Skip to content
This repository was archived by the owner on Jun 28, 2023. It is now read-only.

Commit 229242c

Browse files
committed
Periodic update - 2023-05-19
1 parent 4170c01 commit 229242c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+621
-234
lines changed

doc_source/EventNotifications.md

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
# Amazon S3 Event Notifications<a name="EventNotifications"></a>
2+
3+
You can use the Amazon S3 Event Notifications feature to receive notifications when certain events happen in your S3 bucket\. To enable notifications, add a notification configuration that identifies the events that you want Amazon S3 to publish\. Make sure that it also identifies the destinations where you want Amazon S3 to send the notifications\. You store this configuration in the *notification* subresource that's associated with a bucket\. For more information, see [Bucket configuration options](UsingBucket.md#bucket-config-options-intro)\. Amazon S3 provides an API for you to manage this subresource\.
4+
5+
**Important**
6+
Amazon S3 event notifications are designed to be delivered at least once\. Typically, event notifications are delivered in seconds but can sometimes take a minute or longer\.
7+
8+
## Overview of Amazon S3 Event Notifications<a name="notification-how-to-overview"></a>
9+
10+
Currently, Amazon S3 can publish notifications for the following events:
11+
+ New object created events
12+
+ Object removal events
13+
+ Restore object events
14+
+ Reduced Redundancy Storage \(RRS\) object lost events
15+
+ Replication events
16+
+ S3 Lifecycle expiration events
17+
+ S3 Lifecycle transition events
18+
+ S3 Intelligent\-Tiering automatic archival events
19+
+ Object tagging events
20+
+ Object ACL PUT events
21+
22+
For full descriptions of all the supported event types, see [Supported event types for SQS, SNS, and Lambda](notification-how-to-event-types-and-destinations.md#supported-notification-event-types)\.
23+
24+
Amazon S3 can send event notification messages to the following destinations\. You specify the Amazon Resource Name \(ARN\) value of these destinations in the notification configuration\.
25+
+ Amazon Simple Notification Service \(Amazon SNS\) topics
26+
+ Amazon Simple Queue Service \(Amazon SQS\) queues
27+
+ AWS Lambda function
28+
29+
For more information, see [Supported event destinations](notification-how-to-event-types-and-destinations.md#supported-notification-destinations)\.
30+
31+
**Note**
32+
Amazon Simple Queue Service FIFO \(First\-In\-First\-Out\) queues aren't supported as an Amazon S3 event notification destination\. To send a notification for an Amazon S3 event to an Amazon SQS FIFO queue, you can use Amazon EventBridge\. For more information, see [Enabling Amazon EventBridge](enable-event-notifications-eventbridge.md)\.
33+
34+
**Warning**
35+
If your notification writes to the same bucket that triggers the notification, it could cause an execution loop\. For example, if the bucket triggers a Lambda function each time an object is uploaded, and the function uploads an object to the bucket, then the function indirectly triggers itself\. To avoid this, use two buckets, or configure the trigger to only apply to a prefix used for incoming objects\.
36+
For more information and an example of using Amazon S3 notifications with AWS Lambda, see [Using AWS Lambda with Amazon S3](https://docs.aws.amazon.com/lambda/latest/dg/with-s3.html) in the *AWS Lambda Developer Guide*\.
37+
38+
For more information about the number of event notification configurations that you can create per bucket, see [Amazon S3 service quotas](https://docs.aws.amazon.com/general/latest/gr/s3.html#limits_s3) in *AWS General Reference*\.
39+
40+
For more information about event notifications, see the following sections\.
41+
42+
**Topics**
43+
+ [Overview of Amazon S3 Event Notifications](#notification-how-to-overview)
44+
+ [Event notification types and destinations](notification-how-to-event-types-and-destinations.md)
45+
+ [Using Amazon SQS, Amazon SNS, and Lambda](how-to-enable-disable-notification-intro.md)
46+
+ [Using EventBridge](EventBridge.md)

doc_source/HostingWebsiteOnS3Setup.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,9 @@ Amazon S3 now applies server\-side encryption with Amazon S3 managed keys \(SSE\
55

66
You can configure an Amazon S3 bucket to function like a website\. This example walks you through the steps of hosting a website on Amazon S3\.
77

8+
**Important**
9+
The following tutorial requires disabling Block Public Access\. We recommend keeping Block Public Access enabled\. If you want to keep all four Block Public Access settings enabled and host a static website, you can use Amazon CloudFront origin access control \(OAC\)\. Amazon CloudFront provides the capabilities required to set up a secure static website\. Amazon S3 static websites support only HTTP endpoints\. Amazon CloudFront uses the durable storage of Amazon S3 while providing additional security headers, such as HTTPS\. HTTPS adds security by encrypting a normal HTTP request and protecting against common cyberattacks\. For more information, see [Getting started with a secure static website](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/getting-started-secure-static-website-cloudformation-template.html) in the *Amazon CloudFront Developer Guide*\.
10+
811
**Topics**
912
+ [Step 1: Create a bucket](#step1-create-bucket-config-as-website)
1013
+ [Step 2: Enable static website hosting](#step2-create-bucket-config-as-website)

doc_source/LogFormat.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ s3.us-west-2.amazonaws.com
218218
Some earlier Regions support legacy endpoints\. You might see these endpoints in your server access logs or AWS CloudTrail logs\. For more information, see [Legacy endpoints](VirtualHosting.md#s3-legacy-endpoints)\. For a complete list of Amazon S3 Regions and endpoints, see [Amazon S3 endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/s3.html) in the *Amazon Web Services General Reference*\.
219219

220220
**TLS version**
221-
The Transport Layer Security \(TLS\) version negotiated by the client\. The value is one of following: `TLSv1`, `TLSv1.1`, `TLSv1.2`, or `-` if TLS wasn't used\.
221+
The Transport Layer Security \(TLS\) version negotiated by the client\. The value is one of following: `TLSv1.1`, `TLSv1.2`, `TLSv1.3`, or `-` if TLS wasn't used\.
222222
**Example entry**
223223

224224
```
@@ -431,7 +431,7 @@ s3.us-west-2.amazonaws.com
431431
Some earlier Regions support legacy endpoints\. You might see these endpoints in your server access logs or AWS CloudTrail logs\. For more information, see [Legacy endpoints](VirtualHosting.md#s3-legacy-endpoints)\. For a complete list of Amazon S3 Regions and endpoints, see [Amazon S3 endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/s3.html) in the *Amazon Web Services General Reference*\.
432432

433433
**TLS version**
434-
The Transport Layer Security \(TLS\) version negotiated by the client\. The value is one of following: `TLSv1`, `TLSv1.1`, `TLSv1.2`, or `-` if TLS wasn't used\.
434+
The Transport Layer Security \(TLS\) version negotiated by the client\. The value is one of following: `TLSv1.1`, `TLSv1.2`, `TLSv1.3`, or `-` if TLS wasn't used\.
435435
**Example entry**
436436

437437
```

doc_source/UsingBucket.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ These are referred to as subresources because they exist in the context of a spe
7373
| Subresource | Description |
7474
| --- | --- |
7575
| *cors* \(cross\-origin resource sharing\) | You can configure your bucket to allow cross\-origin requests\. For more information, see [Using cross\-origin resource sharing \(CORS\)](cors.md)\. |
76-
| *event notification* | You can enable your bucket to send you notifications of specified bucket events\. For more information, see [Amazon S3 Event Notifications](NotificationHowTo.md)\. |
76+
| *event notification* | You can enable your bucket to send you notifications of specified bucket events\. For more information, see [Amazon S3 Event Notifications](EventNotifications.md)\. |
7777
| lifecycle | You can define lifecycle rules for objects in your bucket that have a well\-defined lifecycle\. For example, you can define a rule to archive objects one year after creation, or delete an object 10 years after creation\. For more information, see [Managing your storage lifecycle](object-lifecycle-mgmt.md)\. |
7878
| *location* | When you create a bucket, you specify the AWS Region where you want Amazon S3 to create the bucket\. Amazon S3 stores this information in the location subresource and provides an API for you to retrieve this information\. |
7979
| *logging* | Logging enables you to track requests for access to your bucket\. Each access log record provides details about a single access request, such as the requester, bucket name, request time, request action, response status, and error code, if any\. Access log information can be useful in security and access audits\. It can also help you learn about your customer base and understand your Amazon S3 bill\.   For more information, see [Logging requests using server access logging](ServerLogs.md)\. |

doc_source/UsingKMSEncryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ To require server\-side encryption of all objects in a particular Amazon S3 buck
100100
17. }
101101
```
102102

103-
To require that a particular AWS KMS key be used to encrypt the objects in a bucket, you can use the `s3:x-amz-server-side-encryption-aws-kms-key-id` condition key\. To specify the KMS key, you must use a key Amazon Resource Name \(ARN\) that is in the `arn:aws:kms:region:acct-id:key/key-id` format\.
103+
To require that a particular AWS KMS key be used to encrypt the objects in a bucket, you can use the `s3:x-amz-server-side-encryption-aws-kms-key-id` condition key\. To specify the KMS key, you must use a key Amazon Resource Name \(ARN\) that is in the `arn:aws:kms:region:acct-id:key/key-id` format\. AWS Identity and Access Management does not validate if the string for `s3:x-amz-server-side-encryption-aws-kms-key-id` exists\.
104104

105105
**Note**
106106
When you upload an object, you can specify the KMS key by using the `x-amz-server-side-encryption-aws-kms-key-id` header\. If the header is not present in the request, Amazon S3 assumes that you want to use the AWS managed key\. Regardless, the AWS KMS key ID that Amazon S3 uses for object encryption must match the AWS KMS key ID in the policy, otherwise Amazon S3 denies the request\.

doc_source/Welcome.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Amazon S3 provides features for auditing and managing access to your buckets and
4444

4545
To transform data and trigger workflows to automate a variety of other processing activities at scale, you can use the following features\.
4646
+ [S3 Object Lambda](https://docs.aws.amazon.com/AmazonS3/latest/userguide/transforming-objects.html) – Add your own code to S3 GET, HEAD, and LIST requests to modify and process data as it is returned to an application\. Filter rows, dynamically resize images, redact confidential data, and much more\.
47-
+ [Event notifications](https://docs.aws.amazon.com/AmazonS3/latest/userguide/NotificationHowTo.html) – Trigger workflows that use Amazon Simple Notification Service \(Amazon SNS\), Amazon Simple Queue Service \(Amazon SQS\), and AWS Lambda when a change is made to your S3 resources\.
47+
+ [Event notifications](https://docs.aws.amazon.com/AmazonS3/latest/userguide/EventNotifications.html) – Trigger workflows that use Amazon Simple Notification Service \(Amazon SNS\), Amazon Simple Queue Service \(Amazon SQS\), and AWS Lambda when a change is made to your S3 resources\.
4848

4949
### Storage logging and monitoring<a name="features-storage-monitoring"></a>
5050

0 commit comments

Comments
 (0)