reviewed 7 days ago

Arthur F. · Reviewed 7 days ago

Sheraz A. · Reviewed 7 days ago

it is not working in last step

shabnam h. · Reviewed 7 days ago

Devesh B. · Reviewed 7 days ago

Ansar A. · Reviewed 7 days ago

Moganti Pavani S. · Reviewed 7 days ago

Katipally S. · Reviewed 7 days ago

Donthireddy K. · Reviewed 7 days ago

good

Tahaseen A. · Reviewed 7 days ago

Marcin D. · Reviewed 7 days ago

Moganti Pavani S. · Reviewed 7 days ago

Muttafeen .. · Reviewed 7 days ago

not satisfied because in every try the last step shows an api error everytime . pls fix this issue

Nipun J. · Reviewed 7 days ago

Manorama A. · Reviewed 7 days ago

SHIOU CHI . · Reviewed 7 days ago

There seems to be an IAM mismatch or a missing IAM grant in this lab. Starting execution is Task 6 Returns "API request error: Service account must be set when strict act as checks are enabled." Dataflow SA had required roles student_03_e6b31a9720cb@cloudshell:~ (qwiklabs-gcp-00-27fd27a21e5f)$ gcloud projects get-iam-policy qwiklabs-gcp-00-27fd27a21e5f \ --flatten="bindings[].members" \ --format='table(bindings.role)' \ --filter="bindings.members:service-471919455656@gcp-sa-dataform.iam.gserviceaccount.com" ROLE: roles/bigquery.dataEditor ROLE: roles/bigquery.dataViewer ROLE: roles/bigquery.jobUser ROLE: roles/dataform.serviceAgent and had been selected to be used for execution. What finally worked (by help of Gemini): I used the Compute Engine SA (instead of the Dataform Service Agent) and allowed this to impersonate the Dataform SA gcloud iam service-accounts add-iam-policy-binding \ 471919455656-compute@developer.gserviceaccount.com \ --member="serviceAccount:service-471919455656@gcp-sa-dataform.iam.gserviceaccount.com" \ --role="roles/iam.serviceAccountTokenCreator" This finally worked.

Carsten W. · Reviewed 7 days ago

Arpitha S. · Reviewed 7 days ago

AASHIKA SUKHINESH GOPALAN P. · Reviewed 7 days ago

Pallavi C. · Reviewed 7 days ago

Avinash V. · Reviewed 7 days ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.