- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-21-2018 08:59 AM
Has anyone encounted an access denied error for the cloudTrailLambda getting to the Transit VPC S3 bucket?
An error occurred (AccessDenied) when calling the GetObject operation: Access Denied
05-21-2018 09:56 AM
Typically as long as the S3 bucket is created with the default settings and in the same region it will work. Maybe try launching it one more time using the same S3 Bucket. You need to have listbucket and getobject permissions set so if there was any deviation from the base permissions you could get an error.
05-21-2018 10:24 AM
I'm getting errors from the CloudTrail based bucket that is created, not the bootstrap bucket I created manually before. I've launched this many times and I continue to get the same permission error on that bucket.
Right now I am just trying to get it to work within the same account.
The CFNs are creating, these are just errors I see on the Lambda function afterwards.
05-21-2018 10:57 AM
Yeah I can try that, but my client has resources in US-EAST-1, so this will still be an issue.
Stay by, I will try US-EAST-2
05-21-2018 11:01 AM
05-21-2018 11:02 AM
CT bucket has the account number in the name.
05-21-2018 12:56 PM
I got the solution to finally deploy in US-EAST-2.
05-24-2018 02:18 PM
Could you retest. There was an API call on the AWS side that was not working and appears to be resolved.
05-24-2018 02:33 PM
I was actually able to get this working a few days ago when I deployed into my lab account as the root user. Worked in us-east-2 and us-east-1.
I am deploying to a customer account today again, and I get the same error message in S3. Created an IAM role to give the cloudTrailLambda function admin access (just for testing) and now the solution works.
I am still seeing another error message in the Cloudtrail logs for cloudTrailLambda, but once we gave it admin access the VPN tunnels to a test VPC were created and connected to the PANs.
The only difference between my lab and my customer's environment is I am deploying with my company's AWS account using an an assumed role that has admin access, and I used my root account for my lab.
Even though it is working with the modified Lambda role right now, we are going to attempt to re-deploy tomorrow under the customer's root account to see if that keeps these issues from occuring.
06-05-2018 02:18 PM - edited 06-05-2018 02:20 PM
06-06-2018 06:00 AM
I'm about to try root with the customer today. Root and IAM user works fine in my personal lab account for both US-EAST-1 and US-EAST-2, just not in two of my customer's accounts.
06-06-2018 03:10 PM
Thanks for the reply. When you have a moment i would like to know what type of rights were being used on the account that failed. What permissions for the account that failed are
1. attached directly
2. attached from group
thanks @brichbourg
06-07-2018 05:45 AM
Root failed as well. The way we got it to work was to apply admin access to the Subscriber and Transit Lambda execution roles in IAM.
06-07-2018 11:40 AM
Would you be able to tell me what the access level was prior to making it admin access?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!