Enterprise Server Configuration and Transfer Reference / General Trap Configuration Reference |
Docroot path syntax is typically a protocol followed by URL-encoded storage account access credentials and a path in that storage. Aspera-required object storage configuration properties can also be set in the docroot or set in the protocol-specific Trapd .properties configuration file. The general syntax is:
protocol://user:password@object_storage_URL/path/[?storage_configuration]
Docroot paths may be set to cloud or on-premises object storage in the Enterprise Server GUI or by editing aspera.conf using asconfigurator. To set the docroot for a user with asconfigurator, run the following command:
# asconfigurator -x "set_user_data;user_name,username;absolute,docroot"
The docroot can also be configured manually by adding the following text to /opt/aspera/etc/aspera.conf:
<user> <name>username</name> ... <file_system> <access><paths><path> <absolute>docroot</absolute> </path></paths></access> </file_system> </user>
# service asperanoded restart
Docroot Formatting Requirements:
s3://s3.amazonaws.com/my_bucket/
For more information on the IAM roles required for Aspera, see the following knowledge base article:
https://support.asperasoft.com/hc/en-us/articles/216129328-IAM-role-permissions-for-S3-buckets
Without IAM roles, you must specify your access_id and secret_key. You can find these values in the AWS Management Console by clicking your login name and selecting Security Credentials from the drop-down menu. The docroot includes this information with the following format:
s3://access_id:secret_key@s3.amazonaws.com/my_bucket
The docroot can also be used to set storage configuration properties including AWS storage class, infrequent acccess, server encryption, or AWS KMS encryption, by adding the appropriate option:
s3://s3.amazonaws.com/my_bucket/?storage-class=REDUCED_REDUNDANCY s3://s3.amazonaws.com/my_bucket/?storage-class=INFREQUENT_ACCESS s3://s3.amazonaws.com/my_bucket/?server-side-encryption=AES256 s3://s3.amazonaws.com/my_bucket/?server-side-encryption=AWS_KMS
These options can be combined as in the following example, where the & that combines the queries must be URI encoded:
s3://s3.amazonaws.com/my_bucket/?storage-class=REDUCED_REDUNDANCY&server-side-encryption=AES256
azu://storage_account:storage_access_key@blob.core.windows.net/path_to_blob
gs:///my_bucket/my_path
Without a Google service account, obtain the .p12 private key for your storage. For instructions on generating a private key, see the Google Cloud Platform documentation:
https://cloud.google.com/storage/docs/authentication#generating-a-private-key
Save the .p12 file in /opt/aspera/etc/trap. You can specify the project ID and path to the private key either as part of the docroot URI, as in the following example:
gs://email_address@storage.googleapis.com/my_bucket/?aspera.gssession.projectId=project_ID&aspera.gssession.pk12=path_to_private_key_pk12_file</absolute>
test%40developer.gserviceaccount.com
hdfs://username@name_node_address:IPC_port/path_to_folder
Where username is that of an Enterprise Server transfer user. You can use any transfer user on the Enterprise Server because the HDFS URI indicates which user is connecting to HDFS.
s3://access_id:secret_key@accessor_endpoint/vault_name
swift://account_id:api_key@auth_url/my_bucket
The auth_url is the URL pointing to the Keystone Admin service and is entered in the docroot without the preceding "https://". For example, if auth_url is reported as https://lon-identity.open.softlayer.com, then the auth_url is lon-identity.open.softlayer.com in the docroot.
For SoftLayer (including IBM COS - Swift), add ?aspera.swift.endpoint.auth-path=/auth/v1.0 to the docroot. For example, a docroot for IBM COS - Swift is written:
swift://XYZO...46-2:bob:437e...bc16@sjc01.objectstorage.service.networklayer.com/test?aspera.swift.endpoint.auth-path=/auth/v1.0