Skip to content

Commit 9af7100

Browse files
authored
Merge pull request #4380 from ClickHouse/public-s3-policy
Explain in more detail how public s3 buckets should be configured for…
2 parents d758f1a + 10f7234 commit 9af7100

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

docs/integrations/data-ingestion/clickpipes/object-storage.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,11 @@ These tables will not be visible using ClickHouse Cloud SQL Console, you will ne
156156
## Authentication {#authentication}
157157

158158
### S3 {#s3}
159-
You can access public buckets with no configuration, and with protected buckets you can use [IAM credentials](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html) or an [IAM Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html).
159+
Both publicly accessible and protected S3 buckets are supported.
160+
161+
Public buckets need to allow both the `s3:GetObject` and the `s3:ListBucket` actions in their Policy.
162+
163+
Protected buckets can be accessed using either [IAM credentials](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html) or an [IAM Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html).
160164
To use an IAM Role, you will need to create the IAM Role as specified [in this guide](/cloud/security/secure-s3). Copy the new IAM Role Arn after creation and paste it into the ClickPipe configuration as the "IAM ARN role".
161165

162166
### GCS {#gcs}

0 commit comments

Comments
 (0)