Skip to main content

S3 Setup Guide

Prerequisites

  • Access to the S3 bucket containing the files.
  • For private buckets, an AWS account with the ability to grant permissions to read from the bucket.

Setup Guide

  1. Select Authentication Method.
  2. Enter bucket Region.
  3. If you selected Access Key and Secret, enter the Access Key ID and Secret Access Key.
  4. Specify Bucket name.
  5. (Optional) Folder Path - We examine files under the specified folder and all of its nested subfolders for files we can sync. If you don't provide a prefix, we'll look through the entire container for files to sync.
  6. (Optional) File Pattern - Use a regular expression as the file pattern to decide whether or not to sync specific files. The pattern applies to everything under the prefix (folder path). If you're unsure what regular expression to use, you can leave this field blank, and we'll sync everything under the prefix. For example: If you want all csv files you can enter \.csv$
  7. Enter a Name for the connector.
  8. (Optional) Enter a Description for the connector.
  9. Select the Owner of the connector.
  10. (Optional) Verify that your Stripe account is successfully connected by clicking on Test Connection.
  11. Click Connect.

Create IAM Policy

  • Go to the AWS Management Console.

  • Open the IAM console.

  • In the navigation pane, choose Policies.

  • Choose Create policy.

  • Choose the JSON tab.

  • Enter the following policy:

    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Effect": "Allow",
    "Action": [
    "s3:GetBucketLocation",
    "s3:GetObject",
    "s3:ListBucket"
    ],
    "Resource": [
    "arn:aws:s3:::{your-bucket-name}/*",
    "arn:aws:s3:::{your-bucket-name}"
    ]
    }
    ]
    }
  • Choose Review policy.

  • Specify the Name of your policy. For example, Matia-S3-Access.

  • (Optional) Enter a Description for the policy.

  • Choose Create policy.

Create IAM Role

  • Go to the AWS Management Console.
  • Open the IAM console.
  • In the navigation pane, choose Roles.
  • Choose Create role.
  • Choose Another AWS account.
  • Enter the following account ID: 035563399062.
  • Select the Require external ID check box.
  • Enter the External ID provided by the connector.
  • Click Next: Permissions.
  • In the Filter policies search box, type the name of the policy you created in the previous step and select it. For example, Matia-S3-Access.
  • Click Next: Tags.
  • Click Next: Review.
  • Enter a Name for the role. For example, Matia-S3-Role.
  • (Optional) Enter a Description for the role.
  • Click Create role.

Supported File Format

  • CSV
  • JSON
  • JSONL
  • NDJSON

Supported Streams

There is no predefined streams. The streams are based on content of your bucket.