Check whether the network connectivity between the local computer and OBS is normal. If the network is down, restore the network connectivity.
Check whether the account has passed real-name authentication. If not, perform real-name authentication first.
Log in to OBS Console.
On the top navigation menu, you can view the user authentication status.
Figure 1 Account authentication status
If you have not completed the real-name authentication, complete it by referring to Individual Real-Name Authentication Process. The real-name authentication takes effect 40 minutes later.
Check whether the account is in arrears or the account balance is insufficient. If this is the case, pay off the outstanding balance or top up the account.
Log in to OBS Console.
On the top navigation menu, click Billing. The Billing Center page is displayed.
On the Overview page, you can view the balance of the account.
If your account is in arrears, top up it by referring to Renewal Management.
If the object cannot be uploaded after the account is brought current, contact customer service.
Check whether account has the permissions needed to download objects from the bucket. Check the IAM permissions, bucket policies, object policies, bucket ACLs, and object ACLs. If the account does not have the required permissions, obtain them first.
Log in to the management console.
On the top navigation menu, click the username and select Identity and Access Management to log in to the IAM console and verify the permissions of the user.
On the Users page, search for the username.
Click the username to view details for that user, and check what user groups the user belongs to. If the user is not a member of any user group, click Modify and select a user group.
In the navigation pane on the left, click User Groups and find the user group the user belongs to. Click the icon on the left of the user group name to view user group permissions. Find OBS under the Project Name column and click View under the Operation column, to check whether the user group has the permission to download objects. If not, create a user group, configure a policy that grants the user group the permissions required to download objects, and add the user to the user group. Alternatively, you can configure a bucket policy to grant the IAM user the permission to download objects from the bucket. Refer to 3 for more information.
If the account that attempted to download files is not the owner of the bucket, take the actions described in 3 to check the bucket policy.
On the top navigation menu, Click Service List and choose Object Storage Service. On the OBS Console page, check whether the bucket from which the object is to be downloaded restricts users from downloading objects.
Alternatively, you can also use the bucket ACL to grant the account write permissions for the bucket. For details, see Configuring a Bucket ACL.
Check whether KMS encryption is enabled for the current object. If the object is encrypted, downloading objects from OBS Console, OBS Browser+, or obsutil will fail. To download an encrypted object by using the SDK or an API, the decryption key is required.
Check whether the object is in the Archive storage class. If it is and the status is Unrestored, restore the object first.
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.