Setup for Lake Formation Pull Mode - Access Management¶
This section outlines the steps to set up AWS Lake Formation connector in pull mode. Ensure that all prerequisites are met before proceeding.
Create Instance of Lake Formation Pull Mode Connector¶
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to navigate to the
/config
directory.Bash -
Create a new directory for the AWS Lake Formation Pull Mode connector configuration.
Note
In the example below,
instance1
is the name of the connector instance. You can change this name to uniquely identify your installed connector configuration. The connector instance name should consist of only hyphens and alphanumeric characters.Bash -
Copy the sample connector configuration file to your custom directory:
Bash -
Run the following command to open the
.yml
file to be edited:Bash
-
In PrivaceraCloud, navigate to Settings -> Applications.
-
On the Applications screen, select Lakeformation Pull Mode.
-
Enter the application Name and Description. Click Save. Name could be any name of your choice. E.g.
AWS Lake Formation Connector for Pull Mode
. -
Open the AWS Lake Formation application.
-
Enable the Access Management option with toggle button.
Connection Details¶
Provide the AWS account ID, region, and IAM role where AWS Lake Formation is configured.
Warning
- Replace the below example value with your actual value.
- Under the BASIC tab, enter the values for:
- AWS Account ID :
123456789012
- AWS Assume IAM Role ARN :
Use the role ARN created for the AWS Lake Formation connector
- AWS Region :
us-west-2
- AWS Account ID :
Managed Databases¶
This property specifies a comma-separated list of database names for which access control policies will be applied. To manage all databases, do not specify this property. You can use wildcard characters (*) to match multiple databases.
Example: test_database1,test_database2,sales_*
.
Warning
- Values are case-sensitive.
- Replace the below example value with your actual value.
YAML | |
---|---|
- Under the BASIC tab, enter the values for:
- Database names to set access control policies :
test_database
- Database names to set access control policies :
Apply the Configuration¶
After all the changes are done you can start the connector by running the following instructions:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.-
Once all the required fields are filled, click SAVE.
-
The configured Lakeformation Pull Mode connector appears under Connected Applications.
-
Once saved and enabled, the Lakeformation Pull Mode connector will start. Then you can hover on the VIEW LOGS button to check the status, either Running or Stopped.
-
Perform the following steps to restart the Lakeformation Pull Mode connector application:
-
Navigate to Settings → Applications → select the Lakeformation Pull Mode connector application.
-
Edit the application by disabling the Access Management option with toggle button and then Save it.
-
Open the same application again and then enable the Access Management option with toggle button and then Save it.
-
Validation¶
To validate the Lake Formation Pull Mode connector setup, follow the steps below:
-
Verify the Roles in Privacera Portal
- Navigate to the Privacera Portal.
- Click on the Users/Groups/Roles under the Access Management section.
- Click on the Roles tab and verify that the roles for the AWS Lake Formation connector are created.
-
Verify the Resource Policies in AWS Lake Formation
- Navigate to the AWS Lake Formation console.
- In the left pane, click on Data permissions under the Permissions section.
- Click on Grant to assign permissions to roles.
- Under the Principals section, select IAM users and roles and choose one or more IAM users or roles.
- Under LF-Tags or catalog resources, select Named Data Catalog resources and update the following fields by selecting values from the dropdown:
- Catalogs
- Databases
- Tables
- Choose the appropriate Table Permissions to grant access.
- Click Grant to apply the permissions.
- Verify the resource policies in the Privacera Portal by navigating to the Access Management → Resource Policies.
- Verify the resource policy under the privacera_hive repository.
- Prev topic: Prerequisite
- Next topic: Advanced Configurations