'S3 Access column shows "Error" for all buckets
In my console, all buckets show "Error" at the access column. Every operation results in an error, being it uploading, downloading, deleting or modifying files. The only thing I can do is creating a bucket. Afterwards however, I can't do anything with it.
I always had access rights and was previously working with my current account. I even tried it with the root account without any success. This seems to have happened miraculously over night as I wasn't working with S3 much during the past days.
N.B. I don't use any other APIs beside the console.
Solution 1:[1]
After hours of googling and trying things out, I finally found out what the origin of the problem was: The browser.
If you encounter this problem try logging in via incognito mode. If the issue is now magically solved, then chances are, some plugin caused the problem, mainly those blocking ads. In my case it was "Avira Browserschutz" but I read that "uBlock Origin" may cause the same issue.
Solution 2:[2]
In your IAM policy permission, you have to add following permission for S3 console to list all your buckets properly (without error).
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Console_List_S3_Buckets",
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:ListAllMyBuckets",
"s3:GetAccountPublicAccessBlock",
"s3:GetBucketAcl",
"s3:GetBucketPolicyStatus",
"s3:GetBucketPublicAccessBlock"
],
"Resource": "*"
}
}
Solution 3:[3]
from the AWS documentation https://aws.amazon.com/premiumsupport/knowledge-center/s3-console-error-access-field/
s3:GetAccountPublicAccessBlock, s3:GetBucketPublicAccessBlock, s3:GetBucketPolicyStatus, s3:GetBucketAcl, s3:ListAccessPoints
... And i added the following ... "s3:ListAllMyBuckets", "s3:GetBucketLocation"
Now all of my bucket items list, have full "access" information...including the Permission -> Permissions overview (inside the bucket)
{
"Sid": "AllowS3ListAllBuckets",
"Effect": "Allow",
"Action": [
"s3:GetAccountPublicAccessBlock",
"s3:GetBucketPublicAccessBlock",
"s3:GetBucketPolicyStatus",
"s3:GetBucketAcl",
"s3:ListAccessPoints",
"s3:ListAllMyBuckets",
"s3:GetBucketLocation"
],
"Resource": "*"
}
Solution 4:[4]
Were you editing your bucket/iam policy? If so it might be because of this issue: https://aws.amazon.com/premiumsupport/knowledge-center/s3-accidentally-denied-access/
Sources
This article follows the attribution requirements of Stack Overflow and is licensed under CC BY-SA 3.0.
Source: Stack Overflow
| Solution | Source |
|---|---|
| Solution 1 | Younes El Ouarti |
| Solution 2 | Tim Malone |
| Solution 3 | |
| Solution 4 | Jake.JS |

