The following step-by-step instructions describe how to configure IAM access permissions for Forager in your Google Cloud console so that you can use a Cloud Storage bucket to unload Forager data:
Create a custom role that has the permissions required to access the bucket and get objects.
- Sign in to the Google Cloud console as a project editor.
- From the home dashboard, select IAM & Admin » Roles.
- Select Create Role.
- Enter a Title and optional Description for the custom role.
- Select Add Permissions.
- Filter the list of permissions, and add the following from the list:
Required permissions
storage.buckets.getstorage.objects.createstorage.objects.deletestorage.objects.liststorage.multipartUploads.abortstorage.multipartUploads.createstorage.multipartUploads.liststorage.multipartUploads.listParts
- Select Add.
- Select Create.
- Sign in to the Google Cloud console as a project editor.
- From the home dashboard, select Cloud Storage » Buckets.
- Filter the list of buckets, and select the bucket that you specified when you created your storage integration.
- Select Permissions » View by principals, then select Grant access.
- Under Add principals, paste the name of the the below service account,
k9kb00000@awseucentral2-1-0c24.iam.gserviceaccount.com - Under Assign roles, select the custom IAM role that you created previously, then select Save.
Important
If your Google Cloud organization was created on or after May 3, 2024, Google Cloud enforces a domain restriction constraint in project organization policies. The default constraint lists your domain as the only allowed value. You will need to modify your Organization Policy to allow for external services to access your bucket.
Note
This step is required only if your GCS bucket is encrypted using a key stored in the Google Cloud Key Management Service (Cloud KMS).
- Sign in to the Google Cloud console as a project editor.
- From the home dashboard, search for and select Security » Key Management.
- Select the key ring that is assigned to your GCS bucket.
- Click SHOW INFO PANEL in the upper-right corner. The information panel for the key ring slides out.
- Click the ADD PRINCIPAL button.
- In the New principals field, search for the Forager service account name
k9kb00000@awseucentral2-1-0c24.iam.gserviceaccount.com. - From the Select a role dropdown, select the
Cloud KMS CrytoKey Encryptor/Decryptorrole. - Click the Save button. The service account name is added to the Cloud KMS CrytoKey Encryptor/Decryptor role dropdown in the information panel.
Once the bucket is set up, send the following details to Forager.ai:
gcs://<your-bucket-name>/<desired-path>
Our team will configure the data delivery to send data directly to your GCS bucket.
Read more about file paths here.
📩 For Support: Contact us at support@forager.ai.