Create and execute a SQL workflow in Dataform Reviews
22674 reviews
Final step did not work. Saw 'Failed to check permissions.' when tried to use Service Account to start execution. Then 'API request error: Service account must be set when strict act as checks are enabled.'
Jamie M. · Reviewed 7 days ago
จอมทัพ อ. · Reviewed 7 days ago
BURRA V. · Reviewed 7 days ago
there are always issues with the labs, it's rarely performing how it should even if you do exactly what is written.
David Ernesto G. · Reviewed 7 days ago
vinit s. · Reviewed 7 days ago
Arthur F. · Reviewed 7 days ago
Sheraz A. · Reviewed 7 days ago
it is not working in last step
shabnam h. · Reviewed 7 days ago
Devesh B. · Reviewed 7 days ago
Ansar A. · Reviewed 7 days ago
Moganti Pavani S. · Reviewed 7 days ago
Katipally S. · Reviewed 7 days ago
Donthireddy K. · Reviewed 7 days ago
good
Tahaseen A. · Reviewed 7 days ago
Marcin D. · Reviewed 7 days ago
Moganti Pavani S. · Reviewed 7 days ago
Muttafeen .. · Reviewed 7 days ago
not satisfied because in every try the last step shows an api error everytime . pls fix this issue
Nipun J. · Reviewed 7 days ago
Manorama A. · Reviewed 7 days ago
SHIOU CHI . · Reviewed 7 days ago
There seems to be an IAM mismatch or a missing IAM grant in this lab. Starting execution is Task 6 Returns "API request error: Service account must be set when strict act as checks are enabled." Dataflow SA had required roles student_03_e6b31a9720cb@cloudshell:~ (qwiklabs-gcp-00-27fd27a21e5f)$ gcloud projects get-iam-policy qwiklabs-gcp-00-27fd27a21e5f \ --flatten="bindings[].members" \ --format='table(bindings.role)' \ --filter="bindings.members:service-471919455656@gcp-sa-dataform.iam.gserviceaccount.com" ROLE: roles/bigquery.dataEditor ROLE: roles/bigquery.dataViewer ROLE: roles/bigquery.jobUser ROLE: roles/dataform.serviceAgent and had been selected to be used for execution. What finally worked (by help of Gemini): I used the Compute Engine SA (instead of the Dataform Service Agent) and allowed this to impersonate the Dataform SA gcloud iam service-accounts add-iam-policy-binding \ 471919455656-compute@developer.gserviceaccount.com \ --member="serviceAccount:service-471919455656@gcp-sa-dataform.iam.gserviceaccount.com" \ --role="roles/iam.serviceAccountTokenCreator" This finally worked.
Carsten W. · Reviewed 7 days ago
Arpitha S. · Reviewed 7 days ago
AASHIKA SUKHINESH GOPALAN P. · Reviewed 7 days ago
Pallavi C. · Reviewed 7 days ago
Avinash V. · Reviewed 7 days ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.