N8N Tools - S3 Enhanced
Actions66
- Generate Presigned URL
- Generate Presigned POST
- Create Bucket
- Delete Bucket
- List Buckets
- Upload Object
- Download Object
- Delete Object
- List Objects
- Copy Object
- Get Object ACL
- Put Object ACL
- Get Bucket ACL
- Put Bucket ACL
- Get Bucket CORS
- Put Bucket CORS
- Delete Bucket CORS
- Get Bucket Lifecycle
- Put Bucket Lifecycle
- Delete Bucket Lifecycle
- Get Bucket Policy
- Put Bucket Policy
- Delete Bucket Policy
- Get Object Tagging
- Put Object Tagging
- Delete Object Tagging
- Get Bucket Tagging
- Put Bucket Tagging
- Delete Bucket Tagging
- Create Multipart Upload
- Upload Part
- Complete Multipart Upload
- Abort Multipart Upload
- List Parts
- List Multipart Uploads
- Get Bucket Versioning
- Put Bucket Versioning
- Get Bucket Logging
- Put Bucket Logging
- Get Bucket Notification
- Put Bucket Notification
- Get Bucket Replication
- Put Bucket Replication
- Delete Bucket Replication
- Get Bucket Encryption
- Put Bucket Encryption
- Delete Bucket Encryption
- Get Bucket Website
- Put Bucket Website
- Delete Bucket Website
- Get Bucket Metrics
- Put Bucket Metrics
- Delete Bucket Metrics
- Get Bucket Analytics
- Put Bucket Analytics
- Delete Bucket Analytics
- Get Bucket Inventory
- Put Bucket Inventory
- Delete Bucket Inventory
- Get Bucket Request Payment
- Put Bucket Request Payment
- Get Bucket Accelerate
- Put Bucket Accelerate
- Head Object
- Restore Object
- Select Object Content
Overview
This node provides enhanced operations for managing and interacting with S3-compatible object storage services. It supports a wide range of bucket and object management features, including creating buckets, uploading/downloading objects, setting access controls, configuring bucket policies, lifecycle rules, logging, versioning, multipart uploads, and more.
The Put Bucket Logging operation specifically allows you to configure server access logging on an S3 bucket by specifying a target bucket and prefix where the logs will be stored. This is useful for auditing and monitoring access requests to your buckets.
Common scenarios:
- Enabling detailed access logging on buckets to track requests for security or compliance.
- Managing bucket configurations programmatically within workflows.
- Automating complex S3 bucket setups including logging, lifecycle, and replication.
Practical example:
You want to enable logging on your production bucket my-app-bucket so that all access logs are saved in another bucket called my-logs-bucket under the prefix app-access-logs/. Using this node's Put Bucket Logging operation, you specify these parameters and automate enabling logging without manual AWS Console steps.
Properties
| Name | Meaning |
|---|---|
| Bucket Name | The name of the S3 bucket on which to set the logging configuration. |
| Target Bucket | The destination bucket where the access logs will be stored. |
| Target Prefix | The prefix (folder path) inside the target bucket under which log files will be placed. |
Output
The output JSON object for the Put Bucket Logging operation includes:
bucket: The name of the bucket on which logging was configured.targetBucket: The target bucket specified for storing logs.targetPrefix: The prefix used for log file placement.message: Confirmation message indicating successful update of bucket logging.
Example output JSON:
{
"bucket": "my-app-bucket",
"targetBucket": "my-logs-bucket",
"targetPrefix": "app-access-logs/",
"message": "Bucket logging updated successfully",
"operation": "putBucketLogging",
"timestamp": "2024-06-01T12:00:00.000Z",
"success": true
}
No binary data is output by this operation.
Dependencies
- Requires an S3-compatible service endpoint with appropriate permissions to modify bucket logging settings.
- Needs credentials providing access key ID, secret access key, and optionally session token.
- The node uses AWS SDK v3 for JavaScript internally to communicate with the S3 API.
- Ensure the n8n workflow has configured credentials with sufficient permissions to perform
PutBucketLoggingAPI calls.
Troubleshooting
Access Denied Errors:
If you receive errors related to access denied, verify that the credentials have permission to callPutBucketLoggingon the specified bucket and that the target bucket exists and is accessible.Invalid Bucket Names:
Ensure both the source bucket and target bucket names conform to S3 bucket naming rules.Empty Target Bucket or Prefix:
Providing empty values for target bucket or prefix may cause the logging configuration to be invalid or disabled unintentionally. Always specify a valid target bucket.Network or Endpoint Issues:
Connection failures might indicate incorrect endpoint URLs or network restrictions.Error Messages:
"S3 operation failed: <error message>"indicates the underlying AWS SDK call failed; check the error message for details."Unknown operation: putBucketLogging"would mean the operation parameter is incorrect or unsupported (unlikely here as it is supported).