4

I am running an application on AWS EKS cluster and one of the pods has access to my S3 bucket. It works fine until I add a bucket policy.

When I add s3-bucket-ssl-requests-only bucket policy (like this one: https://aws.amazon.com/premiumsupport/knowledge-center/s3-bucket-policy-for-config-rule/), my pod loses accesses to S3 bucket and receives the Access Denied message.

Does anyone have an idea what could be the reason for this and how to allow my pod to access to the bucket with s3-bucket-ssl-requests-only policy?

I am only learning AWS, so please be understanding. I will provide more details if necessary.

EDIT:

The exact policy that I have added:

{
  "Id": "ExamplePolicy",
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowSSLRequestsOnly",
      "Action": "s3:*",
      "Effect": "Deny",
      "Resource": [
        "arn:aws:s3:::my_bucket_name",
        "arn:aws:s3:::my_bucket_name/*"
      ],
      "Condition": {
        "Bool": {
          "aws:SecureTransport": "false"
        }
      },
      "Principal": "*"
    }
  ]
}

where my_bucket_name is the name of my bucket

jtcnw
  • 81
  • 1
  • 4

0 Answers0