Skip to content

External Storage AWS

To attach an Amazon AWS S3 bucket to your Arcsecond account, we recommend to create a specific IAM user with a dedicated read-only policy. This tutorial shows the complete procedure to do so. At the end, you will have to provide the well-known AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY as well as the bucket name and the AWS region for Arcsecond to parse your data.

We will guide you through the creation of a read-only policy, then that of a new IAM user, attaching the policy to it.

Create a read-only S3 policy for your bucket

  1. To create a new IAM policy, login to your AWS console, and select the IAM service. You will end up in the IAM home page.

INFO

Arcsecond-specific information has been removed throughout the tutorial images.

Screenshot

  1. Open the Policies page by clicking the link on the left-hand sidebar.

Screenshot

  1. Click the "Create Policy" button on the upper-right to start the short workflow of creating a new policies.

Screenshot

  1. Choose the JSON tab.

Screenshot

  1. Copy the following code and paste it as-is the actual content with it, except for the string name-of-your-bucket to be replaced with your own S3 bucket name. Note that you must have the two lines in the Resources section for the access to work.
json
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": [
        "s3:List*",
        "s3:Get*"
      ],
      "Resource": [
        "arn:aws:s3:::name-of-your-bucket",
        "arn:aws:s3:::name-of-your-bucket/*"
      ]
    }
  ]
}

Screenshot

  1. Then click the "Next: Tags" button on the lower-right, to navigate to the Tags step.

Screenshot

  1. Optionally, give one or multiple tags to your policy (this has no effect nor impact on Arcsecond attachment). Then click the "Next: Review" button on the lower-right.

Screenshot

  1. Add a name and optionally a description to your policy. The click on the "Create Policy" button in the lower-right.

Screenshot

Your policy is now ready to be attached to a user.

Create a new IAM user

  1. If not already done, login to your AWS console, and select the IAM service. You will end up in the IAM home page

INFO

Arcsecond-specific information has been removed throughout the tutorial images.

Screenshot

WARNING

AWS recommends to use an IAM role instead of a user to give access to third-party services like Arcsecond. However, the Arcsecond storage backend works only with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. Hence, the need to stick to the current procedure.

  1. Open the Users page by clicking the link on the left-hand sidebar.

Screenshot

  1. Click the "Add users" button on the upper-right to start the short workflow of creating a new users. And give a name to your new user. We recommend to not enable the console access. It is not needed by Arcsecond.

Screenshot

  1. When asked to attach permissions to the user, click the "Attach policies directly" button.

Screenshot

  1. Search for the policy you created above, and select it.

Screenshot

  1. Scroll down and click the "Next" button on the lower-right.

Screenshot

  1. Review that everything is fine, and click the "Create user" button on the lower-right.

Screenshot

  1. Your user is created! Click on either "View User" in the green banner, or in the user itself in the updated list.

Screenshot

  1. Select the "Security credentials" tab.

Screenshot

  1. Scroll down to reveal the "Access Keys" section. Click the "Create access key" button in the middle.

Screenshot

  1. As explained above, Arcsecond recommends not using access keys for third-party. Yet, Arcsecond only works with such keys for now. Select the checkbox "I understand the above recommendation..."

Screenshot

  1. Your access keys are created! Make sure to store them somewhere safe, you won't be able to retrieve them from Arcsecond. The first value is the AWS_ACCESS_KEY_ID and the second is the AWS_SECRET_ACCESS_KEY.

DANGER

If you do not click the "Show" button to note the Secret key, and then leave that page, you won't be able to retrieve it from AWS. You will have to create new one from scratch.

Screenshot

Click "Done", and you're done! Now you can navigate to the Storages section of your Arcsecond settings, and attach your AWS storage.

MIT Licensed