s3du
is a tool which lets you know how much space your AWS S3 buckets are
using according to either AWS CloudWatch or AWS S3.
The CloudWatch mode is the cheapest, but least accurate option for getting the bucket sizes. It is less accurate because there is up to a 24 hour delay on the real bucket size vs. the size in CloudWatch as CloudWatch is only updated with S3 bucket sizes once per day.
The S3 mode is the most accurate but more expensive mode of operation. In this mode all of the objects in each discovered bucket are listed and their sizes summed.
s3du
can be installed by running cargo install s3du
.
The MSRV for this project is currently 1.78.0.
s3du
uses the default AWS credentials chain. As long as your AWS
credentials are available in some fashion, and your IAM user/role has the
correct permissions simply running s3du
should return some results.
For example, if you manage your credentials with aws-vault
, you might run
s3du
as follows:
aws-vault exec s3du-role -- s3du
By default, s3du
will operate in the us-east-1
region. This can be
overridden either by the AWS_REGION
environment variable, or the --region
CLI argument.
# Overriding the default AWS region with an environment variable
env AWS_REGION=eu-west-1 s3du
# Overriding the default AWS region with a CLI arg
s3du --region=eu-central-1
# Listing all buckets in S3 mode
s3du --mode=s3
# Listing a specific bucket's non-current object versions in S3 mode
s3du --mode=s3 --object-versions=non-current my-bucket
More information on running s3du
can be found in the man page or via
s3du --help
.
The crate has two features, which are both enabled by default.
Feature | Purpose |
---|---|
cloudwatch |
Enable use of CloudWatch API |
s3 |
Enable use of S3 API |
s3du
requires at least one of these features be enabled, attempting to
compile the crate with both features disabled will result in compilation
errors.
The CloudWatch and S3 modes will report sizes slightly differently. The CloudWatch mode will always show the total bucket size, that is, it will show the size of all current objects versions + non-current object versions. It is not possible to change this behaviour.
The S3 mode will, by default, only show the bucket size for current object versions. Command line flags (or environment variables) can be used to change how the S3 mode operates. With these you can change the S3 mode to operate in one of 3 ways:
- All: Show bucket size as the sum of all modes listed below.
- Current: Show bucket size as the sum of all current object versions, this is the default.
- Multipart: Show bucket size as the sum of all in-progress multipart uploads.
- NonCurrent: Show bucket size as the sum of all non-current object versions.
These can be selected via the --object-versions
CLI flag if s3du
was
compiled with the s3
feature.
In order to enable use of s3du
, your IAM user or role will need one or both
of the following IAM policies attached, depending on which s3du
modes you
wish to use.
Full examples of these policies are provided as:
- A CloudFormation template
- IAM policy JSON files
- A Terraform module
Under the aws
directory of the source repository.
This policy will enforce HTTPS use and will allow s3du
access to the AWS
CloudWatch APIs that it requires.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "s3du-cloudwatch",
"Effect": "Allow",
"Action": [
"cloudwatch:GetMetricStatistics",
"cloudwatch:ListMetrics"
],
"Resource": [
"*"
],
"Condition": {
"Bool": {
"aws:SecureTransport": true
}
}
}
]
}
This policy will enforce HTTPS use and will allow s3du
access to the AWS S3
APIs that it requires.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "s3du-s3",
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:ListAllMyBuckets",
"s3:ListBucket",
"s3:ListBucketMultipartUploads",
"s3:ListMultipartUploadParts"
],
"Resource": [
"*"
],
"Condition": {
"Bool": {
"aws:SecureTransport": true
}
}
}
]
}
s3du
allows a custom endpoint to be specified while running in S3 mode. This
allows use on S3 compatible storage such as MinIO.
This use case is currently only tested against MinIO and is very basic.
env AWS_ACCESS_KEY_ID=minio \
AWS_SECRET_ACCESS_KEY=miniosecret \
s3du --mode=s3 --endpoint=https://minio.example.org/