Skip to content

Commit 4473158

Browse files
Update index.md
Adding a new statement to the getting started section, Since AWS has updated the STS IAM policy which will affect customers using AWS S3 buckets hosted in the different regions apart from the default.
1 parent 9758233 commit 4473158

File tree

1 file changed

+1
-1
lines changed
  • src/connections/storage/catalog/aws-s3

1 file changed

+1
-1
lines changed

src/connections/storage/catalog/aws-s3/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ All three setup methods provide a base level of permissions to Segment. If you w
3535

3636
To complete this section, you need access to your AWS dashboard.
3737

38-
1. Create a new S3 bucket in your preferred region. For more information, see Amazon's documentation, [Create your first S3 bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/creating-bucket.html){:target="_blank"}.
38+
1. Create a new S3 bucket in your preferred region. For more information, see Amazon's documentation, [Create your first S3 bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/creating-bucket.html){:target="_blank"}. For US-based Segment workspaces using an AWS S3 bucket hosted outside of US West (Oregon), ensure that the US West (Oregon) endpoint is enabled on IAM STS settings for the region(s). Similarly, For the EU-based Segment workspaces ensure that the EU West (Dublin, Ireland) endpoint is enabled on IAM STS settings for the region(s).
3939
2. Create a new IAM role for Segment to assume. For more information, see Amazon's documentation, [Creating a role to delegate permissions to an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html){:target="_blank"}.
4040
1. Select the **AWS account** type from the list of trusted entities.
4141
2. When prompted to enter an Account ID, enter `595280932656`. (You cannot enter an ARN in this step. In step 4, you can update the `Principal` to a specific role after you create an IAM role.)

0 commit comments

Comments
 (0)