You can connect Logz.io to your AWS account using an IAM user, which authenticates with AWS access keys. This gives Logz.io the appropriate level of access while keeping your AWS account secure.

To grant access to an S3 bucket
  1. Create the user

    Browse to the IAM users and click Add user. You’re taken to the Add user wizard.

    Create an IAM role for another AWS account

    Assign a User name.

    Under Select AWS access type, select Programmatic access.

    Click Next: Permissions to continue.

  2. Create the policy

    In the Set permissions section, click Attach existing policies directly > Create policy. The Create policy page loads in a new tab.

    Create policy

    Set these permissions:

    • Service: Choose S3
    • Actions: Select List > ListBucket and Read > GetObject
    • Resources > bucket: Click Add ARN to open the Add ARN dialog. Type the intended Bucket name, and then click Add.
    • Resources > object: Click Add ARN to open the Add ARN(s) dialog. Add the intended Bucket name, then select Object name > Any. Click Add.

    Click Review policy to continue.

    Give the policy a Name and optional Description, and then click Create policy.

    Remember the policy’s name—you’ll need this in the next step.

    Close the tab to return to the Add user page.

  3. Attach the policy to the user

    Click (refresh), and then type your new policy’s name in the search box.

    Find your policy in the filtered list and select its check box.

    Click Next: Tags, and then click Next: Review to continue to the Review screen.

  4. Finalize the user

    Give the user a Name and optional Description, and then click Create user.

    You’re taken to a success page.

  5. Add the bucket to Logz.io

    Add the S3 bucket name and Prefix

    Copy the Access key ID and Secret access key, or click Download .csv.

    In Logz.io, paste the Access key and Secret key, and then click Save.