LogoLogo
vBase.comvBase App
  • Welcome
    • Welcome to vBase
    • Unique Advantages
    • Core Concepts
      • How vBase Works
      • What is a Stamp?
      • Technical Overview
      • Why Blockchains?
    • Example Use Cases
  • Getting Started
    • Start your Journey
    • Stamping Best Practices
    • Python Quickstart
      • Cloud Notebooks
      • Local Installation
  • Web Tools
    • Stamp an Object
    • Verify an Object
  • Use Case How-Tos
    • Verified Investment Track Records
  • Python SDK
    • Samples
      • Creating a Dataset
      • Adding a Dataset Record
      • Adding a Dataset Record Asynchronously
      • Restoring Dataset Provenance
      • Stamp Interactive Brokers Portfolio
      • Stamp Alpaca Portfolio
    • Windows Setup Guide
    • Package vbase-py
    • Package vbase-py-tools
      • Setup
      • commit_s3_objects
      • verify_s3_objects
  • Other SDKs
    • COM Library Overview
    • Working in Excel
      • Via vBase Workbook
      • Via Excel VBA
    • COM API Reference
    • C#
    • TypeScript
  • Technical Reference
    • Command Line Interface
    • Windows Subsystem for Linux (WSL) Guide
    • GCE S3 Compatible Bucket Setup
    • Smart Contract Addresses
Powered by GitBook
On this page
  • 1. Introduction
  • 2. Setup Using the Google Cloud Console
  • 2.1. Set Up Google Cloud Storage (GCS)
  • 2.2. Configure IAM Permissions
  • 3. Setup Using the gcloud CLI
  • 3.1. Set Up Google Cloud Storage (GCS)
  • 3.2. Grant Access to the Bucket:
  • 4. Provide API Keys to vBase
  • 5. (Optional) Automate Provisioning
  1. Technical Reference

GCE S3 Compatible Bucket Setup

PreviousWindows Subsystem for Linux (WSL) GuideNextSmart Contract Addresses

Last updated 3 months ago

1. Introduction

vBase provides a variety of managed services compatible with AWS Simple Storage Service (S3):

  • Automated commitment of buckets and objects for data producers (provers)

  • Automated validation of buckets and objects for data consumers (verifiers)

  • Derived data and dashboards with verified calculation and cryptographically assured provenance

Users of Google Cloud Storage (GCS) can use the following guide to set up GCE datasets to be shared in an S3-compatible manner, enabling read access by vBase managed services.

2. Setup Using the Google Cloud Console

Below are the instructions for users of the Google Cloud Console web interface:

2.1. Set Up Google Cloud Storage (GCS)

2.1.1. Create a GCS Bucket:

  • Go to the .

  • Navigate to Storage > Create Bucket.

  • Choose a globally unique name for the bucket.

  • Set appropriate permissions and lifecycle rules for your data.

2.1.2. Enable Interoperability with S3:

  • Navigate to Storage > Settings.

  • Enable Interoperable Storage Access.

  • Create an Access Key and Secret Key for interoperability.

2.2. Configure IAM Permissions

2.2.1. Define IAM Roles:

  • Assign role Storage Object Viewer to grant the necessary permissions to vBase.

  • Use Service Accounts to grant programmatic access.

2.2.2. Create IAM Policies:

  • Define bucket policies to restrict or allow access based on conditions like user roles or geographic IP ranges.

3. Setup Using the gcloud CLI

Below are the instructions for users of the Google Cloud CLI:

3.1. Set Up Google Cloud Storage (GCS)

3.1.1. Install and Authenticate the gcloud CLI:

  • Authenticate to Google Cloud:

    gcloud auth login

3.1.2. Create a GCS Bucket:

  • Use the gcloud CLI to create a bucket:

    gcloud storage buckets create BUCKET_NAME --location=LOCATION
  • Replace BUCKET_NAME with a unique name and LOCATION with your preferred location (e.g., us-central1).

3.1.3. Enable Interoperability with S3:

  • Enable the Interoperability API:

    gcloud storage buckets update BUCKET_NAME --uniform-bucket-level-access
  • Generate an access key and secret key:

    gcloud storage interoperability access-keys create
  • Note the Access Key and Secret Key for later use.

3.2. Grant Access to the Bucket:

To create an IAM policy for vBase to access the bucket using the API key only, you can utilize service accounts and key-based authentication instead of binding the policy to a specific user's email.

3.2.1. Create a Service Account for vBase:

gcloud iam service-accounts create vbase-access \
    --description="Service account for vBase bucket access" \
    --display-name="vBase Access"

3.2.2. Grant the Service Account Access to the Bucket:

  • Replace BUCKET_NAME with your bucket's name:

gcloud storage buckets add-iam-policy-binding BUCKET_NAME \
    --member="serviceAccount:vbase-access@PROJECT_ID.iam.gserviceaccount.com" \
    --role="roles/storage.objectViewer"
  • Replace PROJECT_ID with your Google Cloud project ID.

3.2.3. Generate an API Key for the Service Account:

gcloud iam service-accounts keys create vbase-key.json \
    --iam-account=vbase-access@PROJECT_ID.iam.gserviceaccount.com

This creates a JSON file (vbase-key.json) containing the API key and credentials. Share this file securely with vBase.

4. Provide API Keys to vBase

Share the access key and secret key securely with vBase using a vault system or by encrypting and sending them.

5. (Optional) Automate Provisioning

Use Terraform or Cloud Deployment Manager to automate bucket and IAM setup.

Install the gcloud CLI tool from the .

Google Cloud Console
Google Cloud SDK