Amazon S3 Connector Guide

Amazon S3 Connector Guide

Amazon S3 Connection Properties

Amazon S3 Connection Properties

The Amazon S3 connection properties are similar to other connection types.
The following table describes the AWS Signature Settings applicable settings, which apply to all event sources and event targets in the connection:
AWS Signature Settings
Description
Access Key ID
Required. AWS access key ID of the requester.
Secret Access Key
Required. AWS secret access key of the requester.
The following table describes the Amazon S3 policy and region settingswhich apply to all event sources and event targets in the connection:
Amazon S3 Settings
Description
Policy
The bucket policy (using the JSON-based access policy language required by Amazon) to be applied to any new buckets created by the process.
Amazon S3 Endpoint
The region-specific website endpoint where the S3 bucket should reside if the process creates a new bucket. For example:
s3-website-us-east-1.amazonaws.com
Region
The region where a new bucket should be located. For example:
us-east1
Some regions support Amazon S3 bucket that supports both Signature Version 2 and Signature Version 4 authentications. By default, the connection uses the Signature Version 2 authentication.
You must specify the target region explicitly in the
Amazon S3 Endpoint
field to run a mapping to read or write data to an Amazon S3 bucket that requires Signature Version 4 authentication. Else, the connection uses the Signature Version 2 authentication and the mapping fails. For more information about the Amazon S3 bucket regions support, see "Amazon S3 Documentation".
The following table describes the Client-Side Encryption Settings which apply to all event sources and event targets in the connection:
Client-Side Encryption Settings
Description
Use Data Encryption
If Yes, the content of S3 objects will be decrypted and encrypted by event sources and targets.
Encryption Algorithm
Encryption algorithm that should be used to decrypt and encrypt the S3 objects.
Encryption Key
Base64-encoded secret key that should be used for encryption. The length of the key must match the required key length of the selected encryption algorithm (AES - 128, 192 or 256 bits; DES - 64 bits; 3DES - 192 bits).
Encryption Password
Encryption password that should be used to generate an Encryption Key. You can either enter the Encryption Key or generate the key using this parameter. If both parameters are provided, the Encryption Key is used.

0 COMMENTS

We’d like to hear from you!