Prerequisites for UNLOAD from Timestream for LiveAnalytics - Amazon Timestream
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

For similar capabilities to Amazon Timestream for LiveAnalytics, consider Amazon Timestream for InfluxDB. It offers simplified data ingestion and single-digit millisecond query response times for real-time analytics. Learn more here.

Prerequisites for UNLOAD from Timestream for LiveAnalytics

Following are prerequisites for writing data to S3 using UNLOAD from Timestream for LiveAnalytics.

  • You must have permission to read data from the Timestream for LiveAnalytics table(s) to be used in an UNLOAD command.

  • You must have an Amazon S3 bucket in the same Amazon Region as your Timestream for LiveAnalytics resources.

  • For the selected S3 bucket, ensure that the S3 bucket policy also has permissions to allow Timestream for LiveAnalytics to export the data.

  • The credentials used to execute UNLOAD query must have necessary Amazon Identity and Access Management (IAM) permissions that allows Timestream for LiveAnalytics to write the data to S3. An example policy would be as follows:

{ "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": [ "timestream:Select", "timestream:ListMeasures", "timestream:WriteRecords", "timestream:Unload" ], "Resource": "arn:aws:timestream:<region>:<account_id>:database/<database_name>/table/<table_name>" }, { "Effect": "Allow", "Action": [ "s3:GetBucketAcl", "s3:PutObject", "s3:GetObjectMetadata", "s3:AbortMultipartUpload" ], "Resource": [ "arn:aws:s3:::<S3_Bucket_Created>", "arn:aws:s3:::<S3_Bucket_Created>/*" ] } ] }

For additional context on these S3 write permissions, refer to the Amazon Simple Storage Service guide. If you are using a KMS key for encrypting the exported data, see the following for the additional IAM policies required.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "kms:DescribeKey", "kms:Decrypt", "kms:GenerateDataKey*" ], "Resource": "<account_id>-arn:aws:kms:<region>:<account_id>:key/*", "Condition": { "ForAnyValue:StringLike": { "kms:ResourceAliases": "alias/<Alias_For_Generated_Key>" } } }, { "Effect": "Allow", "Action": [ "kms:CreateGrant" ], "Resource": "<account_id>-arn:aws:kms:<region>:<account_id>:key/*", "Condition": { "ForAnyValue:StringEquals": { "kms:EncryptionContextKeys": "aws:timestream:<database_name>" }, "Bool": { "kms:GrantIsForAWSResource": true }, "StringLike": { "kms:ViaService": "timestream.<region>.amazonaws.com" }, "ForAnyValue:StringLike": { "kms:ResourceAliases": "alias/<Alias_For_Generated_Key>" } } } ] }