Skip to content

Commit 57a8b5d

Browse files
author
markzegarelli
authored
Merge pull request #1571 from segmentio/data-res-update
update data res steps
2 parents 03a4e3e + 1809654 commit 57a8b5d

File tree

1 file changed

+28
-2
lines changed

1 file changed

+28
-2
lines changed

src/connections/data-residency.md

Lines changed: 28 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,33 @@ To begin with Local Data Storage, complete the following steps in your AWS accou
7171

7272
Segment requires this access to write raw data to your regionally hosted S3 bucket. Specifically, this allows Segment (as the Segment S3-copy user) to use `s3:PutObject`. To enable encryption at rest, use the default S3 mechanism. If you have server-side encryption enabled with AWS KMS managed keys, see the additional [required configuration step](/docs/connections/storage/catalog/amazon-s3/#encryption). To edit the bucket policy, right-click the bucket name in the AWS management console, and select **Edit policy**.
7373

74-
4. Create a new IAM role in your AWS account with a trust relationship to the role which allows Segment to use the Segment `workspace_id` as `externalID`.
74+
4. Create a new IAM role in your AWS account for Segment to assume. Attach the following trust relationship document to the role:
75+
```json
76+
{
77+
"Version": "2012-10-17",
78+
"Statement": [
79+
{
80+
"Sid": "",
81+
"Effect": "Allow",
82+
"Principal": {
83+
"AWS": [
84+
"arn:aws:iam::595280932656:role/segment-regional-archives-production-access"
85+
]
86+
},
87+
"Action": "sts:AssumeRole",
88+
"Condition": {
89+
"StringEquals": {
90+
"sts:ExternalId": [
91+
"WORKSPACE_ID"
92+
]
93+
}
94+
}
95+
}
96+
]
97+
}
98+
```
99+
**Note**: This IAM role is used for replays only. The writes to the bucket are performed directly by the user added in step 3.
100+
75101
5. Attach this IAM policy to the role defined in Step 4.
76102
```json
77103
{
@@ -90,7 +116,7 @@ To begin with Local Data Storage, complete the following steps in your AWS accou
90116
"Effect": "Allow",
91117
"Action": "s3:*Object*",
92118
"Resource": [
93-
"arn:aws:s3:::YOUR_BUCKET_NAME/*",
119+
"arn:aws:s3:::YOUR_BUCKET_NAME/*"
94120
]
95121
}
96122
]

0 commit comments

Comments
 (0)