S3Bubble Support Forums
To stay up to date with the latest S3Bubble updates and tutorials please make sure you sign up to our YouTube Channel.
home › Forums › General Questions & Bugs › Bucket Backup
- This topic has 5 replies, 2 voices, and was last updated 8 years, 6 months ago by s3bubble. 
- 
		AuthorPosts
- 
		
			- 
April 11, 2017 at 2:07 pm #30121dani74 ParticipantI am wondering what backup options should I choose for the S3 buckets. I would like to protect the videos from accidental deletion. Will s3bubble work if there is versioning enabled with MFA Delete protection. Or should I find a way to create incremental backups to another bucket with glacier storage? Currently I have more than 200GB of data and growing. 
- 
April 11, 2017 at 3:42 pm #30122s3bubble KeymasterHi dani74, You can attach no-delete policy to your s3 bucket. { "Version": "2012-10-17", "Statement": [ { "Sid": "Stmt1480692207000", "Effect": "Deny", "Action": [ "s3:DeleteBucket", "s3:DeleteBucketPolicy", "s3:DeleteBucketWebsite", "s3:DeleteObject", "s3:DeleteObjectVersion" ], "Resource": [ "arn:aws:s3:::<bucketname>/*" ] } ] }The above would prevent any objects from being deleted within your bucket. Best Regards Sam - 
		This reply was modified 8 years, 6 months ago by s3bubble. 
 
- 
		This reply was modified 8 years, 6 months ago by 
- 
April 12, 2017 at 2:47 am #30126dani74 ParticipantWhen I try to add the policy I get the following error: Error 
 Missing required field PrincipalNot sure what to put as principle. Looked at the AWS docs and there are a lot of options, could be “*”, not sure what is the best to put. Please advise. Also once I put “s3:DeleteBucketPolicy” 
 Will I be able to change the policy in the future if i need to delete an object in the bucket?
- 
April 12, 2017 at 2:47 pm #30129s3bubble KeymasterHi dani74, Thanks for the update we took a look at doing this ourselves on a test bucket, the bucket already had a Cloudfront lockdown policy so we looked to apply it to this. The current bucket policy was. { "Version": "2008-10-17", "Id": "S3BubbleCloudfrontSecurity", "Statement": [ { "Sid": "S3BubbleAllow", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::cloudfront:user/CloudFront Origin Access Identity E2D70SZTA01982" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::s3bubble-test-support/*" } ] }After trying to add the policy we stated above we had the same issue which seemed to be related to the “s3:DeleteBucket” action this may need to be applied to a user policy. After testing the full policy below works for us. { "Version": "2008-10-17", "Id": "S3BubbleCloudfrontSecurity", "Statement": [ { "Sid": "S3BubbleAllow", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::cloudfront:user/CloudFront Origin Access Identity E2D70SZTA01982" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::s3bubble-test-support/*" }, { "Sid": "S3BubbleDenyDelete", "Effect": "Deny", "Principal": "*", "Action": [ "s3:DeleteObject", "s3:DeleteObjectVersion" ], "Resource": "arn:aws:s3:::s3bubble-test-support/*" } ] }After adding this policy and saving we then tried to delete an object through S3Bubble admin and got the correct Access Denied message. You can remove and add policies as needed. Hope this helps Best Regards Sam - 
		This reply was modified 8 years, 6 months ago by s3bubble. 
 
- 
		This reply was modified 8 years, 6 months ago by 
- 
April 14, 2017 at 2:12 pm #30149dani74 ParticipantI attached the above policy to a test bucket and used only the deny statement and it works fine: 
 {
 “Version”: “2008-10-17”,
 “Id”: “S3BubbleCloudfrontSecurity”,
 “Statement”: [
 {
 “Sid”: “S3BubbleDenyDelete”,
 “Effect”: “Deny”,
 “Principal”: “*”,
 “Action”: [
 “s3:DeleteObject”,
 “s3:DeleteObjectVersion”
 ],
 “Resource”: “arn:aws:s3:::<bucket-name>/*”
 }
 ]
 }But this is a little bit inconvenient for me as the HLS encoding and encryption has to be done in the same bucket, which leaves the original video file in the bucket. I would like to delete the original files as they are huge and I have to pay for storage. Also what if the bucket itself gets deleted by mistake or if somebody gains access to the account with malicious intends? I know these are very rare probabilities, but back to the general question, is there a way to backup the whole bucket somehow and having a script checking for new files and backing them up on regular basis? 
- 
April 17, 2017 at 5:34 pm #30170s3bubble KeymasterHi dani74, I think what you need to do is remove the delete policy from the IAM user, you have full control over what actions you can allow for your setup user. Here is what we did for testing. Go to IAM users: https://console.aws.amazon.com/iam/home Select your group or user depending on how you have attached S3Bubble. You can detach the AmazonS3FullAccess policy and then create an Inline polcy Select the policy generator you can then select Effect: Allow 
 AWS Service: S3
 Actions: Select every action here you would like this policy to allow.You have full control over the permissions you would like this policy to have. Hope this helps Best Regards Sam 
 
- 
- 
		AuthorPosts
- The topic ‘Bucket Backup’ is closed to new replies.

