<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214892#M320</link>
    <description>As you are aware also the Cloudtrail bucket name should be unique as well. I have seen issues in conflict of the bucketname being used causing issues. If you are not using part of your username,account name or something to make the Cloudtrail bucket unique I suggest you do so. But as noted in the previous comment it could be a regional issue as well.</description>
    <pubDate>Mon, 21 May 2018 18:01:15 GMT</pubDate>
    <dc:creator>jperry1</dc:creator>
    <dc:date>2018-05-21T18:01:15Z</dc:date>
    <item>
      <title>AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214868#M315</link>
      <description>&lt;P&gt;Has anyone encounted an access denied error for the&amp;nbsp;cloudTrailLambda getting to the Transit VPC S3 bucket?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="cwdb-log-viewer-table-row-group"&gt;&lt;DIV class="cwdb-log-viewer-table-row-details"&gt;&lt;DIV class="content"&gt;[INFO] 2018-05-21T15:52:58.460Z 085dd5fc-5d0f-11e8-ba39-23960ea84bc5 Starting new HTTPS connection (1):&lt;/DIV&gt;&lt;DIV class="content"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="content"&gt;&lt;EM&gt;maskednamed-transitvpccloudtrail-us-east-1-acctnumber.s3.amazonaws.com&lt;/EM&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="cwdb-log-viewer-table-row-group"&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/DIV&gt;&lt;P&gt;&lt;EM&gt;An error occurred (AccessDenied) when calling the GetObject operation: Access Denied&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 15:59:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214868#M315</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-05-21T15:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214877#M316</link>
      <description>&lt;P&gt;Typically as long as the S3 bucket is created with the default settings and in the same region it will work. Maybe try launching it one more time using the same S3 Bucket. You need to have listbucket and getobject permissions set so if there was any deviation from the base permissions you could get an error.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/81/virtualization/virtualization/bootstrap-the-vm-series-firewall/bootstrap-the-vm-series-firewall-in-aws#idaaf52d9b-e0bc-4277-834a-23b9a720f448" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/virtualization/virtualization/bootstrap-the-vm-series-firewall/bootstrap-the-vm-series-firewall-in-aws#idaaf52d9b-e0bc-4277-834a-23b9a720f448&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 16:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214877#M316</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-05-21T16:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214879#M317</link>
      <description>&lt;P&gt;I'm getting errors from the CloudTrail based bucket that is created, not the bootstrap bucket I created manually before.&amp;nbsp; I've launched this many times and I continue to get the same permission error on that bucket.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right now I am just trying to get it to work within the same account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The CFNs are creating, these are just errors I see on the Lambda&amp;nbsp;function afterwards.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 17:24:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214879#M317</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-05-21T17:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214889#M318</link>
      <description>&lt;P&gt;Can you run a test in a Region other than East 1. &amp;nbsp;I have seen something similar in East 1.&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 17:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214889#M318</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2018-05-21T17:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214891#M319</link>
      <description>&lt;P&gt;Yeah I can try that, but my client has&amp;nbsp;resources in US-EAST-1, so this will still be an issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stay by, I will try US-EAST-2&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 17:57:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214891#M319</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-05-21T17:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214892#M320</link>
      <description>As you are aware also the Cloudtrail bucket name should be unique as well. I have seen issues in conflict of the bucketname being used causing issues. If you are not using part of your username,account name or something to make the Cloudtrail bucket unique I suggest you do so. But as noted in the previous comment it could be a regional issue as well.</description>
      <pubDate>Mon, 21 May 2018 18:01:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214892#M320</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-05-21T18:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214893#M321</link>
      <description>&lt;P&gt;CT bucket has the account number in the name.&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 18:02:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214893#M321</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-05-21T18:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214900#M322</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got the solution to finally deploy in US-EAST-2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 19:56:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/214900#M322</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-05-21T19:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/215400#M324</link>
      <description>&lt;P&gt;Could you retest.&amp;nbsp; There was an API call on the AWS side that was not working and appears to be resolved.&lt;/P&gt;</description>
      <pubDate>Thu, 24 May 2018 21:18:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/215400#M324</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2018-05-24T21:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/215403#M325</link>
      <description>&lt;P&gt;I was actually able to get this working a few days ago when I deployed into my lab account as the root user.&amp;nbsp; Worked in us-east-2 and us-east-1.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am deploying to a customer account today again, and I get the same error message in S3.&amp;nbsp; Created an IAM role to give the cloudTrailLambda function admin access (just for testing) and now the solution works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am still seeing another error message in the Cloudtrail&amp;nbsp;logs for cloudTrailLambda, but once we gave it admin access the VPN tunnels to a test VPC were created and connected to the PANs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only difference between my lab and my customer's environment is I am deploying with my company's AWS account using an an assumed role that has admin access, and I used my root account for my lab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even though it is working with the modified Lambda role right now, we are going to attempt to re-deploy tomorrow under the customer's root account to see if that keeps these issues from occuring.&lt;/P&gt;</description>
      <pubDate>Thu, 24 May 2018 21:33:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/215403#M325</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-05-24T21:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216736#M340</link>
      <description>Did it work when you later tried to apply again using an AWS assumed role? If it worked did bootstrapping work using assumed role and root role?</description>
      <pubDate>Tue, 05 Jun 2018 21:20:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216736#M340</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-06-05T21:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216834#M341</link>
      <description>&lt;P&gt;I'm about to try root with the customer today.&amp;nbsp; Root and IAM user works fine in my personal lab account for both US-EAST-1 and US-EAST-2, just not in two of&amp;nbsp;my customer's accounts.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 13:00:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216834#M341</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-06-06T13:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216909#M342</link>
      <description>&lt;P&gt;Thanks for the reply. When you have a moment i would like to know what type of rights were being used on the account that failed. What permissions for the account that failed are&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. attached directly&lt;/P&gt;
&lt;P&gt;2. attached from group&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45521"&gt;@brichbourg&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 22:10:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216909#M342</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-06-06T22:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216974#M343</link>
      <description>&lt;P&gt;Root failed as well.&amp;nbsp; The way we got it to work was to apply admin access to the Subscriber and Transit Lambda execution roles in IAM.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jun 2018 12:45:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/216974#M343</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-06-07T12:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/217059#M345</link>
      <description>&lt;P&gt;Would you be able to tell me what the access level was prior to making it admin access?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jun 2018 18:40:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/217059#M345</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-06-07T18:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Transit VPC GitHub Solution Question #2 - Access Denied</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/217061#M346</link>
      <description>&lt;P&gt;The access policy the CFN creates.&amp;nbsp; Below is what the Subscriber role policy looks like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;{&lt;BR /&gt;"Version": "2012-10-17",&lt;BR /&gt;"Statement": [&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"sts:AssumeRole"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "STSAccumRole"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"lambda:Invoke",&lt;BR /&gt;"lambda:InvokeFunction"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "InvokeLambda"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"iam:UpdateAssumeRolePolicy",&lt;BR /&gt;"iam:GetRole",&lt;BR /&gt;"iam:PassRole"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "IAMActions"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"cloudformation:*"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "CloudFormationActions"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"ec2:*"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "EC2FullAccess"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"states:ListExecutions",&lt;BR /&gt;"states:StartExecution"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "StateMachineActions"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"logs:CreateLogGroup",&lt;BR /&gt;"logs:CreateLogStream",&lt;BR /&gt;"logs:PutLogEvents"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "Logs"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"s3:GetBucketAcl",&lt;BR /&gt;"s3:GetBucketLocation",&lt;BR /&gt;"s3:GetObject",&lt;BR /&gt;"s3:GetObjectAcl",&lt;BR /&gt;"s3:ListBucket",&lt;BR /&gt;"s3:PutObject",&lt;BR /&gt;"s3:PutObjectAcl",&lt;BR /&gt;"s3:PutObjectTagging",&lt;BR /&gt;"s3:DeleteBucket",&lt;BR /&gt;"s3:DeleteBucketPolicy",&lt;BR /&gt;"s3:DeleteObject"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "S3Actions"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"dynamodb:CreateTable",&lt;BR /&gt;"dynamodb:DeleteItem",&lt;BR /&gt;"dynamodb:DescribeTable",&lt;BR /&gt;"dynamodb:GetItem",&lt;BR /&gt;"dynamodb:GetRecords",&lt;BR /&gt;"dynamodb:ListTables",&lt;BR /&gt;"dynamodb:PutItem",&lt;BR /&gt;"dynamodb:Query",&lt;BR /&gt;"dynamodb:Scan",&lt;BR /&gt;"dynamodb:TagResource",&lt;BR /&gt;"dynamodb:UpdateItem",&lt;BR /&gt;"dynamodb:UpdateTable"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "DynamoDbActions"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"sqs:ChangeMessageVisibility",&lt;BR /&gt;"sqs:DeleteMessage",&lt;BR /&gt;"sqs:GetQueueUrl",&lt;BR /&gt;"sqs:ListQueues",&lt;BR /&gt;"sqs:ReceiveMessage",&lt;BR /&gt;"sqs:SendMessage"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "SQSActions"&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"sns:Publish"&lt;BR /&gt;],&lt;BR /&gt;"Resource": [&lt;BR /&gt;"*"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Sid": "SNSACtions"&lt;BR /&gt;}&lt;BR /&gt;]&lt;BR /&gt;}&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jun 2018 18:52:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-transit-vpc-github-solution-question-2-access-denied/m-p/217061#M346</guid>
      <dc:creator>brichbourg</dc:creator>
      <dc:date>2018-06-07T18:52:05Z</dc:date>
    </item>
  </channel>
</rss>

