{"_id":"592892c1712e642f00428f21","category":{"_id":"5785191af3a10c0e009b75b0","version":"55faf11ba62ba1170021a9aa","__v":0,"project":"55faf11ba62ba1170021a9a7","sync":{"url":"","isSync":false},"reference":false,"createdAt":"2016-07-12T16:21:46.337Z","from_sync":false,"order":25,"slug":"connect-cloud-storage","title":"CONNECT CLOUD STORAGE"},"version":{"_id":"55faf11ba62ba1170021a9aa","project":"55faf11ba62ba1170021a9a7","__v":37,"createdAt":"2015-09-17T16:58:03.490Z","releaseDate":"2015-09-17T16:58:03.490Z","categories":["55faf11ca62ba1170021a9ab","55faf8f4d0e22017005b8272","55faf91aa62ba1170021a9b5","55faf929a8a7770d00c2c0bd","55faf932a8a7770d00c2c0bf","55faf94b17b9d00d00969f47","55faf958d0e22017005b8274","55faf95fa8a7770d00c2c0c0","55faf96917b9d00d00969f48","55faf970a8a7770d00c2c0c1","55faf98c825d5f19001fa3a6","55faf99aa62ba1170021a9b8","55faf99fa62ba1170021a9b9","55faf9aa17b9d00d00969f49","55faf9b6a8a7770d00c2c0c3","55faf9bda62ba1170021a9ba","5604570090ee490d00440551","5637e8b2fbe1c50d008cb078","5649bb624fa1460d00780add","5671974d1b6b730d008b4823","5671979d60c8e70d006c9760","568e8eef70ca1f0d0035808e","56d0a2081ecc471500f1795e","56d4a0adde40c70b00823ea3","56d96b03dd90610b00270849","56fbb83d8f21c817002af880","573c811bee2b3b2200422be1","576bc92afb62dd20001cda85","5771811e27a5c20e00030dcd","5785191af3a10c0e009b75b0","57bdf84d5d48411900cd8dc0","57ff5c5dc135231700aed806","5804caf792398f0f00e77521","58458b4fba4f1c0f009692bb","586d3c287c6b5b2300c05055","58ef66d88646742f009a0216","58f5d52d7891630f00fe4e77"],"is_deprecated":false,"is_hidden":false,"is_beta":true,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"user":"5613e4f8fdd08f2b00437620","project":"55faf11ba62ba1170021a9a7","__v":0,"parentDoc":null,"updates":[],"next":{"pages":[],"description":""},"createdAt":"2017-05-26T20:40:33.842Z","link_external":false,"link_url":"","githubsync":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":13,"body":"##Overview\n\nAttach a volume for use on the CGC's visual interface. Use this tutorial if your cloud storage provider is Google Cloud Storage (GCS).\n\nOr, learn more if your cloud storage provider is [Amazon Web Services (AWS)](doc:attach-an-amazon-web-services-aws-volume).\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##Prerequisite\n\n* An [Google Cloud Platform (GCP)](https://cloud.google.com/) account\n* One or more buckets on this GCP account.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##Procedure\n\n1. Navigate to the Volumes dashboard.\n2. Click **+ Attach volume** and choose the cloud storage provider for your volume.\n3. Obtain IAM user details if you have not already done so.\n4. Enter IAM user credentials\n5. Authorize the IAM user to access your GCS bucket.\n6. Provide bucket details.\n6. Review volume details and confirm to connect your volume.\n\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 1] Access the Volumes Dashboard\n\n1. On the CGC, click on the **Data** tab of the top navigation bar.\n2. Select **Volumes** from the drop-down menu.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 2] Choose a cloud storage provider\n\n1. On the Volumes Dashboard of the CGC, click **+ Attach volume**.\n2. Select **Google Cloud Storage** as your cloud storage provider.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 3] Obtain IAM user details\n\nPrior to attaching your GCS bucket to the CGC, you must register it as a volume on the Google Cloud Platform console.\n\n1. Log into the [Google Cloud Platform console](https://console.cloud.google.com).\n2. Search for **IAM** in the top navigation bar. Select **IAM & Admin** from the drop-down menu.\n3. Click **Service accounts** in the left sidebar.\n4. Click **+ Create service account** below the search bar.\n5. Fill in account details, as shown below, making sure that:\n* **Furnish a new private key** is checked\n* A **Key type** of **JSON** is selected\n6. **Enable Google Apps Domain-wide Delegation** is unchecked\n7. Select a role of Viewer from the Role drop-down menu. This grants your service account the permission to access all the contents of objects in the specified GCS project, not just a particular bucket.\n8. Click **Create** to finish.\n\nYour browser will download a JSON file containing the credentials for this user. Keep this file safe.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 4] Enter IAM user credentials\n\nOn the CGC, enter your IAM credentials in the Credentials tab as found in the downloaded JSON from the previous step.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 5] Authorize the IAM user to access your GCS bucket\nIf you have not authorized the IAM user to access your GCS bucket, follow the directions below on the Google Cloud Platform console.\n\n1. On the Google Cloud Platform console, use the drop-down menu to navigate to **Storage**.\n2. Locate your bucket and click the three vertical dots to the far left of your bucket's name.\n3. Click **Edit bucket permissions**.\n4. Click **+ Add item**.\n5. From the drop-down menu, select **User** and enter the service account client's email in the next box. This email is located in the JSON downloaded in the previous section.\n6. From the drop-down menu, select **Reader** for Read Only (RO) access or **Writer** for Read-write (RW) access.\n7. Click **Save**.\n8. Select the three vertical dots to the far left of your bucket's name once more.\n9. Click **Edit object default permissions**.\n10. Click **+Add item**.\n11. From the drop-down menu, select **User** and enter the service account client's email in the next box.\n12. From the next drop-down menu, select **Reader**.\n13. Click **Save**.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 6] Provide GCS bucket details\n\n1. On the CGC, enter your GCS bucket name.\n2. Optionally define a new name for the volume created from this GCS bucket on the CGC.\n3. Optionally enter a description for your volume.\n4. Select access privileges: choose between** Read only (RO)** and **Read and Write (RW)**.\n5. Optionally enter a prefix. Learn more about [prefixes](doc:volumes#prefix).\n6.Click **Next** to confirm.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 7] Review volume details\nIn this tab, review the details for your volume and click **Confirm**.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##Next step\nCongratulations! You've attached your volume to the CGC. You can make individual data objects within it available as \"aliases\" on the CGC. Aliases point to files stored on your cloud storage bucket and can be copied, executed, and organized like normal files on the CGC. We call this operation \"importing\". Learn more about working with [aliases](doc:aliases).\n\n<div align=\"right\"><a href=\"#top\">top</a></div>","excerpt":"","slug":"attach-a-google-cloud-storage-volume","type":"basic","title":"Attach a Google Cloud Storage volume"}

Attach a Google Cloud Storage volume


##Overview Attach a volume for use on the CGC's visual interface. Use this tutorial if your cloud storage provider is Google Cloud Storage (GCS). Or, learn more if your cloud storage provider is [Amazon Web Services (AWS)](doc:attach-an-amazon-web-services-aws-volume). <div align="right"><a href="#top">top</a></div> ##Prerequisite * An [Google Cloud Platform (GCP)](https://cloud.google.com/) account * One or more buckets on this GCP account. <div align="right"><a href="#top">top</a></div> ##Procedure 1. Navigate to the Volumes dashboard. 2. Click **+ Attach volume** and choose the cloud storage provider for your volume. 3. Obtain IAM user details if you have not already done so. 4. Enter IAM user credentials 5. Authorize the IAM user to access your GCS bucket. 6. Provide bucket details. 6. Review volume details and confirm to connect your volume. <div align="right"><a href="#top">top</a></div> ##[Step 1] Access the Volumes Dashboard 1. On the CGC, click on the **Data** tab of the top navigation bar. 2. Select **Volumes** from the drop-down menu. <div align="right"><a href="#top">top</a></div> ##[Step 2] Choose a cloud storage provider 1. On the Volumes Dashboard of the CGC, click **+ Attach volume**. 2. Select **Google Cloud Storage** as your cloud storage provider. <div align="right"><a href="#top">top</a></div> ##[Step 3] Obtain IAM user details Prior to attaching your GCS bucket to the CGC, you must register it as a volume on the Google Cloud Platform console. 1. Log into the [Google Cloud Platform console](https://console.cloud.google.com). 2. Search for **IAM** in the top navigation bar. Select **IAM & Admin** from the drop-down menu. 3. Click **Service accounts** in the left sidebar. 4. Click **+ Create service account** below the search bar. 5. Fill in account details, as shown below, making sure that: * **Furnish a new private key** is checked * A **Key type** of **JSON** is selected 6. **Enable Google Apps Domain-wide Delegation** is unchecked 7. Select a role of Viewer from the Role drop-down menu. This grants your service account the permission to access all the contents of objects in the specified GCS project, not just a particular bucket. 8. Click **Create** to finish. Your browser will download a JSON file containing the credentials for this user. Keep this file safe. <div align="right"><a href="#top">top</a></div> ##[Step 4] Enter IAM user credentials On the CGC, enter your IAM credentials in the Credentials tab as found in the downloaded JSON from the previous step. <div align="right"><a href="#top">top</a></div> ##[Step 5] Authorize the IAM user to access your GCS bucket If you have not authorized the IAM user to access your GCS bucket, follow the directions below on the Google Cloud Platform console. 1. On the Google Cloud Platform console, use the drop-down menu to navigate to **Storage**. 2. Locate your bucket and click the three vertical dots to the far left of your bucket's name. 3. Click **Edit bucket permissions**. 4. Click **+ Add item**. 5. From the drop-down menu, select **User** and enter the service account client's email in the next box. This email is located in the JSON downloaded in the previous section. 6. From the drop-down menu, select **Reader** for Read Only (RO) access or **Writer** for Read-write (RW) access. 7. Click **Save**. 8. Select the three vertical dots to the far left of your bucket's name once more. 9. Click **Edit object default permissions**. 10. Click **+Add item**. 11. From the drop-down menu, select **User** and enter the service account client's email in the next box. 12. From the next drop-down menu, select **Reader**. 13. Click **Save**. <div align="right"><a href="#top">top</a></div> ##[Step 6] Provide GCS bucket details 1. On the CGC, enter your GCS bucket name. 2. Optionally define a new name for the volume created from this GCS bucket on the CGC. 3. Optionally enter a description for your volume. 4. Select access privileges: choose between** Read only (RO)** and **Read and Write (RW)**. 5. Optionally enter a prefix. Learn more about [prefixes](doc:volumes#prefix). 6.Click **Next** to confirm. <div align="right"><a href="#top">top</a></div> ##[Step 7] Review volume details In this tab, review the details for your volume and click **Confirm**. <div align="right"><a href="#top">top</a></div> ##Next step Congratulations! You've attached your volume to the CGC. You can make individual data objects within it available as "aliases" on the CGC. Aliases point to files stored on your cloud storage bucket and can be copied, executed, and organized like normal files on the CGC. We call this operation "importing". Learn more about working with [aliases](doc:aliases). <div align="right"><a href="#top">top</a></div>