{"_id":"5b0e13ffc4664e0003c75aff","category":{"_id":"5b0e13ffc4664e0003c75aa6","version":"5b0e13ffc4664e0003c75a67","__v":0,"project":"5b0e13ffc4664e0003c75a66","sync":{"url":"","isSync":false},"reference":false,"createdAt":"2016-07-12T16:21:46.337Z","from_sync":false,"order":30,"slug":"connect-cloud-storage","title":"CONNECT CLOUD STORAGE"},"__v":0,"project":"5b0e13ffc4664e0003c75a66","user":"5613e4f8fdd08f2b00437620","version":{"_id":"5b0e13ffc4664e0003c75a67","project":"5b0e13ffc4664e0003c75a66","__v":4,"createdAt":"2015-09-17T16:58:03.490Z","releaseDate":"2015-09-17T16:58:03.490Z","categories":["5b0e13ffc4664e0003c75a68","5b0e13ffc4664e0003c75a69","5b0e13ffc4664e0003c75a6a","5b0e13ffc4664e0003c75a6b","5b0e13ffc4664e0003c75a6c","5b0e13ffc4664e0003c75a6d","5b0e13ffc4664e0003c75a6e","5b0e13ffc4664e0003c75a6f","5b0e13ffc4664e0003c75a70","5b0e13ffc4664e0003c75a71","5b0e13ffc4664e0003c75a72","5b0e13ffc4664e0003c75a73","5b0e13ffc4664e0003c75a74","5b0e13ffc4664e0003c75a75","5b0e13ffc4664e0003c75a76","5b0e13ffc4664e0003c75a77","5b0e13ffc4664e0003c75a89","5b0e13ffc4664e0003c75a8a","5b0e13ffc4664e0003c75a9d","5b0e13ffc4664e0003c75a9e","5b0e13ffc4664e0003c75a9f","5b0e13ffc4664e0003c75aa0","5b0e13ffc4664e0003c75aa1","5b0e13ffc4664e0003c75aa2","5b0e13ffc4664e0003c75aa3","5b0e13ffc4664e0003c75aa4","5b0e13ffc4664e0003c75aa5","5b0e13ffc4664e0003c75aa6","5b0e13ffc4664e0003c75aa7","5b0e13ffc4664e0003c75aa8","5b0e13ffc4664e0003c75aa9","5b0e13ffc4664e0003c75aaa","5b0e13ffc4664e0003c75aab","5b0e13ffc4664e0003c75aac","5b0e13ffc4664e0003c75aad","5b0e13ffc4664e0003c75aae","5b0e13ffc4664e0003c75aaf","5b0e13ffc4664e0003c75ab2","5bb3374f4306ad0003eb18e7","5bbf3c5373e72a000318362b","5bc065567d1cb0000384c649","5cbf19a5f9181f0033fbb968"],"is_deprecated":false,"is_hidden":false,"is_beta":true,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"parentDoc":null,"githubsync":"","metadata":{"title":"","description":"","image":[]},"updates":[],"next":{"pages":[],"description":""},"createdAt":"2017-05-26T20:38:22.403Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"settings":"","results":{"codes":[]},"auth":"required","params":[],"url":""},"isReference":false,"order":11,"body":"##Overview\n\nAttach a volume for use on the Platform visual interface. Use this tutorial if your cloud storage provider is Amazon Web Services (AWS).\n\nOr, learn more if your cloud storage provider is [Google Cloud Storage (GCS)](doc:attach-a-google-cloud-storage-volume) \n\n##Prerequisite\n\n* An [Amazon Web Services (AWS)](https://aws.amazon.com/) account\n* One or more buckets on this AWS account.\n\n##Procedure\n\n1. Navigate to the Volumes dashboard.\n3. Click **+ Attach volume** and choose the cloud storage provider for your volume.\n3. Enter IAM user details.\n4.Provide bucket details.\n5 .Copy the generated policy to the policy box in the IAM permissions page.\n6. Configure additional options, including setting an endpoint.\n7. Review volume details and confirm to connect your volume.\n\n##[Step 1] Access the Volumes Dashboard\n\n1. Click on the **Data** tab of the top navigation bar.\n2. Select **Volumes** from the drop-down menu.\n\n##[Step 2] Choose a cloud storage provider\n\n1. On the Volumes Dashboard, click **+ Attach volume**.\n2. Select **Amazon Web Services** as your cloud storage provider.\n\n## [Step 3] Enter IAM user details\n\nTo attach your S3 bucket to the Platform, you must create an IAM user and register your S3 bucket as a volume. Follow [AWS documentation](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html#id_users_create_console) to acquire your IAM user Access Key ID and Secret Access Key. On the user creation confirmation page, copy your credentials.\n\nThen, on the Platform, enter your credentials in the **User** tab of the **Attach volume** dialog. Click **Next** to confirm.\n[block:callout]\n{\n  \"type\": \"success\",\n  \"body\": \"*(Optional* You can also provide your [KMS ID](https://aws.amazon.com/documentation/kms/) if you opt to use KMS for your encryption.\"\n}\n[/block]\n \n##[Step 4] Provide S3 bucket details\n\n1. On the Platform, under the **Bucket** tab, enter your S3 bucket name.\n2. Optionally define a new name for the volume created from this S3 bucket on the Platform.\n3. Optionally enter a description for your volume.\n4. Select access privileges: choose between Read only (RO) and Read and Write (RW).\n5. Optionally enter a prefix. Learn more about [prefixes](doc:volumes#prefixes).\n6. Click **Next** to confirm.\n\n##[Step 5] Copy the policy\n\nIn this step, copy the policy to set the permissions for your IAM user.\n\n1. Copy the policy from the Platform.\n2. On the AWS Management Console, follow Amazon's [documentation for creating an IAM policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create.html.\n3. Paste the generated policy into the IAM policy page.\n4. Follow the directions to [embed the policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-attach-detach.html#embed-inline-policy-console).\n\n##[Step 6] Configure additional options\n\nIn this tab, you have the option to configure the endpoint, server-side encryption, and AWS Canned ACL.\n\n##[Step 7] Review volume details\n\nIn this tab, review the details for your volume and click **Confirm**.\n\n##Next step\n\nCongratulations! You've attached your volume to the Platform. You can make individual data objects within it available as \"aliases\" on the Platform. Aliases point to files stored on your cloud storage bucket and can be copied, executed, and organized like normal files on the Platform. We call this operation \"importing\". Learn more about working with [aliases](doc:aliases).","excerpt":"","slug":"attach-an-amazon-web-services-aws-volume","type":"basic","title":"Attach an Amazon Web Services (AWS) volume"}

Attach an Amazon Web Services (AWS) volume


##Overview Attach a volume for use on the Platform visual interface. Use this tutorial if your cloud storage provider is Amazon Web Services (AWS). Or, learn more if your cloud storage provider is [Google Cloud Storage (GCS)](doc:attach-a-google-cloud-storage-volume) ##Prerequisite * An [Amazon Web Services (AWS)](https://aws.amazon.com/) account * One or more buckets on this AWS account. ##Procedure 1. Navigate to the Volumes dashboard. 3. Click **+ Attach volume** and choose the cloud storage provider for your volume. 3. Enter IAM user details. 4.Provide bucket details. 5 .Copy the generated policy to the policy box in the IAM permissions page. 6. Configure additional options, including setting an endpoint. 7. Review volume details and confirm to connect your volume. ##[Step 1] Access the Volumes Dashboard 1. Click on the **Data** tab of the top navigation bar. 2. Select **Volumes** from the drop-down menu. ##[Step 2] Choose a cloud storage provider 1. On the Volumes Dashboard, click **+ Attach volume**. 2. Select **Amazon Web Services** as your cloud storage provider. ## [Step 3] Enter IAM user details To attach your S3 bucket to the Platform, you must create an IAM user and register your S3 bucket as a volume. Follow [AWS documentation](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html#id_users_create_console) to acquire your IAM user Access Key ID and Secret Access Key. On the user creation confirmation page, copy your credentials. Then, on the Platform, enter your credentials in the **User** tab of the **Attach volume** dialog. Click **Next** to confirm. [block:callout] { "type": "success", "body": "*(Optional* You can also provide your [KMS ID](https://aws.amazon.com/documentation/kms/) if you opt to use KMS for your encryption." } [/block] ##[Step 4] Provide S3 bucket details 1. On the Platform, under the **Bucket** tab, enter your S3 bucket name. 2. Optionally define a new name for the volume created from this S3 bucket on the Platform. 3. Optionally enter a description for your volume. 4. Select access privileges: choose between Read only (RO) and Read and Write (RW). 5. Optionally enter a prefix. Learn more about [prefixes](doc:volumes#prefixes). 6. Click **Next** to confirm. ##[Step 5] Copy the policy In this step, copy the policy to set the permissions for your IAM user. 1. Copy the policy from the Platform. 2. On the AWS Management Console, follow Amazon's [documentation for creating an IAM policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create.html. 3. Paste the generated policy into the IAM policy page. 4. Follow the directions to [embed the policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-attach-detach.html#embed-inline-policy-console). ##[Step 6] Configure additional options In this tab, you have the option to configure the endpoint, server-side encryption, and AWS Canned ACL. ##[Step 7] Review volume details In this tab, review the details for your volume and click **Confirm**. ##Next step Congratulations! You've attached your volume to the Platform. You can make individual data objects within it available as "aliases" on the Platform. Aliases point to files stored on your cloud storage bucket and can be copied, executed, and organized like normal files on the Platform. We call this operation "importing". Learn more about working with [aliases](doc:aliases).