Mount Amazon S3 Buckets with s3fs
There is no lack of third-party tools that allow you to access storage offered by the Amazon S3 service in one way or another. But in case you need to mount an Amazon S3 bucket as a local file system with read/write access, s3fs got you covered. Using this software, you can access an Amazon S3 bucket as if it were a regular directory on your local machine. To compile s3fs, you need to install a handful of dependencies first. On Debian and Ubuntu-based distros, this can be done by running the following command as root:
apt-get install build-essential libfuse-dev fuse-utils libcurl4-openssl-dev libxml2-dev mime-support
Grab then the latest release of s3fs from the project's website, unpack the downloaded archive, and switch to the resulting directory in the terminal. Run then the commands below to compile and install s3fs:
./configure --prefix=/usr make make install
The last command should be executed as root. Create a new file in a text editor, and enter your Amazon credentials as follows:
Save the file as .passwd-s3fs in your home directory, and change the file's permissions:
chmod 600 ~/.passwd-s3fs
Finally, mount the desired bucket (replace bucket with the actual bucket name):
/usr/bin/s3fs bucket /mnt
Alternatively, you can enable caching to reduce the amount of downloaded data:
/usr/bin/s3fs bucket /mnt -ouse_cache=/tmp
That's all there is to it. You can now access the contents of the specified bucket in the mnt directory.comments powered by Disqus
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.