Create an S3 bucket.
type: "io.kestra.plugin.aws.s3.createbucket"Create a new bucket with some options
id: aws_s3_create_bucket
namespace: company.team
inputs:
- id: bucket
type: STRING
defaults: my-bucket
- id: region
type: STRING
defaults: eu-central-1
tasks:
- id: create_bucket
type: io.kestra.plugin.aws.s3.CreateBucket
accessKeyId: "{{ secret('AWS_ACCESS_KEY_ID') }}"
secretKeyId: "{{ secret('AWS_SECRET_KEY_ID') }}"
region: "{{ inputs.region }}"
bucket: "{{ inputs.bucket }}"
YESThe S3 bucket name to create.
YESAccess Key Id in order to connect to AWS.
If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YESThe canned ACL to apply to the bucket.
NOEnable compatibility mode.
Use it to connect to S3 bucket with S3 compatible services that don't support the new transport client.
YESThe endpoint with which the SDK should communicate.
This property allows you to use a different S3 compatible storage backend.
NOForce path style access.
Must only be used when compatibilityMode is enabled.
YESAllows grantee the read, write, read ACP, and write ACP permissions on the bucket.
YESAllows grantee to list the objects in the bucket.
YESAllows grantee to list the ACL for the applicable bucket.
YESAllows grantee to create, overwrite, and delete any object in the bucket.
YESAllows grantee to write the ACL for the applicable bucket.
NOSpecifies whether you want S3 Object Lock to be enabled for the new bucket.
YESAWS region with which the SDK should communicate.
YESSecret Key Id in order to connect to AWS.
If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YESAWS session token, retrieved from an AWS token service, used for authenticating that this user has received temporary permissions to access a given resource.
If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YESThe AWS STS endpoint with which the SDKClient should communicate.
YESAWS STS Role.
The Amazon Resource Name (ARN) of the role to assume. If set the task will use the StsAssumeRoleCredentialsProvider. If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YESAWS STS External Id.
A unique identifier that might be required when you assume a role in another account. This property is only used when an stsRoleArn is defined.
YESPT15MdurationAWS STS Session duration.
The duration of the role session (default: 15 minutes, i.e., PT15M). This property is only used when an stsRoleArn is defined.
YESAWS STS Session name.
This property is only used when an stsRoleArn is defined.