2GB limit for 32-bit stacks; all Windows stacks.
Because PHP's integer type is signed and many platforms use 32-bit integers, the AWS SDK for PHP does not correctly handle files larger than 2GB on a 32-bit stack (where "stack" includes CPU, OS, web server, and PHP binary). This is a well-known PHP issue. In the case of Microsoft® Windows®, there are no official builds of PHP that support 64-bit integers.
The recommended solution is to use a 64-bit Linux stack, such as the 64-bit Amazon Linux AMI with the latest version of PHP installed.
Amazon S3 Buckets containing periods
Amazon S3's SSL certificate covers domains that match
*.s3.amazonaws.com. When buckets (e.g.,
my-bucket) are accessed
using DNS-style addressing (e.g.,
my-bucket.s3.amazonaws.com), those SSL/HTTPS connections are covered by the certificate.
However, when a bucket name contains one or more periods (e.g.,
s3.my-domain.com) and is accessed using DNS-style
s3.my-domain.com.s3.amazonaws.com), that SSL/HTTPS connection will fail because the certificate
The most secure workaround is to change the bucket name to one that does not contain periods. Less secure workarounds
are to use
disable_ssl_verification(). Because of the security implications, calling either of
these methods will throw a warning. You can avoid the warning by adjusting your
Expiring request signatures
AmazonS3::create_mpu_object(), it's possible that later parts of the multipart upload will fail if
the upload takes more than 15 minutes.
Too many open file connections
AmazonS3::create_mpu_object(), it's possible that the SDK will attempt to open too many file resources
at once. Because the file connection limit is not available to the PHP environment, the SDK is unable to automatically
adjust the number of connections it attempts to open.
A workaround is to increase the part size so that fewer file connections are opened.
Exceptionally large batch requests
When leveraging the batch request feature to execute multiple requests in parallel, it's possible that the SDK will throw a fatal exception if a particular batch pool is exceptionally large and a service gets overloaded with requests.
This seems to be most common when attempting to send a large number of emails with the SES service.
Long-running processes using SSL leak memory
When making requests with the SDK over SSL during long-running processes, there will be a gradual memory leak that can eventually cause a crash. The leak occurs within the PHP bindings for cURL when attempting to verify the peer during an SSL handshake. See https://bugs.php.net/61030 for details about the bug.
A workaround is to disable SSL for requests executed in long-running processes.