You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/automation/troubleshooting.md
+72Lines changed: 72 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,78 @@ Agent_IP = "10.0.0.5"
64
64
public_network_access_enabled = true
65
65
```
66
66
67
+
### Failed to get existing workspaces error
68
+
69
+
If you see an error similar to the following when running the deployment:
70
+
71
+
```text
72
+
Error: : Error retrieving keys for Storage Account "mgmtweeutfstate###": azure.BearerAuthorizer#WithAuthorization: Failed to refresh the Token for request to
This error indicates that the credentials used to do the deployment doesn't have access to the storage account. To resolve this issue, assign the 'Storage Account Contributor' role to the deployment credential on the terraform state storage account, the resource group or the subscription (if feasible).
79
+
80
+
You can verify if the deployment is being performed using a service principal or a managed identity by checking the output of the deployment. If the deployment is using a service principal, the output will contain the following:
81
+
82
+
```text
83
+
[set_executing_user_environment_variables]: Identifying the executing user and client
84
+
[set_azure_cloud_environment]: Identifying the executing cloud environment
85
+
[set_azure_cloud_environment]: Azure cloud environment: public
86
+
[set_executing_user_environment_variables]: User type: servicePrincipal
Look for the following line in the output: "ARM_USE_MSI: true"
117
+
118
+
You can assign the 'Storage Account Contributor' role to the deployment credential on the terraform state storage account, the resource group or the subscription (if feasible). Use the ARM_CLIENT_ID from the deployment output.
You may also need to assign the reader role to the deployment credential on the subscription containing the resource group with the Terrafrom state file. You can do that with the following command:
0 commit comments