<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Setting up SQS based S3 input= Is it a requirement that SQS is updated via a subscription to an SNS topic? in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/617646#M9061</link>
    <description>&lt;H2&gt;CURRENT APPLICATION&lt;/H2&gt;&lt;H2&gt;Splunk Add-on for AWS&lt;/H2&gt;&lt;P&gt;Version: 6.2.0 Build: 1658820915&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Simple Architecture:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_0-1666155912165.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22084i86FADB5FD1A1E6A1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_0-1666155912165.png" alt="thambisetty_0-1666155912165.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Expected process by Splunk Add-on for AWS is as below:&lt;BR /&gt;&lt;BR /&gt;1. Enable/configure cloud trail logs to s3 bucket and enable SNS topic&amp;nbsp;&lt;BR /&gt;2. create standard SQS queue ( This queue will be used as Dead Letter queue in SQS queue creation of 3rd step)&lt;BR /&gt;3. Create standard SQS queue with below configuration&lt;BR /&gt;&lt;BR /&gt;Make sure your SQS queues have same configuration as below (except name, because your SQS will have different name)&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_0-1666154389016.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22081i1E4841A04CEE25C6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_0-1666154389016.png" alt="thambisetty_0-1666154389016.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;DLQ Configuration for SQS created in step 3 : Choose queue created in 2 step.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_1-1666154470228.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22082i72B8172C92E024E5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_1-1666154470228.png" alt="thambisetty_1-1666154470228.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;after creating the queue from step 3 . open queue created from step 3 and subscribe to SNS topic&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_2-1666154677836.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22083i55295DBF7D1C2C94/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_2-1666154677836.png" alt="thambisetty_2-1666154677836.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Modify SQS created in step 3 Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
  "Version": "2008-10-17",
  "Id": "__default_policy_ID",
  "Statement": [
    {
      "Sid": "__owner_statement",
      "Effect": "Allow",
      "Principal": "*",
      "Action": "SQS:*",
      "Resource": "&amp;lt;arn:aws:sqs:us-east-1:000000000000:this-sqs-queue&amp;gt;",
      "Condition": {
        "ArnEquals": {
          "aws:SourceArn": "&amp;lt;arn:aws:sns:us-east-1:000000000000:your-sns-topic"
        }
      }
    }&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;4. Above enabled SNS topic will be subscribed by SQS&lt;/P&gt;&lt;P&gt;Below is the SNS Access policy : easiest way to get this policy created is to create SNS topic while enabling SNS in cloud trail log setup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
  "Version": "2008-10-17",
  "Id": "__default_policy_ID",
  "Statement": [
    {
      "Sid": "__default_statement_ID",
      "Effect": "Allow",
      "Principal": {
        "AWS": "*"
      },
      "Action": [
        "SNS:GetTopicAttributes",
        "SNS:SetTopicAttributes",
        "SNS:AddPermission",
        "SNS:RemovePermission",
        "SNS:DeleteTopic",
        "SNS:Subscribe",
        "SNS:ListSubscriptionsByTopic",
        "SNS:Publish"
      ],
      "Resource": "&amp;lt;arn:aws:sns:us-east-1:0000000000:sns-topic&amp;gt;",
      "Condition": {
        "StringEquals": {
          "AWS:SourceOwner": "&amp;lt;account_id&amp;gt;"
        }
      }
    },
    {
      "Sid": "AWSCloudTrailSNSPolicy20150319",
      "Effect": "Allow",
      "Principal": {
        "Service": "cloudtrail.amazonaws.com"
      },
      "Action": "SNS:Publish",
      "Resource": "&amp;lt;arn:aws:sns:us-east-1:0000000000:sns-topic&amp;gt;",
      "Condition": {
        "StringEquals": {
          "AWS:SourceArn": "&amp;lt;arn:aws:cloudtrail:us-east-1:0000000000:trail/cloudtrail-events&amp;gt;"
        }
      }
    }
  ]
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5. Create IAM Policy ( Added permissions based on my best knowledge and keeping least privilege in mind) &amp;nbsp;using below: Note: don't forget to change SQS and S3 ARNs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "sqs:ListQueues",
                "s3:ListAllMyBuckets"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Allow",
            "Action": [
                "sqs:DeleteMessage",
                "sqs:GetQueueUrl",
                "s3:GetLifecycleConfiguration",
                "s3:GetBucketTagging",
                "sqs:ReceiveMessage",
                "s3:GetBucketLogging",
                "sqs:SendMessage",
                "sqs:GetQueueAttributes",
                "s3:ListBucket",
                "s3:GetAccelerateConfiguration",
                "s3:GetObject",
                "s3:GetBucketCORS",
                "s3:GetBucketLocation"
            ],
            "Resource": [
                "&amp;lt;arn:aws:sqs:us-east-1:00000000:sqs-name&amp;gt;",
                "&amp;lt;arn:aws:s3:::bucket_name&amp;gt;",
                "&amp;lt;arn:aws:s3:::bucket_name&amp;gt;/*&amp;gt;"
            ]
        }
    ]
}​&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6. Create a new role and choose above IAM policy while creating.&lt;BR /&gt;7. create a user&lt;/P&gt;&lt;P&gt;8. In the role trust relationships add below policy to allow user to assume this role.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Principal": {
                "AWS": "&amp;lt;arn:aws:iam::00000000000:user/created_in_step7&amp;gt;"
            },
            "Action": "sts:AssumeRole",
            "Condition": {}
        }
    ]
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: don't try to copy and paste the above policy. some characters are will not be copied properly. especially IAM policy where it gives s3 permission to resource object "buket_arn/*"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2023 04:47:50 GMT</pubDate>
    <dc:creator>thambisetty</dc:creator>
    <dc:date>2023-03-17T04:47:50Z</dc:date>
    <item>
      <title>Setting up SQS based S3 input= Is it a requirement that SQS is updated via a subscription to an SNS topic?</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401755#M5853</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I am running an splunk instance within my AWS account, and i'm trying to setup an Cloudtrail SQS based S3 imput. The cloud trail logs are stored in a bucket (auditlogs) in separate account, which I access via a switch role.&lt;/P&gt;
&lt;P&gt;I have done the following however no data appears in index I have selected&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Created an IAM policy with the required permissions&lt;/LI&gt;
&lt;LI&gt;Created the required SQS Queue, granting permissions to the auditlogs bucket to post events.&lt;/LI&gt;
&lt;LI&gt;Added an event notification on the S3 bucket to forward 'Object-created' events to my SQS Queue&lt;/LI&gt;
&lt;LI&gt;Confirmed that the SQS Queue is receiving messages&lt;/LI&gt;
&lt;LI&gt;Added a new input within the AWS Add on for splunk web, using my auto discovered IAM role&lt;/LI&gt;
&lt;LI&gt;Requested for the input sends data to my aduit index.&lt;/LI&gt;
&lt;LI&gt;Checked the logs on the splunk instance and found no errors, other issues.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Questions&lt;BR /&gt;- The documentation seems very unclear on the need to have an SNS topic in the middle here? Is it a requirement that SQS is updated via a subscription to an SNS topic. Specifically S3 &amp;gt; SNS &amp;gt; SQS &amp;gt; Splunk? Or would S3 &amp;gt; SQS &amp;gt; Splunk also work?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;My auto discovered IAM role applied to the splunk EC2 instance is in a separate account to the S3 bucket i'm trying to import data from. Is this going to cause me issues - I assume this is the issue, but there&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I would appreciate any guidance here!&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:02:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401755#M5853</guid>
      <dc:creator>Stokers_23</dc:creator>
      <dc:date>2022-10-19T14:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input!</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401756#M5854</link>
      <description>&lt;P&gt;I am also confused at this. Document is very unclear. I tried to google it. went through few blogs and videos. All are different.  there are 3 ways to do this as far as I know,&lt;BR /&gt;
1&amp;gt; aws cloudtrail/config &amp;gt; SNS notification enabled at source with S3 bucket &amp;gt; SQS subscription &amp;gt; Splunk (in this case there is a no event notification trigger in S3 bucket)&lt;/P&gt;

&lt;P&gt;2&amp;gt; aws cloudtrail/config &amp;gt; S3 bucket &amp;gt; Event notification trigger as SNS &amp;gt; SQS subscription &amp;gt; Splunk &lt;/P&gt;

&lt;P&gt;3&amp;gt; aws cloudtrail/config &amp;gt; S3 bucket &amp;gt; Event notification trigger as SQS &amp;gt; Splunk &lt;/P&gt;

&lt;P&gt;I am confused which on to follow. So far, I have tried 3rd option. it's working but I am seeing couple of errors "Unable to parse message" from both aws cloudtrail and aws config.&lt;/P&gt;

&lt;P&gt;Will be great if someone can explain!&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:50:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401756#M5854</guid>
      <dc:creator>meet_vadaria</dc:creator>
      <dc:date>2018-11-19T18:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input!</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401757#M5855</link>
      <description>&lt;P&gt;You need to follow the second option.&lt;/P&gt;

&lt;P&gt;2&amp;gt; aws cloudtrail/config &amp;gt; S3 bucket &amp;gt; Event notification trigger as SNS &amp;gt; SQS subscription &amp;gt; Splunk&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Enable the cloudtrail sending notification to SNS&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/5539iF8CD30940059789B/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Create SQS and subscribe the SNS to it&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;In splunk, create the cloudtrail input and choose the SQS that was created in the last step.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/5540i66E0E3C7128279FE/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 20:51:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401757#M5855</guid>
      <dc:creator>wagnerlucena</dc:creator>
      <dc:date>2018-11-22T20:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input!</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401758#M5856</link>
      <description>&lt;P&gt;don't forget upvote if the answer helped you.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Nov 2018 14:22:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401758#M5856</guid>
      <dc:creator>wagnerlucena</dc:creator>
      <dc:date>2018-11-24T14:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input!</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401759#M5857</link>
      <description>&lt;P&gt;The option 2 is the best one to go for.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 21:39:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/401759#M5857</guid>
      <dc:creator>vgollapudi</dc:creator>
      <dc:date>2019-04-15T21:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input!</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/546315#M5858</link>
      <description>&lt;P&gt;What is the difference between Option 2. and Option 3 ? Either way, doesn't the SQS queue get the same event ?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Apr 2021 01:27:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/546315#M5858</guid>
      <dc:creator>om</dc:creator>
      <dc:date>2021-04-01T01:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input= Is it a requirement that SQS is updated via a subscription to an SNS topic?</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/617646#M9061</link>
      <description>&lt;H2&gt;CURRENT APPLICATION&lt;/H2&gt;&lt;H2&gt;Splunk Add-on for AWS&lt;/H2&gt;&lt;P&gt;Version: 6.2.0 Build: 1658820915&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Simple Architecture:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_0-1666155912165.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22084i86FADB5FD1A1E6A1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_0-1666155912165.png" alt="thambisetty_0-1666155912165.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Expected process by Splunk Add-on for AWS is as below:&lt;BR /&gt;&lt;BR /&gt;1. Enable/configure cloud trail logs to s3 bucket and enable SNS topic&amp;nbsp;&lt;BR /&gt;2. create standard SQS queue ( This queue will be used as Dead Letter queue in SQS queue creation of 3rd step)&lt;BR /&gt;3. Create standard SQS queue with below configuration&lt;BR /&gt;&lt;BR /&gt;Make sure your SQS queues have same configuration as below (except name, because your SQS will have different name)&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_0-1666154389016.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22081i1E4841A04CEE25C6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_0-1666154389016.png" alt="thambisetty_0-1666154389016.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;DLQ Configuration for SQS created in step 3 : Choose queue created in 2 step.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_1-1666154470228.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22082i72B8172C92E024E5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_1-1666154470228.png" alt="thambisetty_1-1666154470228.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;after creating the queue from step 3 . open queue created from step 3 and subscribe to SNS topic&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thambisetty_2-1666154677836.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/22083i55295DBF7D1C2C94/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thambisetty_2-1666154677836.png" alt="thambisetty_2-1666154677836.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Modify SQS created in step 3 Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
  "Version": "2008-10-17",
  "Id": "__default_policy_ID",
  "Statement": [
    {
      "Sid": "__owner_statement",
      "Effect": "Allow",
      "Principal": "*",
      "Action": "SQS:*",
      "Resource": "&amp;lt;arn:aws:sqs:us-east-1:000000000000:this-sqs-queue&amp;gt;",
      "Condition": {
        "ArnEquals": {
          "aws:SourceArn": "&amp;lt;arn:aws:sns:us-east-1:000000000000:your-sns-topic"
        }
      }
    }&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;4. Above enabled SNS topic will be subscribed by SQS&lt;/P&gt;&lt;P&gt;Below is the SNS Access policy : easiest way to get this policy created is to create SNS topic while enabling SNS in cloud trail log setup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
  "Version": "2008-10-17",
  "Id": "__default_policy_ID",
  "Statement": [
    {
      "Sid": "__default_statement_ID",
      "Effect": "Allow",
      "Principal": {
        "AWS": "*"
      },
      "Action": [
        "SNS:GetTopicAttributes",
        "SNS:SetTopicAttributes",
        "SNS:AddPermission",
        "SNS:RemovePermission",
        "SNS:DeleteTopic",
        "SNS:Subscribe",
        "SNS:ListSubscriptionsByTopic",
        "SNS:Publish"
      ],
      "Resource": "&amp;lt;arn:aws:sns:us-east-1:0000000000:sns-topic&amp;gt;",
      "Condition": {
        "StringEquals": {
          "AWS:SourceOwner": "&amp;lt;account_id&amp;gt;"
        }
      }
    },
    {
      "Sid": "AWSCloudTrailSNSPolicy20150319",
      "Effect": "Allow",
      "Principal": {
        "Service": "cloudtrail.amazonaws.com"
      },
      "Action": "SNS:Publish",
      "Resource": "&amp;lt;arn:aws:sns:us-east-1:0000000000:sns-topic&amp;gt;",
      "Condition": {
        "StringEquals": {
          "AWS:SourceArn": "&amp;lt;arn:aws:cloudtrail:us-east-1:0000000000:trail/cloudtrail-events&amp;gt;"
        }
      }
    }
  ]
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5. Create IAM Policy ( Added permissions based on my best knowledge and keeping least privilege in mind) &amp;nbsp;using below: Note: don't forget to change SQS and S3 ARNs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "sqs:ListQueues",
                "s3:ListAllMyBuckets"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Allow",
            "Action": [
                "sqs:DeleteMessage",
                "sqs:GetQueueUrl",
                "s3:GetLifecycleConfiguration",
                "s3:GetBucketTagging",
                "sqs:ReceiveMessage",
                "s3:GetBucketLogging",
                "sqs:SendMessage",
                "sqs:GetQueueAttributes",
                "s3:ListBucket",
                "s3:GetAccelerateConfiguration",
                "s3:GetObject",
                "s3:GetBucketCORS",
                "s3:GetBucketLocation"
            ],
            "Resource": [
                "&amp;lt;arn:aws:sqs:us-east-1:00000000:sqs-name&amp;gt;",
                "&amp;lt;arn:aws:s3:::bucket_name&amp;gt;",
                "&amp;lt;arn:aws:s3:::bucket_name&amp;gt;/*&amp;gt;"
            ]
        }
    ]
}​&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6. Create a new role and choose above IAM policy while creating.&lt;BR /&gt;7. create a user&lt;/P&gt;&lt;P&gt;8. In the role trust relationships add below policy to allow user to assume this role.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Principal": {
                "AWS": "&amp;lt;arn:aws:iam::00000000000:user/created_in_step7&amp;gt;"
            },
            "Action": "sts:AssumeRole",
            "Condition": {}
        }
    ]
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: don't try to copy and paste the above policy. some characters are will not be copied properly. especially IAM policy where it gives s3 permission to resource object "buket_arn/*"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 04:47:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/617646#M9061</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2023-03-17T04:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up SQS based S3 input!</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/617649#M9062</link>
      <description>&lt;P&gt;SQS notification can be created from both the ways. But Splunk add-on for aws is designed in way that has dependency to validate signature of the object.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 05:27:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Setting-up-SQS-based-S3-input-Is-it-a-requirement-that-SQS-is/m-p/617649#M9062</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2022-10-19T05:27:56Z</dc:date>
    </item>
  </channel>
</rss>

