AWS S3 Bucket access share
Last updated
Last updated
Assetario requires access to data to tune the predictions for your product and have the best performance. One method of sharing your data is to create and share an AWS S3 Bucket with us. The process includes the following steps:
Create bucket
Create a user
Grant the user access to the bucket by creating an inline policy
Make sure you have an AWS account and are able to log in to it. Log into AWS Management Console using your high level account, and use the S3 service to create a new bucket. The bucket name has to be unique across all AWS S3 instances:
Pick a Region for the bucket. Leave Block all public access on:
Select the bucket and click Copy ARN then paste to Notepad (The ARN is the Amazon Resource Name. It’s the full formal name for the bucket):
In this example, the ARN for assetario.unique.bucket.name is arn:aws:s3:::assetario.unique.bucket.name
.
Go back to the top-level, and select the IAM service (Identity and Access Management) to configure policies, groups, and users:
Navigate to Users in the left-hand menu, and click Add users in the top right corner.
Name the user, and grant Programmatic access.
A user can be added with or without AWS console access. Enabling console access will allow the third-party user to log into the console and see some limited information about the account, and explore the bucket. Console access should be enabled unless there is a clear reason not to:
Then click next until you create the user. Once the user is created, you get a confirmation screen:
At this point, you can download the .csv file, which contains the user credentials.
Click the newly created user in the Users section of IAM. Click Add inline policy on the right in the permissions section.
Select the S3 service. Check the List and Read checkboxes to add all List and Read permissions to the policy:
In the Resources section, click Add ARN in the bucket section. Add the bucket's ARN that you previously noted:
Click Add ARN in the object section to apply the permissions to all objects in the bucket. Paste the same bucket ARN as before, and add /*
at the end, so that the permissions apply to Any object in that bucket:
Then click Review policy. Name the policy appropriately, and create it.
You should see the policy attached as Inline policy to the user.
Share the .csv
file with credentials that you downloaded previously with Assetario. Please also mention the ARN of the bucket, as it is not written in the credentials file.
The process is complete!