Example bastion host on AWS #
An SSH tunnel through a bastion host allows you to connect Starburst Galaxy to a database that is not accessible directly from Starburst Galaxy, such as databases with no public access from outside the virtual private cloud (VPC).
The steps required to set up a bastion host for your specific environment vary based on your cloud provider and your organization’s needs, as described in bastion host options.
Configure server on AWS #
You can create a server on Amazon EC2 to serve as a bastion host using the following steps:
- Sign in to AWS and navigate to the EC2 Dashboard.
- Click Launch instance to go to the Launch an instance page.
- Provide a Name for your instance.
- Choose an Amazon Machine Image (AMI) from the available list and drop-down menu that is appropriate for your workload. The default Amazon Linux 2 option can be a good starting point.
- Choose an Instance type from the drop-down menu, again starting with a small instance.
- Choose an existing Key pair or create a new pair to securely connect to
your instance via SSH. If you create a new key pair, securely store the
.pemprivate key file locally, possibly as
- Click Edit to expand Network settings.
- If your AWS account has a VPC and Subnet that you want to use, select their names in the drop-down lists. If you don’t have a VPC or Subnet, create them and return to this step.
- Important! In the Auto-assign public IP drop-down menu, select Enable.
- Click to select Create security group, which is a named set of firewall rules.
- Provide a name and optional description for the security group.
- Add a security group rule to allow traffic between the bastion host and
Starburst Galaxy: Type
TCP, Port range
22, Source the IP range/CIDR for the region of your VPC from the appropriate table on Starburst Galaxy’s IP allowlist.
- Optional. Add a second security group rule to allow testing from your
site to the bastion host. Source
- Configure storage for your instance.
- Review the configuration settings, then click Launch instance.
Connect an RDS database #
With your EC2 instance successfully launched, AWS shows a number of tiles. Open the links in the following tiles into new browser tabs so that you can return to this tile page.
- Connect to your instance
Use this tile to verify that connectivity is open from your local machine through the public IP address of the bastion host. Follow the instructions in the SSH client tab.
- Connect RDS database
Connect an existing RDS database instance that is supported by Starburst Galaxy, or create a new RDS instance and connect it.
Make sure your RDS database’s configuration includes these settings:
- Public access: set to
- Existing VPC security groups: from the drop-down menu, select at least the security group that includes your bastion host.
- Availability zone: from the drop-down menu, select the same zone that contains your bastion host.
- Public access: set to
Generate RSA keys in Starburst Galaxy #
In Starburst Galaxy, generate an RSA public and private key pair to secure communication between Starburst Galaxy and your bastion host.
In the navigation menu, click Cloud settings > AWS.
Click Configure SSH Tunnel.
Click Generate RSA key.
Save the contents of the RSA key field to to a local file, possibly named
Leave Galaxy open to this pane.
Create service account on bastion host #
The following steps presume familiarity with issuing Linux commands at a Terminal prompt. These commands may vary depending on the Linux version of your server. You can instead use a Linux management app to perform the same steps.
Use SSH from your local machine to log in interactively to your bastion host. Follow the steps in the Connect to your instance tile described above. For example:
ssh -i ~/.ssh/bastionkey.pem ec2-user@bastionhostname
Or with IP address:
ssh -i ~/.ssh/bastionkey.pem ec2-user@bastion-public-ip-address
If prompted whether you want to continue connecting, type
Create a group with
sudo groupadd starburst
Create a user with
sudo useradd -m -g starburst starburst-galaxy
Become the new user
sudo su - starburst-galaxy
starburst-galaxyuser’s SSH directory with
Set user-only permissions on the directory with
chmod 700 ~/.ssh
Go into the new directory:
Create an empty
Set user-only permissions on the file:
chmod 600 ./authorized_keys
Use a text editor to open the empty
Paste the contents of the
generated-public.keyfile you saved in the previous section into the empty
Create SSH tunnel alias in Starburst Galaxy #
Return to Starburst Galaxy to test the connection and to create a tunnel alias for the bastion host.
- Return to the Cloud settings > AWS > SSH tunnel pane you left open at the end of Generate RSA keys in Starburst Galaxy.
- SSH tunnel alias: Add a name for the SSH tunnel. Starburst suggests using a descriptive name that includes the bastion host name and the connected catalog.
- SSH host: Add the public IP address or FQDN for the bastion host.
- SSH port: Leave the port at the default 22, unless you have configured SSH on the bastion host to use a different port.
- SSH user: Add the name of the service account on the bastion host to
which you gave the generated RSA key. Our example steps above used the name
- Click Validate and save to complete the configuration. Galaxy tests the connection. If valid, it saves this named SSH tunnel for future use.
Now when creating a catalog or editing one, specify the alias for an SSH tunnel to configure connecting through that SSH tunnel.
Is the information on this page helpful?