{"_id":"5928923e32b10a0f0042aca4","category":{"_id":"5785191af3a10c0e009b75b0","version":"55faf11ba62ba1170021a9aa","__v":0,"project":"55faf11ba62ba1170021a9a7","sync":{"url":"","isSync":false},"reference":false,"createdAt":"2016-07-12T16:21:46.337Z","from_sync":false,"order":25,"slug":"connect-cloud-storage","title":"CONNECT CLOUD STORAGE"},"__v":0,"project":"55faf11ba62ba1170021a9a7","user":"5613e4f8fdd08f2b00437620","version":{"_id":"55faf11ba62ba1170021a9aa","project":"55faf11ba62ba1170021a9a7","__v":37,"createdAt":"2015-09-17T16:58:03.490Z","releaseDate":"2015-09-17T16:58:03.490Z","categories":["55faf11ca62ba1170021a9ab","55faf8f4d0e22017005b8272","55faf91aa62ba1170021a9b5","55faf929a8a7770d00c2c0bd","55faf932a8a7770d00c2c0bf","55faf94b17b9d00d00969f47","55faf958d0e22017005b8274","55faf95fa8a7770d00c2c0c0","55faf96917b9d00d00969f48","55faf970a8a7770d00c2c0c1","55faf98c825d5f19001fa3a6","55faf99aa62ba1170021a9b8","55faf99fa62ba1170021a9b9","55faf9aa17b9d00d00969f49","55faf9b6a8a7770d00c2c0c3","55faf9bda62ba1170021a9ba","5604570090ee490d00440551","5637e8b2fbe1c50d008cb078","5649bb624fa1460d00780add","5671974d1b6b730d008b4823","5671979d60c8e70d006c9760","568e8eef70ca1f0d0035808e","56d0a2081ecc471500f1795e","56d4a0adde40c70b00823ea3","56d96b03dd90610b00270849","56fbb83d8f21c817002af880","573c811bee2b3b2200422be1","576bc92afb62dd20001cda85","5771811e27a5c20e00030dcd","5785191af3a10c0e009b75b0","57bdf84d5d48411900cd8dc0","57ff5c5dc135231700aed806","5804caf792398f0f00e77521","58458b4fba4f1c0f009692bb","586d3c287c6b5b2300c05055","58ef66d88646742f009a0216","58f5d52d7891630f00fe4e77"],"is_deprecated":false,"is_hidden":false,"is_beta":true,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"parentDoc":null,"updates":[],"next":{"pages":[],"description":""},"createdAt":"2017-05-26T20:38:22.403Z","link_external":false,"link_url":"","githubsync":"","sync_unique":"","hidden":false,"api":{"settings":"","results":{"codes":[]},"auth":"required","params":[],"url":""},"isReference":false,"order":12,"body":"##Overview\n\nAttach a volume for use on the CGC's visual interface. Use this tutorial if your cloud storage provider is Amazon Web Services (AWS).\n\nOr, learn more if your cloud storage provider is [Google Cloud Storage (GCS)](doc:attach-a-google-cloud-storage-volume) \n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##Prerequisite\n\n* An [Amazon Web Services (AWS)](https://aws.amazon.com/) account\n* One or more buckets on this AWS account.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##Procedure\n\n1. Navigate to the Volumes dashboard.\n3. Click **+ Attach volume** and choose the cloud storage provider for your volume.\n3. Enter IAM user details.\n4.Provide bucket details.\n5 .Copy the generated policy to the policy box in the IAM permissions page.\n6. Configure additional options, including setting an endpoint.\n7. Review volume details and confirm to connect your volume.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 1] Access the Volumes Dashboard\n\n1. Click on the **Data** tab of the top navigation bar.\n2. Select **Volumes** from the drop-down menu.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 2] Choose a cloud storage provider\n\n1. On the Volumes Dashboard, click **+ Attach volume**.\n2. Select **Amazon Web Services** as your cloud storage provider.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n## [Step 3] Enter IAM user details\n\nTo attach your S3 bucket to the CGC, you must create an IAM user and register your S3 bucket as a volume. To acquire your IAM user Access Key ID and Secret Access Key, follow the directions below.\n\n1. Log into the [AWS Management Console](https://aws.amazon.com/console/).\n2. Search for and select **IAM**.\n3. Click **Users** from the left sidebar.\n4. Select **Add user**.\n5. Enter a valid username (e.g. sb-access)\n6.Select **Programmatic access**.\n7. Click **Next** to view the permissions settings for your new IAM user.\n8. Skip the permissions settings for now and click **Next**.\n9. On the user creation confirmation page, copy your credentials.\n10. On the CGC, enter your credentials in the **User** tab of the **Attach volume** dialog.\n11. Click **Next** to confirm.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 4] Provide S3 bucket details\n\n1. On the CGC, under the **Bucket** tab, enter your S3 bucket name.\n2. Optionally define a new name for the volume created from this S3 bucket on the CGC.\n3. Optionally enter a description for your volume.\n4. Select access privileges: choose between Read only (RO) and Read and Write (RW).\n5. Optionally enter a prefix. Learn more about [prefixes](doc:volumes#prefixes).\n6. Click **Next** to confirm.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 5] Copy the policy\n\nIn this step, copy the policy to set the permissions for your IAM user.\n\n1. Copy the policy from the CGC.\n2. On the AWS Management Console, search for and select IAM.\n3. Click **Users** from the left sidebar.\n4. Select your IAM user.\n5. Select **Attach existing policies directly**.\n6. Select **Create policy.**\n7. Select **Create your own policy**.\n8. Enter a policy name, such as **sb-access-policy**.\n9. Paste the generated policy into the IAM policy page.\n10. Click **Create Policy** to confirm.\n11. On the **Permissions** page, search for and select the custom policy you just created.\n12. Click **Next** to review user information and permissions settings.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 6] Configure additional options\n\nIn this tab, you have the option to configure the endpoint, server-side encryption, and AWS Canned ACL.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##[Step 7] Review volume details\n\nIn this tab, review the details for your volume and click **Confirm**.\n\n<div align=\"right\"><a href=\"#top\">top</a></div>\n\n##Next step\n\nCongratulations! You've attached your volume to the CGC. You can make individual data objects within it available as \"aliases\" on the CGC. Aliases point to files stored on your cloud storage bucket and can be copied, executed, and organized like normal files on the CGC. We call this operation \"importing\". Learn more about working with [aliases](doc:aliases).\n\n<div align=\"right\"><a href=\"#top\">top</a></div>","excerpt":"","slug":"attach-an-amazon-web-services-aws-volume","type":"basic","title":"Attach an Amazon Web Services (AWS) volume"}

Attach an Amazon Web Services (AWS) volume


##Overview Attach a volume for use on the CGC's visual interface. Use this tutorial if your cloud storage provider is Amazon Web Services (AWS). Or, learn more if your cloud storage provider is [Google Cloud Storage (GCS)](doc:attach-a-google-cloud-storage-volume) <div align="right"><a href="#top">top</a></div> ##Prerequisite * An [Amazon Web Services (AWS)](https://aws.amazon.com/) account * One or more buckets on this AWS account. <div align="right"><a href="#top">top</a></div> ##Procedure 1. Navigate to the Volumes dashboard. 3. Click **+ Attach volume** and choose the cloud storage provider for your volume. 3. Enter IAM user details. 4.Provide bucket details. 5 .Copy the generated policy to the policy box in the IAM permissions page. 6. Configure additional options, including setting an endpoint. 7. Review volume details and confirm to connect your volume. <div align="right"><a href="#top">top</a></div> ##[Step 1] Access the Volumes Dashboard 1. Click on the **Data** tab of the top navigation bar. 2. Select **Volumes** from the drop-down menu. <div align="right"><a href="#top">top</a></div> ##[Step 2] Choose a cloud storage provider 1. On the Volumes Dashboard, click **+ Attach volume**. 2. Select **Amazon Web Services** as your cloud storage provider. <div align="right"><a href="#top">top</a></div> ## [Step 3] Enter IAM user details To attach your S3 bucket to the CGC, you must create an IAM user and register your S3 bucket as a volume. To acquire your IAM user Access Key ID and Secret Access Key, follow the directions below. 1. Log into the [AWS Management Console](https://aws.amazon.com/console/). 2. Search for and select **IAM**. 3. Click **Users** from the left sidebar. 4. Select **Add user**. 5. Enter a valid username (e.g. sb-access) 6.Select **Programmatic access**. 7. Click **Next** to view the permissions settings for your new IAM user. 8. Skip the permissions settings for now and click **Next**. 9. On the user creation confirmation page, copy your credentials. 10. On the CGC, enter your credentials in the **User** tab of the **Attach volume** dialog. 11. Click **Next** to confirm. <div align="right"><a href="#top">top</a></div> ##[Step 4] Provide S3 bucket details 1. On the CGC, under the **Bucket** tab, enter your S3 bucket name. 2. Optionally define a new name for the volume created from this S3 bucket on the CGC. 3. Optionally enter a description for your volume. 4. Select access privileges: choose between Read only (RO) and Read and Write (RW). 5. Optionally enter a prefix. Learn more about [prefixes](doc:volumes#prefixes). 6. Click **Next** to confirm. <div align="right"><a href="#top">top</a></div> ##[Step 5] Copy the policy In this step, copy the policy to set the permissions for your IAM user. 1. Copy the policy from the CGC. 2. On the AWS Management Console, search for and select IAM. 3. Click **Users** from the left sidebar. 4. Select your IAM user. 5. Select **Attach existing policies directly**. 6. Select **Create policy.** 7. Select **Create your own policy**. 8. Enter a policy name, such as **sb-access-policy**. 9. Paste the generated policy into the IAM policy page. 10. Click **Create Policy** to confirm. 11. On the **Permissions** page, search for and select the custom policy you just created. 12. Click **Next** to review user information and permissions settings. <div align="right"><a href="#top">top</a></div> ##[Step 6] Configure additional options In this tab, you have the option to configure the endpoint, server-side encryption, and AWS Canned ACL. <div align="right"><a href="#top">top</a></div> ##[Step 7] Review volume details In this tab, review the details for your volume and click **Confirm**. <div align="right"><a href="#top">top</a></div> ##Next step Congratulations! You've attached your volume to the CGC. You can make individual data objects within it available as "aliases" on the CGC. Aliases point to files stored on your cloud storage bucket and can be copied, executed, and organized like normal files on the CGC. We call this operation "importing". Learn more about working with [aliases](doc:aliases). <div align="right"><a href="#top">top</a></div>