Disclaimer : This documentation is provided solely as an example. It explains how to set up your Shotgun Private Cloud environment so that it can be connected to Shotgun Private Cloud infrastructure. Please adapt it to your studio security requirements as needed. As Shotgun has no visibility on your AWS Account, ensuring that this account is secure is a client responsibility.
The media segregation allows your users to access your media in your AWS S3 bucket privately (not transiting on the public internet).
Set up a VPC with private subnets in your S3 bucket AWS region
You will need to deploy a private VPC with the required VPC endpoints. We provide a private VPC CloudFormation template as a starting point. The template creates a VPC with 2 private subnets and the required VPC endpoints.
Set up access from your site network to your AWS VPC
Options provided by AWS:
Note : If Direct Connect is chosen, we recommend testing it with a simpler/faster solution first to validate the setup. You can then replace that solution with Direct Connect once the setup is complete.
Add an S3 endpoint to your VPC if you didn’t use the CloudFormation template.
Set up S3 proxy
You will need to deploy an S3 proxy in your VPC to proxy the traffic from your network into the S3 VPC endpoint. We provide an S3 proxy CloudFormatiom Template as a starting point. This will create an ECS Cluster and an ECS service to run the S3 proxy on AWS Fargate behind an AWS ALB.
Upload the Docker image to a private AWS Docker repositoty
Create an AWS ECR Repository named s3-proxy.
Upload the s3-proxy Docker image to your ECR repository.
- You will need to install Docker on your workstation then run the following commands.
- Do the docker login using instructions in your AWS Console View push commands button.
You will need to change the ECR repository URL to match yours.
docker pull quay.io/shotgun/s3-proxy:1.0.6 docker tag quay.io/shotgun/s3-proxy:1.0.6 627791357434.dkr.ecr.us-west-2.amazonaws.com/s3-proxy:1.0.6 docker push 627791357434.dkr.ecr.us-west-2.amazonaws.com/s3-proxy:1.0.6
Create CloudFormation stack
Create a new stack in AWS Console using the S3 proxy CloudFormatiom Template.
Shotgun only support https S3 proxy. You will need to configure https support on the AWS ALB.
- First add a DNS Entry in your domain to access the S3 proxy. ie: https://s3-proxy.mystudio.com.
- Get a SSL certificate for your url, we recommend using AWS Certificate Manager.
- Configure the HTTPS support on the S3 proxy by adding a new HTTPS listener on the AWS load balancer.
Test the S3 proxy
Try to access your S3 proxy using the ping route. ie: https://s3-proxy.mystudio.com/ping
Configure your test site to use your S3 proxy.
Go in your test site Preferences menu and set S3 Proxy Host Address to the S3 proxy url. ie: https://s3-proxy.mystudio.com. Check if you call still access and upload new media.