Skip to content

Commit e198b71

Browse files
committed
fix(srv): doc review
1 parent 9b18cec commit e198b71

File tree

2 files changed

+8
-10
lines changed

2 files changed

+8
-10
lines changed

pages/iam/reference-content/permission-sets.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Below is a list of the permission sets available at Scaleway.
6565
| FunctionsFullAccess | Full access to create, read, list, edit and delete Functions |
6666
| MessagingAndQueuingReadOnly | List and read access to Messaging |
6767
| MessagingAndQueuingFullAccess | Full access to create, read, list, edit and delete Messaging |
68-
| ServerlessJobsFullAccess | Full access to create, read, list, edit and delete job definition/run. To start a job, in some conditions, permissions for Registry and Secret Manager may be required. |
68+
| ServerlessJobsFullAccess | Full access to create, read, list, edit and delete job definition/run. Does not include permissions for Container Registry and Secret Manager. |
6969
| ServerlessJobsReadOnly | List and read access to job definition/run |
7070
| ServerlessSQLDatabaseReadOnly| List and read access to Serverless SQL Database |
7171
| ServerlessSQLDatabaseReadWrite| List, read and write access to Serverless SQL Database. Includes data and table structure edition. Does not include permissions to create databases or edit settings |

pages/serverless-jobs/how-to/run-job.mdx

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -51,16 +51,14 @@ The **Job runs** section contains basic monitoring information for your jobs:
5151

5252
## Permissions and product dependencies
5353

54-
Depending on various settings, Serverless Jobs can have dependencies on other products, for example:
55-
- **Secret Manager**: to securly inject data into Jobs
56-
- **Container Registry**: to store images of Jobs
54+
Depending on the settings used, Serverless Jobs can have dependencies on other products, such as:
5755

58-
Starting a Job Definition with product dependencies using IAM policies can fail if some permissions are not definied properly.
56+
- **Secret Manager**: to securly inject data into jobs
57+
- **Container Registry**: to store images of jobs
5958

60-
If the Job Definition uses an image from **Container Registry**, add `ContainerRegistryReadOnly` permission.
59+
Executing a Serverless Job can fail if some permissions are not definied properly in an [IAM policy](/iam/how-to/create-policy/), for example:
6160

62-
If the Job Definition consumes data from **Secret Manager**; add `SecretManagerSecretAccess` permission.
61+
- If the job definition uses an image from **Container Registry**, add the `ContainerRegistryReadOnly` permission.
62+
- If the job definition consumes data from **Secret Manager**; add the `SecretManagerSecretAccess` permission.
6363

64-
<Message type="tip">
65-
Use [Cockpit](/cockpit/quickstart/) for in-depth monitoring of the activity of your serverless jobs.
66-
</Message>
64+
Refer to the [dedicated documentation](/serverless-jobs/how-to/monitor-job/) for comprehensive information on how to monitor jobs using Scaleway Cockpit.

0 commit comments

Comments
 (0)