Exam DOP-C02 All QuestionsBrowse all questions from this exam
Question 16

A development team is using AWS CodeCommit to version control application code and AWS CodePipeline to orchestrate software deployments. The team has decided to use a remote main branch as the trigger for the pipeline to integrate code changes. A developer has pushed code changes to the CodeCommit repository, but noticed that the pipeline had no reaction, even after 10 minutes.

Which of the following actions should be taken to troubleshoot this issue?

    Correct Answer: B

    To troubleshoot the issue of a CodePipeline not triggering upon code changes pushed to AWS CodeCommit, the first action should be to verify that the CodePipeline service role has the necessary permissions to access the CodeCommit repository. If the role lacks the appropriate permissions, CodePipeline will not be able to respond to the changes in the repository. Ensuring that the service role has the correct access will allow the pipeline to start execution when code changes are detected.

Discussion
DushankOption: B

A: EventBridge rules are not a requirement for CodePipeline to trigger from a CodeCommit repository. CodePipeline directly integrates with CodeCommit without needing EventBridge. B: is a likely cause. The CodePipeline service role needs permissions to access the CodeCommit repository in order to start the pipeline execution when new code is pushed. C:If the developer was able to push code changes to the CodeCommit repository, then their IAM role permissions with respect to CodeCommit are likely fine. This isn't the issue. D:If the pipeline didn't start, CloudWatch Logs could give insights. However, these logs will only exist if the pipeline actually attempted to start but failed. If the pipeline never started, checking logs won't help. Given these options, Option B: is the correct answer.

c3518fcOption: B

Not sure why most people here are even considering A. CodePipeline does not use Amazon EventBridge to trigger pipeline executions based on changes in CodeCommit repositories. Instead, it directly integrates with CodeCommit and monitors repository changes internally.

vn_thanhtung

You are wrong, correct answer is A

vn_thanhtung

When you create a pipeline from CodePipeline during the step-by-step it creates a CloudWatch Event rule for a given branch and repo like this: { "source": [ "aws.codecommit" ], "detail-type": [ "CodeCommit Repository State Change" ], "resources": [ "arn:aws:codecommit:us-east-1:xxxxx:repo-name" ], "detail": { "event": [ "referenceCreated", "referenceUpdated" ], "referenceType": [ "branch" ], "referenceName": [ "master" ] }

alexleelyOption: A

I highly believe it is A. Even though CodePipeline directly integrates with CodeCommit, this integration automatically creates a EventBridge rule for you if it is created through the console. https://docs.aws.amazon.com/codepipeline/latest/userguide/pipelines-trigger-source-repo-changes-console.html Since we know that there is no reaction from the pipeline, it would mean that it wasn't triggered at all. B is about permission which would have thrown an error in the console at that stage, but to even start the first stage, it needs to be trigger first which for the case here. C shouldn't be the answer as the question already said that it was pushed into the repository.

thanhnv142

A is correct D: irrelevant B and C is wrong definitely: if there were permission errors, the pipeline should have started and threw out error messages. The question states that no reaction from the pipeline, which indicates it never started.

ogerberOption: A

"After you select the repository name and branch, a message displays the Amazon CloudWatch Events rule to be created for this pipeline." https://docs.aws.amazon.com/codepipeline/latest/userguide/tutorials-simple-codecommit.html

vmahilevskyiOption: A

Amazon EventBridge (recommended). This is the default for pipelines with an CodeCommit source created or edited in the console. https://docs.aws.amazon.com/codepipeline/latest/userguide/pipelines-about-starting.html#change-detection-methods

VitalydtOption: A

A is most accurate IMO

zijo

I think the answer is B B. Check that the CodePipeline service role has permission to access the CodeCommit repository. By default CodePipeline polls repository for changes even if there is no EventBridge configured. But if the CodePipeline Service Role has no permissions to access the CodeCommit repository it will throw error and CodePipeline will have no reaction.

trungtdOption: A

EventBridge rule is one of the recommended ways to configure CodePipeline to automatically trigger based on changes in a CodeCommit repository

MordansOption: A

For CodePipeline to be triggered by changes in a CodeCommit repository, an EventBridge rule (formerly CloudWatch Events rule) needs to be set up. This rule listens for specific events (like commits to the main branch) and triggers the pipeline accordingly.

aefuen1Option: B

It's B.

xdkonorek2Option: A

the answer is A because if codepipeline has no access to codecommit pipeline is triggered and source stage fails with: ``` The service role or action role doesn’t have the permissions required to access the AWS CodeCommit repository named random-repo. Update the IAM role permissions, and then try again ```

k23319Option: B

B is right.

liuyomzOption: B

Just voting to fix the results, because clearly its B, as explained by top 2 comments here.

vn_thanhtung

B wrong.

c3518fcOption: B

The first step in troubleshooting this issue should be to check that the CodePipeline service role has the required permissions to access the CodeCommit repository. If the permissions are correct, then you can proceed with other troubleshooting steps, such as checking the CloudWatch Logs for any errors or failures.

cas_toriOption: B

BBBBBBBBBBBBB

vortegonOption: A

https://docs.aws.amazon.com/codepipeline/latest/userguide/pipelines-about-starting.html