<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cross-region S3 reads suddenly fail with 400 Bad Request — eu-west-1 metastore to af-south-1 bucket in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/cross-region-s3-reads-suddenly-fail-with-400-bad-request-eu-west/m-p/157229#M54520</link>
    <description>&lt;H2&gt;What changed&lt;/H2&gt;&lt;P&gt;A production daily job that has worked unchanged for ~8 months started failing on 2026-05-18 ~23:46 UTC. The notebook does a plain&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;spark.read.json("s3://BUCKET/...")&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;against a bucket in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;af-south-1&lt;/STRONG&gt;. The metastore is in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;eu-west-1&lt;/STRONG&gt;. Same code, same cluster spec, same external location — just stopped working.&lt;/P&gt;&lt;P&gt;Three independent production jobs that all read from the same af-south-1 bucket failed within a ~3-hour window. Other jobs in the same workspace that don't touch this bucket continued to run fine. Nothing was deployed or reconfigured on our side.&lt;/P&gt;&lt;H2&gt;The error&lt;/H2&gt;&lt;PRE&gt;&amp;lt;html&amp;gt;&amp;lt;body&amp;gt; shaded.databricks.org.apache.hadoop.fs.s3a.AWSBadRequestException:&lt;BR /&gt;getFileStatus on s3://BUCKET/activities/year=2026/month=5/day=18/log.json:&lt;BR /&gt;com.amazonaws.services.s3.model.AmazonS3Exception: Bad Request;&lt;BR /&gt;request: HEAD https://BUCKET.s3.af-south-1.amazonaws.com activities/year%3D2026/month%3D5/day%3D18/log.json&lt;BR /&gt;...&lt;BR /&gt;(Service: Amazon S3; Status Code: 400; Error Code: 400 Bad Request; ...) &amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Error Code: 400 Bad Request&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;— that's the HTTP status text echoed back, not a proper S3 error code (InvalidArgument,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;InvalidRequest, etc.). The response body is empty. This is the signature you typically see when an unsigned or wrongly-signed request hits an opt-in region, because af-south-1 enforces SigV4 with the correct signing region.&lt;/P&gt;&lt;H2&gt;Setup&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Metastore:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;aws:eu-west-1&lt;/LI&gt;&lt;LI&gt;Bucket: af-south-1 (opt-in region, account opt-in status is still&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ENABLED)&lt;/LI&gt;&lt;LI&gt;UC external location pointed at the af-south-1 bucket, storage credential is an AWS IAM role&lt;/LI&gt;&lt;LI&gt;Test Connection in the External Location UI&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;still passes&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(green on Read, List, Write, Delete, Path Exists, Assume Role, etc.)&lt;/LI&gt;&lt;LI&gt;Job cluster has&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;no instance profile&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;— it relies on UC credential vending for S3 access&lt;/LI&gt;&lt;LI&gt;Spark code uses the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;s3://&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;scheme (not&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;s3a://)&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reproduces across every compute kind we tried&lt;/H2&gt;&lt;P&gt;This is the key data point — rules out a single runtime patch as the cause:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Classic job cluster, DBR 17.3 LTS (SINGLE_USER, CLASSIC_PREVIEW)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Hadoop 3.4.2, aws-sdk-java 1.12.681, Scala 2.13.16&lt;/LI&gt;&lt;LI&gt;OS: amzn2023 aarch64&lt;/LI&gt;&lt;LI&gt;Result: 400&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Classic interactive cluster (older DBR)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Hadoop 3.3.6, aws-sdk-java 1.12.638, Scala 2.12.15&lt;/LI&gt;&lt;LI&gt;OS: Linux 5.15 x86_64&lt;/LI&gt;&lt;LI&gt;Result: 400&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Serverless compute, Base environment v1&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Hadoop 3.4.2, aws-sdk-java 1.12.681, Scala 2.13.16&lt;/LI&gt;&lt;LI&gt;OS: amzn2023 x86_64&lt;/LI&gt;&lt;LI&gt;Result: 400&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Three Hadoop versions, two Scala versions, two architectures — all fail identically against af-south-1.&lt;/P&gt;&lt;H2&gt;What I verified and ruled out&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;AWS region opt-in: af-south-1 still&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ENABLED&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on the account (aws account get-region-opt-status)&lt;/LI&gt;&lt;LI&gt;AWS IAM: zero CloudTrail events touching the storage-credential IAM role in the breakage window&lt;/LI&gt;&lt;LI&gt;Bucket config: zero CloudTrail events on the bucket; bucket policy still absent (IAM-only)&lt;/LI&gt;&lt;LI&gt;AWS Organizations SCPs: the account isn't a member of any organization&lt;/LI&gt;&lt;LI&gt;Databricks audit (system.access.audit): zero write events on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;unityCatalog,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;clusters, or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;iam&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in the window&lt;/LI&gt;&lt;LI&gt;Status page: all green during the incident&lt;/LI&gt;&lt;LI&gt;Databricks Runtime maintenance updates for 17.3 LTS published 2026-05-10 to 2026-05-19: only one entry (May 13, Delta sharing client lib bump) — nothing S3/UC related&lt;/LI&gt;&lt;LI&gt;Delete and recreate the external location: does&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;fix it&lt;/LI&gt;&lt;LI&gt;UC vending API itself: still returns&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;200. From&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;system.access.audit,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;generateTemporaryPathCredential&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;calls on the last-successful-day vs first-failed-day are byte-identical (same&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;credential_id,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;url,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;operation,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;credential_kind). UC hands back STS credentials successfully — those credentials then fail when used against af-south-1.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So the API succeeds but the credentials it returns are now poisoned for cross-region. My best guess is the underlying&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;AssumeRole&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;either started attaching a region-scoping session policy or switched from a global to a regional STS endpoint, but I can't see inside the vending implementation to confirm.&lt;/P&gt;&lt;H2&gt;Proof it's specifically the region pair&lt;/H2&gt;&lt;P&gt;I copied one of the failing source files to a fresh&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;eu-west-1&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;bucket, registered a new UC external location for it, and ran the same Spark code from the same compute:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;spark.read.json&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;against the af-south-1 path returned 400&lt;/LI&gt;&lt;LI&gt;spark.read.json&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;against the eu-west-1 copy succeeded&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Same code, same cluster, same UC infrastructure pattern — only the bucket region differs.&lt;/P&gt;</description>
    <pubDate>Tue, 19 May 2026 08:24:04 GMT</pubDate>
    <dc:creator>Bank_Kirati</dc:creator>
    <dc:date>2026-05-19T08:24:04Z</dc:date>
    <item>
      <title>Cross-region S3 reads suddenly fail with 400 Bad Request — eu-west-1 metastore to af-south-1 bucket</title>
      <link>https://community.databricks.com/t5/data-engineering/cross-region-s3-reads-suddenly-fail-with-400-bad-request-eu-west/m-p/157229#M54520</link>
      <description>&lt;H2&gt;What changed&lt;/H2&gt;&lt;P&gt;A production daily job that has worked unchanged for ~8 months started failing on 2026-05-18 ~23:46 UTC. The notebook does a plain&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;spark.read.json("s3://BUCKET/...")&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;against a bucket in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;af-south-1&lt;/STRONG&gt;. The metastore is in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;eu-west-1&lt;/STRONG&gt;. Same code, same cluster spec, same external location — just stopped working.&lt;/P&gt;&lt;P&gt;Three independent production jobs that all read from the same af-south-1 bucket failed within a ~3-hour window. Other jobs in the same workspace that don't touch this bucket continued to run fine. Nothing was deployed or reconfigured on our side.&lt;/P&gt;&lt;H2&gt;The error&lt;/H2&gt;&lt;PRE&gt;&amp;lt;html&amp;gt;&amp;lt;body&amp;gt; shaded.databricks.org.apache.hadoop.fs.s3a.AWSBadRequestException:&lt;BR /&gt;getFileStatus on s3://BUCKET/activities/year=2026/month=5/day=18/log.json:&lt;BR /&gt;com.amazonaws.services.s3.model.AmazonS3Exception: Bad Request;&lt;BR /&gt;request: HEAD https://BUCKET.s3.af-south-1.amazonaws.com activities/year%3D2026/month%3D5/day%3D18/log.json&lt;BR /&gt;...&lt;BR /&gt;(Service: Amazon S3; Status Code: 400; Error Code: 400 Bad Request; ...) &amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Error Code: 400 Bad Request&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;— that's the HTTP status text echoed back, not a proper S3 error code (InvalidArgument,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;InvalidRequest, etc.). The response body is empty. This is the signature you typically see when an unsigned or wrongly-signed request hits an opt-in region, because af-south-1 enforces SigV4 with the correct signing region.&lt;/P&gt;&lt;H2&gt;Setup&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Metastore:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;aws:eu-west-1&lt;/LI&gt;&lt;LI&gt;Bucket: af-south-1 (opt-in region, account opt-in status is still&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ENABLED)&lt;/LI&gt;&lt;LI&gt;UC external location pointed at the af-south-1 bucket, storage credential is an AWS IAM role&lt;/LI&gt;&lt;LI&gt;Test Connection in the External Location UI&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;still passes&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(green on Read, List, Write, Delete, Path Exists, Assume Role, etc.)&lt;/LI&gt;&lt;LI&gt;Job cluster has&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;no instance profile&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;— it relies on UC credential vending for S3 access&lt;/LI&gt;&lt;LI&gt;Spark code uses the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;s3://&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;scheme (not&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;s3a://)&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Reproduces across every compute kind we tried&lt;/H2&gt;&lt;P&gt;This is the key data point — rules out a single runtime patch as the cause:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Classic job cluster, DBR 17.3 LTS (SINGLE_USER, CLASSIC_PREVIEW)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Hadoop 3.4.2, aws-sdk-java 1.12.681, Scala 2.13.16&lt;/LI&gt;&lt;LI&gt;OS: amzn2023 aarch64&lt;/LI&gt;&lt;LI&gt;Result: 400&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Classic interactive cluster (older DBR)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Hadoop 3.3.6, aws-sdk-java 1.12.638, Scala 2.12.15&lt;/LI&gt;&lt;LI&gt;OS: Linux 5.15 x86_64&lt;/LI&gt;&lt;LI&gt;Result: 400&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Serverless compute, Base environment v1&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Hadoop 3.4.2, aws-sdk-java 1.12.681, Scala 2.13.16&lt;/LI&gt;&lt;LI&gt;OS: amzn2023 x86_64&lt;/LI&gt;&lt;LI&gt;Result: 400&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Three Hadoop versions, two Scala versions, two architectures — all fail identically against af-south-1.&lt;/P&gt;&lt;H2&gt;What I verified and ruled out&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;AWS region opt-in: af-south-1 still&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ENABLED&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on the account (aws account get-region-opt-status)&lt;/LI&gt;&lt;LI&gt;AWS IAM: zero CloudTrail events touching the storage-credential IAM role in the breakage window&lt;/LI&gt;&lt;LI&gt;Bucket config: zero CloudTrail events on the bucket; bucket policy still absent (IAM-only)&lt;/LI&gt;&lt;LI&gt;AWS Organizations SCPs: the account isn't a member of any organization&lt;/LI&gt;&lt;LI&gt;Databricks audit (system.access.audit): zero write events on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;unityCatalog,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;clusters, or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;iam&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in the window&lt;/LI&gt;&lt;LI&gt;Status page: all green during the incident&lt;/LI&gt;&lt;LI&gt;Databricks Runtime maintenance updates for 17.3 LTS published 2026-05-10 to 2026-05-19: only one entry (May 13, Delta sharing client lib bump) — nothing S3/UC related&lt;/LI&gt;&lt;LI&gt;Delete and recreate the external location: does&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;fix it&lt;/LI&gt;&lt;LI&gt;UC vending API itself: still returns&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;200. From&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;system.access.audit,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;generateTemporaryPathCredential&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;calls on the last-successful-day vs first-failed-day are byte-identical (same&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;credential_id,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;url,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;operation,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;credential_kind). UC hands back STS credentials successfully — those credentials then fail when used against af-south-1.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So the API succeeds but the credentials it returns are now poisoned for cross-region. My best guess is the underlying&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;AssumeRole&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;either started attaching a region-scoping session policy or switched from a global to a regional STS endpoint, but I can't see inside the vending implementation to confirm.&lt;/P&gt;&lt;H2&gt;Proof it's specifically the region pair&lt;/H2&gt;&lt;P&gt;I copied one of the failing source files to a fresh&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;eu-west-1&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;bucket, registered a new UC external location for it, and ran the same Spark code from the same compute:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;spark.read.json&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;against the af-south-1 path returned 400&lt;/LI&gt;&lt;LI&gt;spark.read.json&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;against the eu-west-1 copy succeeded&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Same code, same cluster, same UC infrastructure pattern — only the bucket region differs.&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 08:24:04 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cross-region-s3-reads-suddenly-fail-with-400-bad-request-eu-west/m-p/157229#M54520</guid>
      <dc:creator>Bank_Kirati</dc:creator>
      <dc:date>2026-05-19T08:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cross-region S3 reads suddenly fail with 400 Bad Request — eu-west-1 metastore to af-south-1 buc</title>
      <link>https://community.databricks.com/t5/data-engineering/cross-region-s3-reads-suddenly-fail-with-400-bad-request-eu-west/m-p/157453#M54560</link>
      <description>&lt;P&gt;Your debugging is really thorough and you've already done the hard work of isolating this. The 400 with an empty body (no proper S3 error code like InvalidArgument) on an opt-in region is almost always one thing: SigV4 signing region mismatch. af-south-1 strictly enforces that the request is signed with af-south-1 as the signing region — if the SDK signs it with eu-west-1 or falls back to a global endpoint, S3 rejects it with exactly this signature.&lt;/P&gt;&lt;P&gt;Your observation that UC vending still returns credentials successfully but those credentials then fail is the giveaway. Something on the Databricks side recently changed how those STS credentials are being scoped or which STS endpoint is being used to generate them — regional STS tokens can carry implicit region restrictions that bite you on cross-region opt-in buckets.&lt;/P&gt;&lt;P&gt;Worth trying as a workaround — add these Spark configs at the cluster level (or session level to test first):&lt;/P&gt;&lt;P&gt;fs.s3a.bucket.&amp;lt;YOUR-BUCKET-NAME&amp;gt;.endpoint s3.af-south-1.amazonaws.com&lt;BR /&gt;fs.s3a.bucket.&amp;lt;YOUR-BUCKET-NAME&amp;gt;.endpoint.region af-south-1&lt;BR /&gt;This forces the S3A client to sign requests for that specific bucket using the correct region regardless of where the metastore sits. Bucket-scoped configs won't affect your other jobs.&lt;/P&gt;&lt;P&gt;That said — given this started on a specific date with no changes on your end and affects UC credential vending internally, you should also open a Databricks Support ticket and reference the date (2026-05-18 ~23:46 UTC). Your audit trail evidence is clean and this has all the hallmarks of a platform-side change to their STS/credential vending layer.&lt;/P&gt;&lt;P&gt;Let us know if the Spark config workaround helps in the meantime.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2026 21:33:48 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cross-region-s3-reads-suddenly-fail-with-400-bad-request-eu-west/m-p/157453#M54560</guid>
      <dc:creator>sameer_yasser</dc:creator>
      <dc:date>2026-05-21T21:33:48Z</dc:date>
    </item>
  </channel>
</rss>

