You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/connections/storage/catalog/aws-s3/index.md
+50-47Lines changed: 50 additions & 47 deletions
Original file line number
Diff line number
Diff line change
@@ -39,63 +39,66 @@ To complete this section, you need access to your AWS dashboard.
39
39
40
40
1. Create a new S3 bucket in your preferred region. For more information, see Amazon's documentation, [Create your first S3 bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/creating-bucket.html){:target="_blank"}.
41
41
2. Create a new IAM role for Segment to assume. For more information, see Amazon's documentation, [Creating a role to delegate permissions to an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html){:target="_blank"}.
42
-
3. Attach the following trust relationship document. Be sure to add your Workspace ID to the `sts:ExternalId` field.
43
-
```json
42
+
1. When prompted to enter an Account ID, enter `595280932656`. (You cannot enter an ARN in this step. In step 4, you can update the `Principal` to a specific role after you create an IAM role.)
43
+
2. Click the **Require External ID** checkbox.
44
+
3. Enter your Segment Workspace ID in the **External ID** field.
45
+
3. Attach the following policy to the IAM role created in step 2. Replace `<YOUR_BUCKET_NAME>` with the name of the S3 bucket you created in step 1.
4. Create and attach the following IAM policy to the role created in step 3 above. Replace `<YOUR_BUCKET_NAME>` with the name of the bucket you created in step 1 above.
62
+
If you're using KMS encryption on your S3 bucket, add the following policy to the IAM role:
If you're using KMS encryption on your S3 bucket, add the following policy to the IAM role:
81
-
```json
79
+
If you have server-side encryption enabled, see the [required configuration](#encryption).
80
+
81
+
4. Update `Principal` in the role’s trust relationship document to `arn:aws:iam::595280932656:role/segment-s3-integration-production-access`. Replace `<YOUR_WORKSPACE_ID>` with your Segment Workspace ID.
If you have server-side encryption enabled, see the [required configuration](#encryption).
101
+
```
99
102
100
103
### Create an IAM role using the AWS CLI
101
104
@@ -128,7 +131,7 @@ To create an S3 IAM role, you must first install and configure the AWS CLI on yo
128
131
}
129
132
```
130
133
131
-
2. Navigate to the folder containing `trust-relationship-policy.json` and run the following command to create your IAM role and attach the trust relationship document, replacing `<YOUR_ROLE_NAME>` with the name you want to give this IAM role:
134
+
2. Navigate to the folder containing `trust-relationship-policy.json` and run the following command to create your IAM role and attach the trust relationship document, replacing `<YOUR_ROLE_NAME>` with the name you want to give the IAM role:
132
135
133
136
``` python
134
137
aws iam create-role --role-name <YOUR_ROLE_NAME> --assume-role-policy-document file://trust-relationship-policy.json --description "IAM role for Segment to assume (AWS S3 destination)"
0 commit comments