Before Archil can read or write to your bucket, the bucket needs to grant Archil access. This is a one-time setup per bucket, regardless of how you use the disk afterwards (mount,Documentation Index
Fetch the complete documentation index at: https://docs.archil.com/llms.txt
Use this file to discover all available pages before exploring further.
disk exec, anything else).
The Archil console walks you through this when you create a disk in the UI. This page documents what the console is doing, for setting things up by hand or scripting it.
Amazon S3
Amazon S3 supports two ways to authorize Archil:- Bucket resource policy — recommended. Archil’s IAM role assumes access to your bucket via a resource policy you attach to the bucket. No long-lived credentials change hands.
- Static IAM credentials — paste an access key and secret key from an IAM user that has read/write access to the bucket. Simpler to set up, but you’re responsible for rotating the credentials.
Bucket resource policy
In the AWS S3 console, select your bucket, open the Permissions tab, and edit the Bucket policy. Add the following statement, substitutingYOUR-BUCKET-NAME and the disk’s YOUR-FILESYSTEM-ID (shown in the Archil console):
aws:userid condition scopes the grant to a single Archil filesystem, so if you create multiple disks against the same bucket each one carries its own grant.
The exact Principal ARN varies by Archil region — the Archil console displays the precise policy to paste, including the right principal for your region.
Static credentials
If you’d rather not edit the bucket policy, create an IAM user withs3:* permissions on the bucket and pass its access key ID and secret to Archil when you create the disk:
Google Cloud Storage
Google Cloud Storage authorizes Archil through static AWS-compatible HMAC credentials.- Open the Google Cloud Storage console.
- Click Settings, then Interoperability.
- Under Service account HMAC, click Create a key for another service account.
- Grant the Cloud Storage → Storage Object Admin role to the new service account.
- Record the Access key and Secret for the new service account HMAC key.
Cloudflare R2
Cloudflare R2 authorizes Archil through static AWS-compatible credentials.- Open the Cloudflare console.
- Browse to R2 and click Manage R2 API Tokens.
- Create a new token with Object Read & Write permissions.
- Record the Access Key ID, Secret Access Key, and the default endpoint (looks like
https://<account>.r2.cloudflarestorage.com).
Generic S3-compatible storage
Many providers expose S3-compatible APIs and work with Archil out of the box. To configure one:- Get the S3-compatible API endpoint from your provider.
- Create or obtain access credentials (Access Key ID and Secret Access Key) with read/write/list/delete permissions on the bucket.
- When creating your disk, select Generic S3 Compatible as the data source type and provide the endpoint plus credentials.
- MinIO
- DigitalOcean Spaces
- Wasabi
- Backblaze B2 (with S3-compatible API)
- And many others