FAQs
...
AWS S3 - FAQs
How to enable Auto Sync for old S3 buckets connected in CloudFiles
some older s3 connections were set up using a manual sync process on the backend when sync is turned off and then turned back on, cloudfiles now uses a newer, automated setup to re enable it this newer setup requires additional permissions that were not part of the original configuration because of this, the system is unable to complete the sync setup and shows the following error about missing sns permissions {"message" "the iam role does not have the required sns permissions to enable sync please update your cloudformation stack with the latest template to add sns permissions ","error" "bad request","statuscode" 400} you may still see files being uploaded from salesforce to s3, since that part of the integration continues to work independently of the sync setup to resolve this issue, you need to update the iam role used for your s3 connection to include the required sns permissions step 1 find the iam role used for your s3 connection go to the aws account where your s3 integration was set up and open the cloudformation service locate the stack that was created for the cloudfiles s3 setup and open it navigate to the outputs tab and find the role arn the value will look similar to arn\ aws\ iam {accountid}\ role/{iamrole} note the role name after role/ step 2 open the role in aws iam go to iam → roles in aws search for the role using the name you identified from the role arn and open it step 3 add the required sns permissions edit the permissions for this role and add the following policy statement { "action" \[ "sns\ createtopic", "sns\ deletetopic", "sns\ subscribe", "sns\ unsubscribe", "sns\ settopicattributes", "sns\ gettopicattributes", "sns\ listsubscriptionsbytopic" ], "resource" \[ "arn\ aws\ sns {your aws account id}\ cloudfiles " ], "effect" "allow" } replace {your aws account id} with your aws account id this allows cloudfiles to create and manage the sns topic required for the automated sync setup step 4 save the changes save the updated policy and make sure it is attached correctly to the iam role step 5 turn sync back on in cloudfiles return to cloudfiles and enable sync toggle for the s3 connection the setup should now complete successfully expected result once the permissions are updated and sync is enabled, cloudfiles will be able to complete the automated setup and start syncing changes from your s3 bucket if the issue continues if you still see an error, double check that the permissions were added to the correct iam role and that the aws account id in the policy is correct you can then try enabling sync again if the issue persists, contact support\@cloudfiles io and share the error message along with the role arn used for your s3 connection