File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -129,6 +129,46 @@ These strategies help you safeguard backups without requiring broad delete
129129permissions, ensuring both security and compliance with minimal operational
130130overhead.
131131
132+ ### S3 Lifecycle Policy
133+
134+ Barman Cloud requires the following permissions in the S3 bucket:
135+
136+ - [ ` s3:AbortMultipartUpload ` ] ( https://docs.aws.amazon.com/AmazonS3/latest/API/API_AbortMultipartUpload.html )
137+ - [ ` s3:CreateBucket ` ] ( https://docs.aws.amazon.com/AmazonS3/latest/API/API_CreateBucket.html )
138+ - [ ` s3:DeleteObject ` ] ( https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteObject.html )
139+ - [ ` s3:GetObject ` ] ( https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetObject.html )
140+ - [ ` s3:ListBucket ` ] ( https://docs.aws.amazon.com/AmazonS3/latest/API/API_ListBuckets.html )
141+ - [ ` s3:PutObject ` ] ( https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutObject.html )
142+
143+ Here's an example of what such a bucket policy may look like:
144+
145+ ``` json
146+ {
147+ "Statement" : [
148+ {
149+ "Action" : [
150+ " s3:AbortMultipartUpload" ,
151+ " s3:CreateBucket" ,
152+ " s3:DeleteObject" ,
153+ " s3:GetObject" ,
154+ " s3:ListBucket" ,
155+ " s3:PutObject"
156+ ],
157+ "Effect" : " Allow" ,
158+ "Principal" : {
159+ "AWS" : " arn:aws:iam::123456789012:user/MaryMajor"
160+ },
161+ "Resource" : [
162+ " arn:aws:s3:::amzn-s3-demo-bucket1" ,
163+ " arn:aws:s3:::amzn-s3-demo-bucket1/*"
164+ ],
165+ "Sid" : " statement1" ,
166+ }
167+ ],
168+ "Version" :" 2012-10-17"
169+ }
170+ ```
171+
132172### S3-Compatible Storage Providers
133173
134174You can use S3-compatible services like ** MinIO** , ** Linode (Akamai) Object Storage** ,
You can’t perform that action at this time.
0 commit comments