Third Party App not able to call SQS

0

Hello, I'm using Prisma Cloud App service intergratino feature to send messages to an SQS I created in AWS. However, the app is not able to call the SQS que. I would like to confirm everything is right on AWS Side.

I have created a rule with the necessary permissions and actions to perform on the SQS que for the account to assume using the root principal. I'm wondering if there's some sort of access I must explicitly also allow on the SQS que?

Note this is cross account access. The third party app is in another account.The permissions on the SQS is default. The permissions for the assume role is listed below.

{ "Version": "2012-10-17", "Statement": [ { "Action": [ "sqs:GetQueueAttributes", "sqs:ListQueues", "sqs:SendMessage", "tag:GetResources", "iam:GetRole", "kms:GenerateDataKey" ], "Resource": "arn:aws:sqs:us-east-1:<account_of_sqs(current_account)>:prisma-que", "Effect": "Allow" } ] }

And the trust policy

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::<account_id>:root" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "sts:ExternalId": "<external_id>" } } } ] }

Is there anything I'm missing?

  • Also is there a way to query and test a connection to an SQS que from my local environment? To confirm I can at least call it from there?

2 回答
0

You could change the trust policy to allow you to assume the role. Then use the --dry-run option of the AWS CLI to test if your permissions are correct.

profile pictureAWS
专家
kentrad
已回答 1 年前
0

This is well documented in below link. it have Step by Step details how to configure in palo as well in AWS.

you can follow it

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-integrations-on-prisma-cloud/integrate-prisma-cloud-with-amazon-sqs

Sachin
已回答 1 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则