AWS Transit VPC GitHub Solution Question #2 - Access Denied

Showing results for 
Search instead for 
Did you mean: 

AWS Transit VPC GitHub Solution Question #2 - Access Denied

L2 Linker

Has anyone encounted an access denied error for the cloudTrailLambda getting to the Transit VPC S3 bucket?



[INFO] 2018-05-21T15:52:58.460Z 085dd5fc-5d0f-11e8-ba39-23960ea84bc5 Starting new HTTPS connection (1):

An error occurred (AccessDenied) when calling the GetObject operation: Access Denied


L5 Sessionator

Typically as long as the S3 bucket is created with the default settings and in the same region it will work. Maybe try launching it one more time using the same S3 Bucket. You need to have listbucket and getobject permissions set so if there was any deviation from the base permissions you could get an error.



I'm getting errors from the CloudTrail based bucket that is created, not the bootstrap bucket I created manually before.  I've launched this many times and I continue to get the same permission error on that bucket.


Right now I am just trying to get it to work within the same account.


The CFNs are creating, these are just errors I see on the Lambda function afterwards. 


L4 Transporter

Can you run a test in a Region other than East 1.  I have seen something similar in East 1.

Yeah I can try that, but my client has resources in US-EAST-1, so this will still be an issue.


Stay by, I will try US-EAST-2 

As you are aware also the Cloudtrail bucket name should be unique as well. I have seen issues in conflict of the bucketname being used causing issues. If you are not using part of your username,account name or something to make the Cloudtrail bucket unique I suggest you do so. But as noted in the previous comment it could be a regional issue as well.

CT bucket has the account number in the name.


I got the solution to finally deploy in US-EAST-2. 


Could you retest.  There was an API call on the AWS side that was not working and appears to be resolved.

I was actually able to get this working a few days ago when I deployed into my lab account as the root user.  Worked in us-east-2 and us-east-1.  


I am deploying to a customer account today again, and I get the same error message in S3.  Created an IAM role to give the cloudTrailLambda function admin access (just for testing) and now the solution works.


I am still seeing another error message in the Cloudtrail logs for cloudTrailLambda, but once we gave it admin access the VPN tunnels to a test VPC were created and connected to the PANs.


The only difference between my lab and my customer's environment is I am deploying with my company's AWS account using an an assumed role that has admin access, and I used my root account for my lab.


Even though it is working with the modified Lambda role right now, we are going to attempt to re-deploy tomorrow under the customer's root account to see if that keeps these issues from occuring.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!