4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
    Type 1 or more characters for results.
    Links per page: 20 50 100
    ◄Older
    page 1 / 2
    25 results tagged s3 x
    • thumbnail
      Bucket - ACK
      February 12, 2024 at 1:43:05 PM GMT+1 - permalink - archive.org - https://aws-controllers-k8s.github.io/community/reference/s3/v1alpha1/bucket/
      ack aws s3
    • Bucket - upbound/provider-aws-s3@v1.0.0
      February 12, 2024 at 1:39:11 PM GMT+1 - permalink - archive.org - https://marketplace.upbound.io/providers/upbound/provider-aws-s3/v1.0.0/resources/s3.aws.upbound.io/Bucket/v1beta1#doc:spec-forProvider-forceDestroy
      crossplane s3
    • Working with presigned URLs - Amazon Simple Storage Service

      If you created a presigned URL by using a temporary token, then the URL expires when the token expires, even if you created the URL with a later expiration time. For more information about how the credentials you use affect the expiration time, see Who can create a presigned URL.

      So you have to use regular IAM user instead of IAM role for service generating presigned urls..? :-/

      August 12, 2023 at 10:53:10 AM GMT+2 - permalink - archive.org - https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-presigned-url.html#who-presigned-url
      aws iam presigned s3
    • thumbnail
      GitHub - pottava/aws-s3-proxy: Reverse proxy for AWS S3 with basic authentication.
      August 4, 2022 at 9:40:28 AM GMT+2 - permalink - archive.org - https://github.com/pottava/aws-s3-proxy
      browser proxy s3
    • thumbnail
      Provide cross-account access to objects in Amazon S3 objects
      May 10, 2022 at 2:50:20 PM GMT+2 - permalink - archive.org - https://aws.amazon.com/premiumsupport/knowledge-center/cross-account-access-s3/
      cross s3
    • Sharing an object with a presigned URL - Amazon Simple Storage Service
      August 11, 2021 at 3:02:48 PM GMT+2 - permalink - archive.org - https://docs.aws.amazon.com/AmazonS3/latest/userguide/ShareObjectPreSignedURL.html
      aws s3 share
    • thumbnail
      GitHub - kahing/goofys: a high-performance, POSIX-ish Amazon S3 file system written in Go
      January 6, 2020 at 3:07:26 PM GMT+1 - permalink - archive.org - https://github.com/kahing/goofys
      s3 s3fs
    • thumbnail
      Access S3 using Pyspark by assuming an AWS role. - Leyth Gorgeis - Medium
      January 3, 2020 at 3:16:08 PM GMT+1 - permalink - archive.org - https://medium.com/@leythg/access-s3-using-pyspark-by-assuming-an-aws-role-9558dbef0b9e
      aws role s3 spark
    • thumbnail
      Amazon S3 Path Deprecation Plan – The Rest of the Story | AWS News Blog
      May 9, 2019 at 1:56:24 PM GMT+2 - permalink - archive.org - https://aws.amazon.com/fr/blogs/aws/amazon-s3-path-deprecation-plan-the-rest-of-the-story/
      aws s3
    • thumbnail
      crunchyroll/evs-s3helper: CXOPS-792 This will be deployed on the vod service alongside nginx to manage instance credentials.

      via Philippe

      December 13, 2018 at 9:10:52 AM GMT+1 - permalink - archive.org - https://github.com/crunchyroll/evs-s3helper
      go s3
    • How Do I Create a Lifecycle Policy for an S3 Bucket? - Amazon Simple Storage Service

      To apply this lifecycle rule to all objects in the bucket, choose Next.

      That's why wildcard was not working :D

      September 22, 2017 at 10:14:20 AM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/AmazonS3/latest/user-guide/create-lifecycle.html
      aws policy s3
    • Note: Count object in bucket/folder

      aws s3 ls s3://bucket/path/ --recursive --summarize | grep "Total Objects:"

      July 12, 2017 at 10:12:14 AM GMT+2 - permalink - archive.org - https://links.infomee.fr/?rcG0hg
      aws count s3
    • Amazon Glacier Direct Upload vs Glacier Upload via Amazon S3

      So you can put your data into glacier with 2 differents ways:
      1) directly to glacier via API
      2) Store them to s3 then with a management policy, it'll go to Glacier

      Warning : Huge cost when you download from glacier and when you delete before 3 months

      June 27, 2017 at 11:01:12 AM GMT+2 - permalink - archive.org - https://www.cloudberrylab.com/blog/compare-amazon-glacier-direct-upload-and-glacier-upload-through-amazon-s3/
      aws glacier s3
    • Note: s3 bucket size by api

      aws s3api list-objects --bucket BUCKET_NAME --output json --query "[sum(Contents[].Size), length(Contents[])]"

      Retourne la taille en bytes et le nombre d'objets

      Avec un ficheir qui contient le nom des bucket :

      for BUCKET_NAME in $(cat s3list); do echo -n "$BUCKET_NAME " ; region=$(aws s3api get-bucket-location --bucket $BUCKET_NAME|jq '.LocationConstraint' -r); aws s3api list-objects --region $region --bucket $BUCKET_NAME --output json --query "sum(Contents[].Size)"; done

      June 13, 2017 at 11:55:28 AM GMT+2 * - permalink - archive.org - https://links.infomee.fr/?pbKktw
      s3 size
    • Example 2: Bucket Owner Granting Cross-Account Bucket Permissions - Amazon Simple Storage Service
      Donc pour autoriser un compte externe, on va créer une bucket policy sur notre bucket pour autoriser "arn:aws:iam::account_id:root" ou plus précis sur l'user arn:aws:iam::account_id:user/foobar ou le role

      C'est le compte en face qui va décider qui a le droit de venir sur notre bucket avec des user policy standard (quand on est dans le contexte du compte en face, c'est comme si le bucket nous appartenait)

      Exemple bucket policy à mettre sur le BUCKET de l'account A pour autoriser l'account xxx en RW


      {
          "Version": "2012-10-17",
          "Statement": [





              {
                  "Sid": "Allow account_xx on aws account xxx RW",
                  "Effect": "Allow",
                  "Principal": {
                      "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                  },
                  "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                  "Resource": "arn:aws:s3:::BUCKET"
              },
              {
                  "Sid": "Allow account_xx on aws account xxx RW",
                  "Effect": "Allow",
                  "Principal": {
                      "AWS": "arn:aws:iam::OTHER_ACCOUNT_ID:root"
                  },
                  "Action": [
                      "s3:*"
                  ],
                  "Resource": "arn:aws:s3:::BUCKET/*"
              }




          ]
      }

      Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
      June 12, 2017 at 8:48:42 AM GMT+2 * - permalink - archive.org - http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example2.html
      aws cross iam policy s3
    • thumbnail
      Copy between S3 buckets w/ different accounts · GitHub
      June 8, 2017 at 5:29:42 PM GMT+2 - permalink - archive.org - https://gist.github.com/ushu/7217693
      aws s3
    • Amazon S3 :: How to set Public read permission to Selected folder

      all item in one folder public

      May 31, 2017 at 4:31:15 PM GMT+2 - permalink - archive.org - http://support.bucketexplorer.com/topic1995.html
      s3
    • Note: s3 policy one bucket
      ReadWrite :

      {
          "Version": "2012-10-17",
          "Statement": [
              {
                  "Effect": "Allow",
                   "Action": ["s3:GetBucketLocation", "s3:ListBucket"],
                  "Resource": [
                      "arn:aws:s3:::LeBucket"
                  ]
              },
              {
                  "Effect": "Allow",
                  "Action": [
                      "s3:*"
                  ],
                  "Resource": [
                      "arn:aws:s3:::LeBucket/*"
                  ]
              }
          ]
      }

      Pour Read only, remplacer action du deuxieme bloc par "Action": ["s3:Get*","s3:List*"],
      May 17, 2017 at 5:02:27 PM GMT+2 * - permalink - archive.org - https://links.infomee.fr/?Vp7r6Q
      aws iam s3
    • Note: s3 enpoint

      If you enable s3 enpoint in your route table, it's kind of tricky to know if the endpoint is really working. Two things to validate:
      1) traceroute tcp before and after (traceroute -T s3-us-west-1.amazonaws.com 443)
      You will see more hope when endpoint not activated
      2) try an s3 sync cross region with enpoint activated : it should failed since it's not supported (yet @ 2017-05-02)

      May 2, 2017 at 9:51:18 AM GMT+2 - permalink - archive.org - https://links.infomee.fr/?1wF2Kg
      aws enpoint s3
    • thumbnail
      s3fs-fuse/s3fs-fuse: FUSE-based file system backed by Amazon S3

      I may have to use this one, but issue number is freaking me out

      March 30, 2017 at 9:47:14 AM GMT+2 - permalink - archive.org - https://github.com/s3fs-fuse/s3fs-fuse
      aws fs s3 s3fs
    Links per page: 20 50 100
    ◄Older
    page 1 / 2
    Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation