Cloud settings for AWS #
Cross account IAM roles #
AWS cross account IAM role usage is more secure than using access keys, and is often the only allowed method to authenticate to data sources.
In Starburst Galaxy, you can use an AWS cross account IAM role to configure access to data in S3 and the metadata in Amazon Glue in your S3 catalogs. This means you can define a cross account IAM role once, and then use it in multiple catalogs.
Use the following steps to configure a cross account IAM role:
-
Configure a cross account IAM role in your AWS console, and take note of the ARN in the summary section. Alternatively request the ARN from your network administrator.
-
Navigate to the Account section of the left-side menu in Starburst Galaxy.
-
Expand the Cloud Settings menu, and select AWS.
-
In the Cross account IAM roles pane, click Configure IAM role.
-
Provide a Starburst Galaxy-internal name for the IAM role in the Cross account IAM role alias field. This value displays in the list of cross account IAM roles as well as in the selection dialog in the catalog configuration.
-
Input the ARN in the AWS IAM ARN field.
-
Click Validate cross account IAM role.
-
The new cross account IAM role is now configured in your account.
-
Click Close. Your new role is now listed in the Cross account IAM roles list.
SSH tunnels #
Securely connect to private data sources using an SSH tunnel through a bastion host.
Learn how to set up an SSH tunnel.
AWS PrivateLink #
Starburst Galaxy supports AWS PrivateLink for some catalogs. For a general overview of Starburst Galaxy’s support for AWS PrivateLink, see AWS PrivateLink.
Use the following steps in your AWS account to configure PrivateLink. Create the following in the AWS console:
Create a target group #
-
In the navigation menu, go to the EC2 Console.
-
In the navigation menu or in the search box at the top of the page, select Target Groups. Click Create target group.
-
In the Choose a target type section, choose IP addresses.
-
In the Target group name field, name your target group.
-
Enter the Protocol and Port of the catalog you are connecting.
-
For IP address type, choose the IPv4 option.
-
From the drop-down menu, select the VPC where your catalog is located.
-
Click Next.
-
In the IPv4 address field, enter the IP address of your catalog.
-
Click Include as pending below. In the Review targets section, your target group now appears as Pending.
-
Click Create target group.
Create a load balancer #
-
In the navigation menu, go to the EC2 Console.
-
In the navigation menu or in the search box at the top of the page, select Load Balancers. Click Create load balancer.
-
In the Load balancer types section, click Create under Network Load Balancer.
-
In the Load balancer name field, name your load balancer.
-
For Scheme, select Internal.
-
For IP address type, choose the IPv4 option.
-
From the drop-down menu in the Network mapping section, select the VPC where your AWS data source is located.
-
Select the same availability zone as the data source you are connecting.
-
In the Listeners and routing section, enter the Protocol and Port of the catalog you are connecting.
-
In the Default action drop-down menu, select the target group you just created.
-
Click Create load balancer.
Create an endpoint service #
-
In the navigation menu, go to the VPC Console.
-
In the VPC navigation menu or in the search box at the top of the page, select Endpoint services. Click Create endpoint service.
-
For Load balancer type, choose the Network option.
-
In the Available load balancers section, select the load balancer you just created.
-
For Supported IP address types, choose the IPv4 option.
-
Click Create.
As the final step, contact your Starburst account team to complete your PrivateLink configuration.
Is the information on this page helpful?
Yes
No
Is the information on this page helpful?
Yes
No