|
| 1 | +import Image from '@theme/IdealImage'; |
1 | 2 | import s3_1 from '@site/static/images/_snippets/s3/s3-1.png'; |
2 | 3 | import s3_2 from '@site/static/images/_snippets/s3/s3-2.png'; |
3 | 4 | import s3_3 from '@site/static/images/_snippets/s3/s3-3.png'; |
@@ -27,85 +28,85 @@ In this procedure, we'll be creating a service account user, not a login user. |
27 | 28 |
|
28 | 29 | 2. In "users", select **Add users** |
29 | 30 |
|
30 | | -<img src={s3_1} alt="create_iam_user_0"/> |
| 31 | +<Image size="md" img={s3_1} alt="AWS IAM Management Console - Adding a new user" border force/> |
31 | 32 |
|
32 | 33 | 3. Enter the user name and set the credential type to **Access key - Programmatic access** and select **Next: Permissions** |
33 | 34 |
|
34 | | -<img src={s3_2} alt="create_iam_user_1"/> |
| 35 | +<Image size="md" img={s3_2} alt="Setting user name and access type for IAM user" border force/> |
35 | 36 |
|
36 | 37 | 4. Do not add the user to any group; select **Next: Tags** |
37 | 38 |
|
38 | | -<img src={s3_3} alt="create_iam_user_2"/> |
| 39 | +<Image size="md" img={s3_3} alt="Skipping group assignment for IAM user" border force/> |
39 | 40 |
|
40 | 41 | 5. Unless you need to add any tags, select **Next: Review** |
41 | 42 |
|
42 | | -<img src={s3_4} alt="create_iam_user_3"/> |
| 43 | +<Image size="md" img={s3_4} alt="Skipping tag assignment for IAM user" border force/> |
43 | 44 |
|
44 | 45 | 6. Select **Create User** |
45 | 46 |
|
46 | 47 | :::note |
47 | 48 | The warning message stating that the user has no permissions can be ignored; permissions will be granted on the bucket for the user in the next section |
48 | 49 | ::: |
49 | 50 |
|
50 | | -<img src={s3_5} alt="create_iam_user_4"/> |
| 51 | +<Image size="md" img={s3_5} alt="Creating the IAM user with no permissions warning" border force/> |
51 | 52 |
|
52 | 53 | 7. The user is now created; click on **show** and copy the access and secret keys. |
53 | 54 | :::note |
54 | 55 | Save the keys somewhere else; this is the only time that the secret access key will be available. |
55 | 56 | ::: |
56 | 57 |
|
57 | | -<img src={s3_6} alt="create_iam_user_5"/> |
| 58 | +<Image size="md" img={s3_6} alt="Viewing and copying the IAM user access keys" border force/> |
58 | 59 |
|
59 | 60 | 8. Click close, then find the user in the users screen. |
60 | 61 |
|
61 | | -<img src={s3_7} alt="create_iam_user_6"/> |
| 62 | +<Image size="md" img={s3_7} alt="Finding the newly created IAM user in the users list" border force/> |
62 | 63 |
|
63 | 64 | 9. Copy the ARN (Amazon Resource Name) and save it for use when configuring the access policy for the bucket. |
64 | 65 |
|
65 | | -<img src={s3_8} alt="create_iam_user_7"/> |
| 66 | +<Image size="md" img={s3_8} alt="Copying the ARN of the IAM user" border force/> |
66 | 67 |
|
67 | 68 | ### Create an S3 bucket {#create-an-s3-bucket} |
68 | 69 | 1. In the S3 bucket section, select **Create bucket** |
69 | 70 |
|
70 | | -<img src={s3_9} alt="create_s3_bucket_0"/> |
| 71 | +<Image size="md" img={s3_9} alt="Starting the S3 bucket creation process" border force/> |
71 | 72 |
|
72 | 73 | 2. Enter a bucket name, leave other options default |
73 | 74 | :::note |
74 | 75 | The bucket name must be unique across AWS, not just the organization, or it will emit an error. |
75 | 76 | ::: |
76 | 77 | 3. Leave `Block all Public Access` enabled; public access is not needed. |
77 | 78 |
|
78 | | -<img src={s3_a} alt="create_s3_bucket_2"/> |
| 79 | +<Image size="md" img={s3_a} alt="Configuring the S3 bucket settings with public access blocked" border force/> |
79 | 80 |
|
80 | 81 | 4. Select **Create Bucket** at the bottom of the page |
81 | 82 |
|
82 | | -<img src={s3_b} alt="create_s3_bucket_3"/> |
| 83 | +<Image size="md" img={s3_b} alt="Finalizing S3 bucket creation" border force/> |
83 | 84 |
|
84 | 85 | 5. Select the link, copy the ARN, and save it for use when configuring the access policy for the bucket. |
85 | 86 |
|
86 | 87 | 6. Once the bucket has been created, find the new S3 bucket in the S3 buckets list and select the link |
87 | 88 |
|
88 | | -<img src={s3_c} alt="create_s3_bucket_4"/> |
| 89 | +<Image size="md" img={s3_c} alt="Finding the newly created S3 bucket in the buckets list" border force/> |
89 | 90 |
|
90 | 91 | 7. Select **Create folder** |
91 | 92 |
|
92 | | -<img src={s3_d} alt="create_s3_bucket_5"/> |
| 93 | +<Image size="md" img={s3_d} alt="Creating a new folder in the S3 bucket" border force/> |
93 | 94 |
|
94 | 95 | 8. Enter a folder name that will be the target for the ClickHouse S3 disk and select **Create folder** |
95 | 96 |
|
96 | | -<img src={s3_e} alt="create_s3_bucket_6"/> |
| 97 | +<Image size="md" img={s3_e} alt="Setting the folder name for ClickHouse S3 disk usage" border force/> |
97 | 98 |
|
98 | 99 | 9. The folder should now be visible on the bucket list |
99 | 100 |
|
100 | | -<img src={s3_f} alt="create_s3_bucket_7"/> |
| 101 | +<Image size="md" img={s3_f} alt="Viewing the newly created folder in the S3 bucket" border force/> |
101 | 102 |
|
102 | 103 | 10. Select the checkbox for the new folder and click on **Copy URL** Save the URL copied to be used in the ClickHouse storage configuration in the next section. |
103 | 104 |
|
104 | | -<img src={s3_g} alt="create_s3_bucket_8"/> |
| 105 | +<Image size="md" img={s3_g} alt="Copying the S3 folder URL for ClickHouse configuration" border force/> |
105 | 106 |
|
106 | 107 | 11. Select the **Permissions** tab and click on the **Edit** button in the **Bucket Policy** section |
107 | 108 |
|
108 | | -<img src={s3_h} alt="create_s3_bucket_9"/> |
| 109 | +<Image size="md" img={s3_h} alt="Accessing the S3 bucket policy configuration" border force/> |
109 | 110 |
|
110 | 111 | 12. Add a bucket policy, example below: |
111 | 112 | ```json |
|
0 commit comments