Skip to content

Commit 3b67755

Browse files
authored
Merge pull request #149 from segmentio/repo-sync
repo sync
2 parents 1242278 + 9d42a2c commit 3b67755

File tree

3 files changed

+52
-49
lines changed

3 files changed

+52
-49
lines changed

src/_data/catalog/warehouse.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ items:
1818
description: >-
1919
The AWS S3 destination provides a more secure way to store data in your AWS S3 buckets.
2020
url: connections/storage/catalog/aws-s3
21-
status: PUBLIC_BETA
21+
status: PUBLIC
2222
logo:
2323
url: 'https://d3hotuclm6if1r.cloudfront.net/logos/amazon-s3-default.svg'
2424
mark:

src/connections/destinations/catalog/actions-amplitude/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Build your own subscriptions! Combine supported [triggers](/docs/connections/des
138138
- [Map User](#map-user)
139139
- [Group Identify User](#group-identify-user)
140140

141-
You can see the Segment event fields Amplitude accepts for each action in the Actions subscription set up page. Combine these
141+
You can see the Segment event fields Amplitude accepts for each action in the Actions subscription set up page.
142142

143143
### Log Event
144144

src/connections/storage/catalog/aws-s3/index.md

Lines changed: 50 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -39,63 +39,66 @@ To complete this section, you need access to your AWS dashboard.
3939

4040
1. Create a new S3 bucket in your preferred region. For more information, see Amazon's documentation, [Create your first S3 bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/creating-bucket.html){:target="_blank"}.
4141
2. Create a new IAM role for Segment to assume. For more information, see Amazon's documentation, [Creating a role to delegate permissions to an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html){:target="_blank"}.
42-
3. Attach the following trust relationship document. Be sure to add your Workspace ID to the `sts:ExternalId` field.
43-
```json
42+
1. When prompted to enter an Account ID, enter `595280932656`. (You cannot enter an ARN in this step. In step 4, you can update the `Principal` to a specific role after you create an IAM role.)
43+
2. Click the **Require External ID** checkbox.
44+
3. Enter your Segment Workspace ID in the **External ID** field.
45+
3. Attach the following policy to the IAM role created in step 2. Replace `<YOUR_BUCKET_NAME>` with the name of the S3 bucket you created in step 1.
46+
```json
4447
{
45-
   "Version": "2012-10-17",
46-
   "Statement": [
47-
     {
48-
       "Sid": "",
49-
       "Effect": "Allow",
50-
       "Principal": {
51-
         "AWS": "arn:aws:iam::595280932656:role/segment-s3-integration-production-access"
52-
       },
53-
       "Action": "sts:AssumeRole",
54-
       "Condition": {
55-
         "StringEquals": {
56-
           "sts:ExternalId": "<YOUR_WORKSPACE_ID>"
57-
         }
58-
       }
59-
     }
60-
   ]
61-
 }
48+
"Version": "2012-10-17",
49+
"Statement": [
50+
{
51+
"Sid": "PutObjectsInBucket",
52+
"Effect": "Allow",
53+
"Action": [
54+
"s3:PutObject",
55+
"s3:PutObjectAcl"
56+
],
57+
"Resource": "arn:aws:s3:::<YOUR_BUCKET_NAME>/segment-logs/*"
58+
}
59+
]
60+
}
6261
```
63-
4. Create and attach the following IAM policy to the role created in step 3 above. Replace `<YOUR_BUCKET_NAME>` with the name of the bucket you created in step 1 above.
62+
If you're using KMS encryption on your S3 bucket, add the following policy to the IAM role:
6463
```json
6564
{
66-
"Version": "2012-10-17",
67-
"Statement": [
68-
{
69-
"Sid": "PutObjectsInBucket",
70-
"Effect": "Allow",
71-
"Action": [
72-
"s3:PutObject",
73-
"s3:PutObjectAcl"
74-
],
75-
"Resource": "arn:aws:s3:::<YOUR_BUCKET_NAME>/segment-logs/*"
76-
}
77-
]
65+
"Version": "2012-10-17",
66+
"Statement": [
67+
{
68+
"Sid": "AllowKMS",
69+
"Effect": "Allow",
70+
"Action": [
71+
"kms:GenerateDataKey",
72+
"kms:Decrypt"
73+
],
74+
"Resource": "<YOUR_KEY_ARN>"
75+
}
76+
]
7877
}
7978
```
80-
If you're using KMS encryption on your S3 bucket, add the following policy to the IAM role:
81-
```json
79+
If you have server-side encryption enabled, see the [required configuration](#encryption).
80+
81+
4. Update `Principal` in the role’s trust relationship document to `arn:aws:iam::595280932656:role/segment-s3-integration-production-access`. Replace `<YOUR_WORKSPACE_ID>` with your Segment Workspace ID.
82+
``` json
8283
{
83-
"Version": "2012-10-17",
84-
"Statement": [
84+
"Version": "2012-10-17",
85+
"Statement": [
8586
{
86-
"Sid": "AllowKMS",
87-
"Effect": "Allow",
88-
"Action": [
89-
"kms:GenerateDataKey",
90-
"kms:Decrypt"
91-
],
92-
"Resource": "<YOUR_KEY_ARN>"
87+
"Sid": "",
88+
"Effect": "Allow",
89+
"Principal": {
90+
"AWS": "arn:aws:iam::595280932656:role/segment-s3-integration-production-access"
91+
},
92+
"Action": "sts:AssumeRole",
93+
"Condition": {
94+
"StringEquals": {
95+
"sts:ExternalId": "<YOUR_WORKSPACE_ID>"
96+
}
97+
}
9398
}
9499
]
95100
}
96-
```
97-
98-
If you have server-side encryption enabled, see the [required configuration](#encryption).
101+
```
99102

100103
### Create an IAM role using the AWS CLI
101104

@@ -128,7 +131,7 @@ To create an S3 IAM role, you must first install and configure the AWS CLI on yo
128131
}
129132
```
130133

131-
2. Navigate to the folder containing `trust-relationship-policy.json` and run the following command to create your IAM role and attach the trust relationship document, replacing `<YOUR_ROLE_NAME>` with the name you want to give this IAM role:
134+
2. Navigate to the folder containing `trust-relationship-policy.json` and run the following command to create your IAM role and attach the trust relationship document, replacing `<YOUR_ROLE_NAME>` with the name you want to give the IAM role:
132135

133136
``` python
134137
aws iam create-role --role-name <YOUR_ROLE_NAME> --assume-role-policy-document file://trust-relationship-policy.json --description "IAM role for Segment to assume (AWS S3 destination)"

0 commit comments

Comments
 (0)