Overview
Amazon Simple Storage Service (S3) is a cloud object storage service for storing and retrieving any amount of data. Once connected, Workshop can help you explore buckets, list objects, and work with your S3 data through natural conversation.What You’ll Need
| Credential | Description | Example |
|---|---|---|
| Access Key ID | AWS access key identifier | AKIAIOSFODNN7EXAMPLE |
| Secret Access Key | AWS secret access key | wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY |
| Default Region | AWS region for your buckets | us-east-1 |
Creating AWS Credentials
Open the IAM Console
Log in to the AWS Management Console and navigate to IAM (Identity and Access Management).
Create or select a user
Go to Users in the sidebar. Either select an existing user or click Create user to create one specifically for Workshop.
Set permissions
Attach the AmazonS3ReadOnlyAccess managed policy for read-only access. For access to specific buckets only, create a custom IAM policy.
Create an access key
Select your user, go to the Security credentials tab, click Create access key, and select Application running outside AWS.
For security, create a dedicated IAM user for Workshop with only the permissions needed to access your S3 buckets. Avoid using root account credentials.
Connecting to Workshop
Enter details
Enter a Connection Name (e.g., “Production S3”), your Access Key ID, Secret Access Key, and Default Region.
Verifying Your Connection
Ask Workshop:Using Your Connection
Security Best Practices
- Least privilege: Use
AmazonS3ReadOnlyAccessfor read-only operations. For specific buckets, create a custom policy. - Dedicated users: Create a dedicated IAM user for Workshop. Never use root credentials.
- Key rotation: Rotate access keys regularly. Create a new key, update Workshop, then delete the old key.
- Never share keys: Don’t commit credentials to version control or share them publicly.
Troubleshooting
| Issue | Solution |
|---|---|
| Invalid access key | Verify the Access Key ID was copied correctly. Check it’s active in IAM (not deactivated). |
| Access denied | Verify the IAM user has S3 permissions. Check bucket policies. Ensure the correct region is specified. |
| Bucket not found | Verify the bucket name (case-sensitive). Ensure it exists in the specified region. |