- Newest
- Most votes
- Most comments
Hello
Unfortunately, while the Request ID (VVAC9YNQ8...) and Host ID (kAJJt...) can be helpful for troubleshooting within AWS, they don't directly provide information about the specific file or bucket that caused the "Access Denied" error.
However, here are some steps you can take to investigate further:
Ask the User for Additional Information: If possible, ask the user if they have any other details about the file they were trying to access. This could include the filename, the location where they found the link (if applicable), or any error messages beyond "Access Denied".
Check IAM Policies: If you have access to the IAM console for the S3 account, you can review the policies attached to the user or role that was used to access the file. This can help identify if the user lacks the necessary permissions to access the specific resource.
Search CloudTrail Logs (if enabled): CloudTrail is an AWS service that logs API calls for your account. If CloudTrail is enabled for S3, you can search the logs for entries with the Request ID you received. This might reveal details about the specific S3 operation that was denied.
Consider Alternative Scenarios: There's a possibility the user might be trying to access a public S3 bucket with a typo in the URL. In that case, the "Access Denied" would occur because they wouldn't have permissions for that specific path within the bucket.
Hi,
I would strongly suggest that you use CloudTrail for your purpose.
This page documents very precisely how to do it for S3 requests: https://docs.aws.amazon.com/AmazonS3/latest/userguide/cloudtrail-request-identification.html
Best,
DIdier
I'd advise caution. "Data event" logging would have to be enabled for CloudTrail to log individual object-level operations for S3. Data event logging is always billed separately. By contrast, S3 server access logs are free to produce and deliver, and you only pay for storing and accessing the logs afterwards. CloudTrail logs also don't include certain S3 events, such as authentication failures or operations performed by lifecycle rules, which S3 server access logs include. There's a complete comparison here: https://docs.aws.amazon.com/AmazonS3/latest/userguide/logging-with-S3.html
If your bucket is set to produce S3 server access logs, you can search those logs to find the details for the request. Request ID is one of the fields included in each log entry: https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-s3-access-logs-to-identify-requests.html
Can't see any Screenshot, however here is a recap to troubleshoot such an error : Check S3 Server Access Logs:
If S3 Server Access Logging is enabled, search the logs for the Request ID to find details about the request, including the date, time, and bucket. Use AWS CloudTrail:
If CloudTrail logging is enabled, search the CloudTrail logs for the Request ID. This will provide comprehensive details about the request. Contact AWS Support:
If you can't find the needed information in the logs, provide AWS Support with the Request ID and Host ID for assistance in retrieving more details about the request. Review IAM and Bucket Policies:
Ensure IAM policies and bucket policies are correctly configured to allow the necessary access. Misconfigured policies can lead to access-denied errors.
Relevant content
- asked 2 years ago

Thank you for your answer! Finally, I can't meet the information I want to get In this limited situation. As per the advice of all responders, we should have used CloudTail or S3 Access Log.