You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/connections/storage/catalog/aws-s3/index.md
+3-2Lines changed: 3 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,8 @@ To create an S3 IAM role, you must first install and configure the AWS CLI on yo
195
195
196
196
To finish configuration, enable the AWS S3 Destination with IAM Role Support destination in your workspace.
197
197
198
-
1. Add the **AWS S3** destination from the Raw Data section of the Destinations catalog. This document is about the **AWS S3** destination. For information about the **Amazon S3** destination, which does not include IAM Role support, see the documentation [here](/docs/connections/storage/catalog/amazon-s3/).
198
+
1. Add the **AWS S3** destination from the Storage Destinations tab of the catalog. This document is about the **AWS S3** destination. For information about the **Amazon S3** destination, which does not include IAM Role support, see the documentation [here](/docs/connections/storage/catalog/amazon-s3/).
199
+

199
200
2. Select the data source you'll connect to the destination.
200
201
3. Provide a unique name for the destination.
201
202
4. Complete the destination settings:
@@ -217,7 +218,7 @@ To finish configuration, enable the AWS S3 Destination with IAM Role Support des
217
218
To migrate an existing Amazon S3 destination to the AWS S3 with IAM Role Support Destination:
218
219
219
220
1. Configure the IAM role and IAM policy permissions as described in steps 2 - 4 [above](#create-an-iam-role-in-the-aws-console).
220
-
2. Add the AWS S3 with IAM Role Support Destination and add the AWS Region and IAM role ARN. For the bucket name, enter `<YOUR_BUCKET_NAME>/segment-logs/test`. Enable the destination, and verify data is received at `<YOUR_BUCKET_NAME>/segment-logs/test/segment-logs`. If the folder receives data, continue to the next step. If you don't see log entries, check the trust relationship document and IAM policy attached to the role.
221
+
2. Add the **AWS S3** destination and add the AWS Region and IAM role ARN. For the bucket name, enter `<YOUR_BUCKET_NAME>/segment-logs/test`. Enable the destination, and verify data is received at `<YOUR_BUCKET_NAME>/segment-logs/test/segment-logs`. If the folder receives data, continue to the next step. If you don't see log entries, check the trust relationship document and IAM policy attached to the role.
221
222
3. Update the bucket name in the new destination to `<YOUR_BUCKET_NAME>`.
222
223
4. After 1 hour, disable the original Amazon S3 destination.
223
224
5. Verify that the `<YOUR_BUCKET_NAME>/segment-logs` receives data.
0 commit comments