Mount Amazon S3 Buckets with s3fs
There is no lack of third-party tools that allow you to access storage offered by the Amazon S3 service in one way or another. But in case you need to mount an Amazon S3 bucket as a local file system with read/write access, s3fs got you covered. Using this software, you can access an Amazon S3 bucket as if it were a regular directory on your local machine. To compile s3fs, you need to install a handful of dependencies first. On Debian and Ubuntu-based distros, this can be done by running the following command as root:
apt-get install build-essential libfuse-dev fuse-utils libcurl4-openssl-dev libxml2-dev mime-support
Grab then the latest release of s3fs from the project's website, unpack the downloaded archive, and switch to the resulting directory in the terminal. Run then the commands below to compile and install s3fs:
./configure --prefix=/usr make make install
The last command should be executed as root. Create a new file in a text editor, and enter your Amazon credentials as follows:
Save the file as .passwd-s3fs in your home directory, and change the file's permissions:
chmod 600 ~/.passwd-s3fs
Finally, mount the desired bucket (replace bucket with the actual bucket name):
/usr/bin/s3fs bucket /mnt
Alternatively, you can enable caching to reduce the amount of downloaded data:
/usr/bin/s3fs bucket /mnt -ouse_cache=/tmp
That's all there is to it. You can now access the contents of the specified bucket in the mnt directory.comments powered by Disqus
The bug was introduced back in 2009 and has been lurking around all this time.
The new release deprecates the sshd_config UsePrivilegeSeparation option.
Lives on as a community project
Five new systems join Dell XPS 13 Developer Edition that come with Ubuntu pre-installed.
The Skype Linux client now has almost the same capabilities that it enjoys on other platforms.
At CeBIT 2017, OpenStack Day will offer a wide range of lectures and discussions.
A major setback for the Linux desktop.
Improved support for GPU in virtualization.
News site for the openSUSE community falls victim to a Wordpress exploit.
The source code is available online.