Skip to end of banner
Go to start of banner

Amazon S3

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

This page provides a guide to configuring an Amazon S3 service as a Storage Target in the Verba Recording System.

Amazon Simple Storage Service (Amazon S3) is storage for the Internet. You can use Amazon S3 to store and retrieve any amount of data at any time, from anywhere on the web. Amazon S3 stores data as objects within buckets.

Buckets are containers for objects. You can have one or more buckets. For each bucket, you can control access to it (who can create, delete, and list objects in the bucket), view access logs for it and its objects, and choose the geographical region where Amazon S3 will store the bucket and its contents.

WORM features are also supported, which allows putting retention or legal hold on the objects created by the system. Default retention is also supported. Versioning is not supported. For more information, see WORM and https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock-overview.html.

For a general description of storage targets, please refer to Storage and export targets.

Please refer to the official guide to configure your service:http://docs.aws.amazon.com/AmazonS3/latest/gsg/GetStartedWithS3.html

Creating an Amazon S3 target

Follow the steps below to create a new Verba Storage target for Amazon S3:

Step 1 - Open the Verba Web interface then select Data / Storage Targets from the top menu.

Step 2 - Click on Add New Storage Target

Step 3 - Fill in the configuration form according to the requirements in the following table.

Configuration itemDescription
NameName your storage target. This name will identify this target across the system.
TypeSelect Amazon S3
Bucket

The name of your Bucket in Amazon S3

Bucket Naming

Bucket names must contain only lowercase letters, numbers, periods (.) and dashes (-).

Do not specify folders or subfolders, the system does now support subfolders, only the root folder of the bucket is supported.

Region

Region-specific endpoints that Amazon S3 supports.

For more information, see http://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region

Enable Object Lock and Legal Hold

Select the checkbox if the object lock feature will be used for retention and legal hold.

Object Lock mode

For using the Object Lock feature of Amazon S3 for retention and Legal Hold, it also has to be enabled on the Amazon side. This can be done at the setting of the bucket. For more information, see https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lock.html

There are two levels:

  • Governance: Users can't overwrite or delete an object version or alter its lock settings unless they have special permissions. With governance mode, you protect objects against being deleted by most users, but you can still grant some users permission to alter the retention settings or delete the object if necessary. You can also use governance mode to test retention-period settings before creating a compliance-mode retention period.
  • Compliance: A protected object version can't be overwritten or deleted by any user, including the root user in your AWS account. When an object is locked in compliance mode, its retention mode can't be changed, and its retention period can't be shortened. Compliance mode helps ensure that an object version can't be overwritten or deleted for the duration of the retention period.
Addressing Mode

Specifies the used for connecting to the Amazon S3 bucket. For more information, see https://docs.aws.amazon.com/AmazonS3/latest/userguide/VirtualHosting.html

Virtual Hosted Style: Changes the HTTP HOST header to include the bucket name.
For example https://bucketname.s3.region.amazonaws.com/key-name

Path Style: Sets the bucket in the URL.
For example https://s3.region.amazonaws.com/bucket-name/key-name

Access Key IdAccess Key Id of your Amazon S3
Secret Access KeySecret Access Key of your Amazon S3

Step 4 - Click Save to save the settings

Forward proxy configuration

In order to configure a forward proxy for the Amazon S3 connections, follow the steps below:

In the Verba menu, navigate to System / Servers, select the appropriate server, then click on the Change Configuration tab.

On this tab, fill in the configuration under Storage Management / Storage Targets / Amazon S3. See the table below for reference.

Configuration itemDescription
Forward Proxy Address

IP address or FQDN of the forward proxy. When defined, the system will connect through a forward proxy.

Forward Proxy PortThe port of the forward proxy
Forward Proxy UsernameUsername for basic authentication for the forward proxy server
Forward Proxy PasswordPassword for basic authentication for the forward proxy server

TLS connection configuration

By default, Verba uses the server certificate for the TLS connection. Its details can be found under the Server Certificate node in the server configuration.

When needed, a custom certificate can be used instead, and other connection properties can be also changed.

In the Verba menu, navigate to System / Verba Servers, select the appropriate server, then click on the Change Configuration tab.

On this tab, fill in the configuration under Storage Management / Storage Targets / Amazon S3. See the table below for reference.

Configuration itemDescription
Use Https ProtocolSet to yes, if a secure connection should be used
Storage Class

Specifies what storage class should be used. Available options:

Standard

Reduced Redundancy

Reduced Redundancy Storage (RRS) is a new storage option within Amazon S3 that enables customers to reduce their costs by storing non-critical, reproducible data at lower levels of redundancy than Amazon S3’s standard storage. It provides a cost-effective, highly available solution for distributing or sharing content that is durably stored elsewhere, or for storing thumbnails, transcoded media, or other processed data that can be easily reproduced.

Connection Timeout (ms)Defines the connection timeout value in milliseconds.
TLS Key password

Password for the certificate

TLS Key file

Path to the certificate Key file

TLS CertificatePath to the certificate
TLS CA CertificatePath to the CA certificate
  • No labels