mirror of
https://github.com/cloudnative-pg/plugin-barman-cloud.git
synced 2026-03-10 04:32:20 +01:00
Compare commits
4 Commits
f8deaac521
...
d94c5c1e44
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
d94c5c1e44 | ||
|
|
4b80b7973a | ||
|
|
1aa39f2157 | ||
|
|
061c2a0799 |
@ -129,6 +129,41 @@ These strategies help you safeguard backups without requiring broad delete
|
||||
permissions, ensuring both security and compliance with minimal operational
|
||||
overhead.
|
||||
|
||||
### S3 Lifecycle Policy
|
||||
|
||||
Barman Cloud requires the following permissions in the S3 bucket:
|
||||
|
||||
- [`s3:DeleteObject`](https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteObject.html)
|
||||
- [`s3:GetObject`](https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetObject.html)
|
||||
- [`s3:ListBucket`](https://docs.aws.amazon.com/AmazonS3/latest/API/API_ListBuckets.html)
|
||||
- [`s3:PutObject`](https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutObject.html)
|
||||
|
||||
Here's an example of what such a bucket policy may look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Statement": [
|
||||
{
|
||||
"Action": [
|
||||
"s3:DeleteObject",
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:PutObject"
|
||||
],
|
||||
"Effect": "Allow",
|
||||
"Principal": {
|
||||
"AWS": "arn:aws:iam::123456789012:user/MaryMajor"
|
||||
},
|
||||
"Resource": [
|
||||
"arn:aws:s3:::amzn-s3-demo-bucket1",
|
||||
"arn:aws:s3:::amzn-s3-demo-bucket1/*"
|
||||
],
|
||||
"Sid": "statement1",
|
||||
}
|
||||
],
|
||||
"Version":"2012-10-17"
|
||||
}
|
||||
```
|
||||
|
||||
### S3-Compatible Storage Providers
|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user