Event Driven Access Management for Lake Formation Pull Mode¶
This document outlines the configuration of event-driven access management for the Lake Formation pull mode connector.
Event driven flow¶
sequenceDiagram
participant AWS Cloudtrail
participant AWS EventBridge
participant AWS Lambda
participant PrivaceraOpsServer
participant PrivaceraConnector
participant AWS LakeFormation
participant PrivaceraPlatform
AWS Cloudtrail ->> AWS EventBridge: Forward event
AWS EventBridge ->> AWS Lambda: Filter event by as per rules
AWS Lambda ->> PrivaceraOpsServer: Forward event after pre-processed
PrivaceraConnector ->> PrivaceraOpsServer: Pull event details
PrivaceraConnector ->> AWS LakeFormation: Fetch latest details (Tag/Polices/Resources) as per event
PrivaceraConnector ->> PrivaceraPlatform: Post changes of Polices/Tag/Resources
Prerequisites¶
Ensure that the following prerequisites are met before proceeding:
- The Privacera Ops Server is up and running.
- The On-Demand Sync feature is enabled for lakeformation pull mode.
- You have the necessary AWS permissions to deploy a Lambda function for receiving events from AWS EventBridge.
Configuration¶
Enable Event Bridge Client in Ops Bridge¶
- Edit the Ops Bridge configuration file:
Bash - At the bottom of the configuration file, add the following properties. These properties are required for AWS Lambda to connect to your environment where the connector is deployed: Example:
YAML
Notes
- Replace these sample values with the actual IDs from your AWS environment.
- If you have trouble locating values in AWS, contact Privacera Support."
Apply the Configuration¶
After making all changes, start the connector by performing following steps:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.Create AWS Lambda¶
-
Use the CloudFormation template generated by Privacera Mananger to create an AWS Lambda function. The template is located at:
~/privacera/privacera-manager/output/ops-bridge/
. -
To prevent overwrites in future Privacera Manager runs, copy the CloudFormation templates into a separate directory:
-
Before deployment, update the resource prefix in
ops-eventbridge-cloudformation-env.json
:Modify the file to set the required prefix:Bash Bash You can change
ParameterValue
to any custom string. -
By default, leave the Lambda execution role parameter empty:
-
Use the AWS CloudFormation CLI to deploy the Lambda function:
You can specify any name for the
--stack-name
parameter. -
After deployment, verify the Lambda function by checking the Environment Variables in the AWS Console:
- Navigate to the AWS Console.
- Go to AWS Lambda > Functions.
- Select the newly created Lambda function.
- Under the Configuration tab, go to Environment Variables.
- Ensure the following environment variables are present:
AWS_SECRET_REGION
IS_SELF_SIGNED
JWT_TOKEN
LOG_LEVEL
LOG_ONLY_MODE
OPS_BRIDGE_CONFIG_JSON
OPS_SERVER_URL
Validation¶
- Log in to Privacera Portal.
- Navigate to Access Management -> Resource Policies.
- Select the Privacera_LakeFormation repository.
- Ensure the refresh icon is visible.
- Click the refresh icon.
- Confirm that the event from AWS Lambda is reflected here.
Troubleshooting¶
To communicate with connectors, AWS Lambda requires the Subnet ID and Security Group ID. Follow the steps below to retrieve these values from the AWS Console.
Get the Subnet ID from the AWS console¶
- Navigate to the AWS console.
- Go to the EC2 dashboard.
- In the left pane, click on Instances under the Instances section.
- From the k9s, copy the private IP address of the ops-server.
- Apply the Private IP address filter in the Instances list to find the specific instance.
- Click on the Instance ID to view the instance details.
- Under the Networking tab, find and copy the Subnet ID.
Get the Security Group ID from the AWS console¶
- Navigate to the AWS console.
- Go to the EC2 dashboard.
- In the left pane, click on Security Groups under the Network & Security section.
- Identify the appropriate Security Group ID associated with your instance.
- Copy the Security Group ID for reference.
- Prev topic: Advanced Configuration