Does the user executing sync from an ec2 instance to an S3 bucket need to have 
access to the entire S3 tree?

Put works just fine (local file up to S3), but sync gives a 403 from S3 unless 
the user (via IAM) has full access to all S3.



s3cmd put -recursive /mnt/incoming/ s3://bucket/incoming/
/mnt/incoming/file3.txt -> s3://bucket/incoming/file3.txt [1 of 1]

but

s3cmd sync -recursive /mnt/incoming/ s3://bucket/incoming/
ERROR: S3 error: 403 (AccessDenied): Access Denied

It seems related to the bucket the user has permissions to?

So put will work, but sync not if the policy (via IAM) is "Resource": 
"arn:aws:s3:::bucket/incoming/*"

If you change it to your entire S3 bucket range sync does work: "Resource": 
"arn:aws:s3:::*"



which if true is an issue since that opens things up way to far. Can anyone 
else confirm

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a 
definitive record of customers, application performance, security 
threats, fraudulent activity and more. Splunk takes this data and makes 
sense of it. Business sense. IT sense. Common sense.. 
http://p.sf.net/sfu/splunk-d2d-c1
_______________________________________________
S3tools-general mailing list
S3tools-general@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/s3tools-general

Reply via email to