Skip to main content

S3 Object Storage

Archive reports to S3-compatible object storage for long-term retention, compliance, and historical reference.

S3 Object Storage delivery interface configuration showing access key, secret key, region, bucket name, and custom endpoint fields

Use Cases

ScenarioBenefit
Compliance archivingImmutable records for audit requirements
Historical reference"What did this dashboard look like on date X?"
Long-term retentionStore beyond housekeeping limits
Cross-system accessOther tools can retrieve archived reports

Configuration

FieldDescriptionRequired
NameInterface identifierYes
Access key IDAWS access key or S3-compatible credentialsYes
Secret access keyAWS secret key (stored encrypted)Yes
RegionAWS region (e.g., eu-west-1)Yes
Bucket nameTarget S3 bucketYes
Custom endpointFor S3-compatible storage (MinIO, etc.)No

Provider Configurations

AWS S3

Access key ID: AKIAIOSFODNN7EXAMPLE
Secret access key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Region: eu-west-1
Bucket name: my-reports-bucket
Custom endpoint: (leave empty)

MinIO (Self-Hosted)

Access key ID: minioadmin
Secret access key: minioadmin
Region: us-east-1
Bucket name: anaphora-reports
Custom endpoint: https://minio.internal:9000

DigitalOcean Spaces

Access key ID: DO00EXAMPLE
Secret access key: your-secret-key
Region: nyc3
Bucket name: my-space-name
Custom endpoint: https://nyc3.digitaloceanspaces.com

Backblaze B2

Access key ID: your-key-id
Secret access key: your-application-key
Region: us-west-002
Bucket name: your-bucket
Custom endpoint: https://s3.us-west-002.backblazeb2.com

IAM Permissions

For AWS S3, the IAM user/role needs these permissions:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::my-reports-bucket",
"arn:aws:s3:::my-reports-bucket/*"
]
}
]
}
Least Privilege

For write-only archiving, you can remove s3:GetObject permission.

Testing

  1. Configure the S3 interface with your credentials
  2. Click Test
  3. Verify a test file appears in your bucket

Troubleshooting

IssueSolution
Access DeniedVerify IAM permissions, check bucket policy
Invalid credentialsDouble-check access key and secret
Bucket not foundVerify bucket name and region match
Connection timeoutCheck custom endpoint URL, verify network access
SSL certificate errorFor self-signed certs, configure trust settings

Best Practices

Security

  • Use dedicated IAM credentials with minimal permissions
  • Enable bucket versioning for compliance requirements
  • Consider enabling server-side encryption (SSE-S3 or SSE-KMS)
  • Restrict bucket access with bucket policies