gRPC 7 PERMISSION_DENIED vs 15 DATA_LOSS
Both gRPC 7 (PERMISSION_DENIED) and 15 (DATA_LOSS) belong to the gRPC Status Codes category. 7 indicates that the caller does not have permission to execute the specified operation. This is not for unauthenticated callers — use UNAUTHENTICATED instead. Meanwhile, 15 means that unrecoverable data loss or corruption has occurred.
คำอธิบาย
The caller does not have permission to execute the specified operation. This is not for unauthenticated callers — use UNAUTHENTICATED instead.
เมื่อคุณพบเห็น
The authenticated user lacks the required role, scope, or policy to perform this action. Different from UNAUTHENTICATED (code 16), which means no credentials at all.
วิธีแก้ไข
Verify the caller has the correct IAM role, API scope, or access policy. Check RBAC configuration on the server side.
คำอธิบาย
Unrecoverable data loss or corruption has occurred.
เมื่อคุณพบเห็น
Critical data was lost or corrupted — for example, a checksum mismatch during transmission or an unrecoverable storage failure on the server.
วิธีแก้ไข
Investigate the data integrity failure immediately. Restore from backups if available, and check for hardware failures or network corruption in the data path.
ความแตกต่างหลัก
gRPC 7: The caller does not have permission to execute the specified operation. This is not for unauthenticated callers — use UNAUTHENTICATED instead.
gRPC 15: Unrecoverable data loss or corruption has occurred.
You encounter 7 when the authenticated user lacks the required role, scope, or policy to perform this action. Different from UNAUTHENTICATED (code 16), which means no credentials at all.
You encounter 15 when critical data was lost or corrupted — for example, a checksum mismatch during transmission or an unrecoverable storage failure on the server.
ควรใช้อันไหนเมื่อไร
For 7 (PERMISSION_DENIED): Verify the caller has the correct IAM role, API scope, or access policy. Check RBAC configuration on the server side. For 15 (DATA_LOSS): Investigate the data integrity failure immediately. Restore from backups if available, and check for hardware failures or network corruption in the data path.