2 Antworten
- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
0
Try the Policy Simulator on the role. In the console, find the role, click on the Simulate button and then set up the simulator for the GetObject and set the Object key. This may tell you what is blocking access or at least eliminate some policies.
0
Hello, I just came accross this issue too, I did some digging on the AWS Systems Manager > Run Command to see more details about it and it is saying wrong Platform.
Upon researching for the Document I noticed that there are multiple Documents for different Platform, so it could be that.
"AmazonInspector2-InvokeInspectorSsmPlugin" -> Windows Platform "AmazonInspector2-InvokeInspectorSsmPluginLinux" -> Linux Platform
beantwortet vor 3 Monaten
Relevanter Inhalt
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor 10 Monaten
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor einem Jahr
Thanks for your answer. Unfortunately I tried that and the policy is allowed on both the Bucket and the Resource.
What was interesting though was my executing the policy simulator triggered the Access Denied alarm for 'GetBucketPolicy ' using my own user but when I checked the results, I have 'Allow' permissions.