Skip to content

Commit f82bd62

Browse files
committed
more images
1 parent f67f381 commit f82bd62

File tree

8 files changed

+72
-103
lines changed

8 files changed

+72
-103
lines changed

docs/_snippets/_S3_authentication_and_bucket.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -28,85 +28,85 @@ In this procedure, we'll be creating a service account user, not a login user.
2828

2929
2. In "users", select **Add users**
3030

31-
<Image size="md" img={s3_1} alt="AWS IAM Management Console - Adding a new user" border />
31+
<Image size="md" img={s3_1} alt="AWS IAM Management Console - Adding a new user" border force/>
3232

3333
3. Enter the user name and set the credential type to **Access key - Programmatic access** and select **Next: Permissions**
3434

35-
<Image size="md" img={s3_2} alt="Setting user name and access type for IAM user" border />
35+
<Image size="md" img={s3_2} alt="Setting user name and access type for IAM user" border force/>
3636

3737
4. Do not add the user to any group; select **Next: Tags**
3838

39-
<Image size="md" img={s3_3} alt="Skipping group assignment for IAM user" border />
39+
<Image size="md" img={s3_3} alt="Skipping group assignment for IAM user" border force/>
4040

4141
5. Unless you need to add any tags, select **Next: Review**
4242

43-
<Image size="md" img={s3_4} alt="Skipping tag assignment for IAM user" border />
43+
<Image size="md" img={s3_4} alt="Skipping tag assignment for IAM user" border force/>
4444

4545
6. Select **Create User**
4646

4747
:::note
4848
The warning message stating that the user has no permissions can be ignored; permissions will be granted on the bucket for the user in the next section
4949
:::
5050

51-
<Image size="md" img={s3_5} alt="Creating the IAM user with no permissions warning" border />
51+
<Image size="md" img={s3_5} alt="Creating the IAM user with no permissions warning" border force/>
5252

5353
7. The user is now created; click on **show** and copy the access and secret keys.
5454
:::note
5555
Save the keys somewhere else; this is the only time that the secret access key will be available.
5656
:::
5757

58-
<Image size="md" img={s3_6} alt="Viewing and copying the IAM user access keys" border />
58+
<Image size="md" img={s3_6} alt="Viewing and copying the IAM user access keys" border force/>
5959

6060
8. Click close, then find the user in the users screen.
6161

62-
<Image size="md" img={s3_7} alt="Finding the newly created IAM user in the users list" border />
62+
<Image size="md" img={s3_7} alt="Finding the newly created IAM user in the users list" border force/>
6363

6464
9. Copy the ARN (Amazon Resource Name) and save it for use when configuring the access policy for the bucket.
6565

66-
<Image size="md" img={s3_8} alt="Copying the ARN of the IAM user" border />
66+
<Image size="md" img={s3_8} alt="Copying the ARN of the IAM user" border force/>
6767

6868
### Create an S3 bucket {#create-an-s3-bucket}
6969
1. In the S3 bucket section, select **Create bucket**
7070

71-
<Image size="md" img={s3_9} alt="Starting the S3 bucket creation process" border />
71+
<Image size="md" img={s3_9} alt="Starting the S3 bucket creation process" border force/>
7272

7373
2. Enter a bucket name, leave other options default
7474
:::note
7575
The bucket name must be unique across AWS, not just the organization, or it will emit an error.
7676
:::
7777
3. Leave `Block all Public Access` enabled; public access is not needed.
7878

79-
<Image size="md" img={s3_a} alt="Configuring the S3 bucket settings with public access blocked" border />
79+
<Image size="md" img={s3_a} alt="Configuring the S3 bucket settings with public access blocked" border force/>
8080

8181
4. Select **Create Bucket** at the bottom of the page
8282

83-
<Image size="md" img={s3_b} alt="Finalizing S3 bucket creation" border />
83+
<Image size="md" img={s3_b} alt="Finalizing S3 bucket creation" border force/>
8484

8585
5. Select the link, copy the ARN, and save it for use when configuring the access policy for the bucket.
8686

8787
6. Once the bucket has been created, find the new S3 bucket in the S3 buckets list and select the link
8888

89-
<Image size="md" img={s3_c} alt="Finding the newly created S3 bucket in the buckets list" border />
89+
<Image size="md" img={s3_c} alt="Finding the newly created S3 bucket in the buckets list" border force/>
9090

9191
7. Select **Create folder**
9292

93-
<Image size="md" img={s3_d} alt="Creating a new folder in the S3 bucket" border />
93+
<Image size="md" img={s3_d} alt="Creating a new folder in the S3 bucket" border force/>
9494

9595
8. Enter a folder name that will be the target for the ClickHouse S3 disk and select **Create folder**
9696

97-
<Image size="md" img={s3_e} alt="Setting the folder name for ClickHouse S3 disk usage" border />
97+
<Image size="md" img={s3_e} alt="Setting the folder name for ClickHouse S3 disk usage" border force/>
9898

9999
9. The folder should now be visible on the bucket list
100100

101-
<Image size="md" img={s3_f} alt="Viewing the newly created folder in the S3 bucket" border />
101+
<Image size="md" img={s3_f} alt="Viewing the newly created folder in the S3 bucket" border force/>
102102

103103
10. Select the checkbox for the new folder and click on **Copy URL** Save the URL copied to be used in the ClickHouse storage configuration in the next section.
104104

105-
<Image size="md" img={s3_g} alt="Copying the S3 folder URL for ClickHouse configuration" border />
105+
<Image size="md" img={s3_g} alt="Copying the S3 folder URL for ClickHouse configuration" border force/>
106106

107107
11. Select the **Permissions** tab and click on the **Edit** button in the **Bucket Policy** section
108108

109-
<Image size="md" img={s3_h} alt="Accessing the S3 bucket policy configuration" border />
109+
<Image size="md" img={s3_h} alt="Accessing the S3 bucket policy configuration" border force/>
110110

111111
12. Add a bucket policy, example below:
112112
```json

0 commit comments

Comments
 (0)