Create an AWS S3 bucket inside Narrative’s AWS account assigned to the authenticated company.
The created bucket is uniquely accessible by the authenticated company and can be used to facilitate the automation of tasks like ingestion of data into a dataset.
Pay attention, that bucket-owner-full-control ACL is strictly required for “bucket_policy” type of access.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Your 12 digit AWS account ID. That ID will be used:
12345678901
A short identifier that will be a part of your bucket's name.
A typical choice would be your company's name, lowercased and spaces replaced with -.
Resource IDs must:
-"yourcompany"
{
"type": "role",
"external_id": "22a7553b-9240-4b81-93ae-54ccbcde0a8"
}OK
An AWS S3 bucket created inside Narrative's AWS account assigned to a specific company.
Unique identifier for the bucket.
"4d5451ff-5fe6-4db3-9398-4075bbd275b0"
The ID of the company owning the bucket.
The AWS S3 bucket name. The bucket name is of the form nio-${resource_id}-${suffix} where resouce_id is the resource ID provided at bucket creation and suffix is 12 randomly chosen alphanumeric characters.
A random suffix is appended to the bucket name for two reasons:
nio-${resource_id} exists."nio-yourcompanyname-50ac58dabfa1"
ISO-8601 timestamp indicating when the bucket was created.
"2021-08-26T21:06:07.710357Z"
ISO-8601 timestamp indicating when the bucket was last updated.
"2021-08-26T21:06:07.710357Z"
Is it allowed to change access type. Changes are allowed by default. Restrictions could be applied in case bucket was manually config