Advanced Configuration for AWS S3¶
Configure shared-secret¶
This step is required only for Spark OLAC.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following property:
Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure JWT¶
To configure JWT, refer to the JWT Auth Configuration section in the Databricks Clusters - FGAC connector.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following properties:
- Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure AWS S3 multiple account support¶
- SSH to the instance where Privacera Manager is installed.
- Open the
vars.dataserver.aws.yml
file in an editor:Bash - Modify the following properties:
- Once the properties are configured, refer to the Privacera Manager Quickstart.
To configure AWS S3 multiple account support in PrivaceraCloud, follow the Setup for AWS S3 steps for each account.
Managing AWS S3 Profiles After Privacera Manager Upgrade¶
- If you are upgrading Privacera Manager with a data server that has multiple AWS profiles, and the portal already contains an AWS S3 application, it will neither add nor modify the AWS S3 information with respect to profile support.
- To enable the portal to support multiple profiles following the Privacera Manager update, it is essential to first back up the application properties.
-
Please adhere to the following steps to back up the AWS S3 application properties:
- Access the Platform portal.
- Navigate to Settings and select Data Source Registration.
- Click the edit icon adjacent to the AWS S3 application.
- Select Application Properties.
- Click on Import/Export Properties, and then select Export Properties.
- After exporting, delete the application and restart the portal.
Enable Access Requester Pays buckets¶
In general, bucket owners pay for all Amazon S3 storage and data transfer costs that are associated with their bucket. However, you can configure a bucket to be a Requester Pays bucket. With Requester Pays buckets, the requester instead of the bucket owner pays the cost of the request and the data download from the bucket. The bucket owner always pays the cost of storing data.
- To enable access to Requester Pays buckets, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- Click the edit icon next to the
Account Name
, then go to Access Management -> ADVANCED tab. - Add the following property with the appropriate value for
<your_profile_name>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure AUTHN_METHOD¶
The AUTHN_METHOD
property determines which additional parameters are required for authentication. There are three different ways to configure the authentication method. To set it up, include the following property in the vars.dataserver.aws.yml
file:
- ACCESS KEY:
- If AUTHN_METHOD is set to
ACCESS_KEY
, bothACCESS_KEY
andSECRET_KEY
are mandatory and should be non-null values.
- If AUTHN_METHOD is set to
- CUSTOM IAM:
- If AUTHN_METHOD is set to
CUSTOM_IAM
,IAM_ARN
is mandatory and should be a non-null value.
- If AUTHN_METHOD is set to
- INSTANCE IAM:
- If AUTHN_METHOD is set to
INSTANCE_IAM
, no additional parameters are required.
- If AUTHN_METHOD is set to
- Once the properties are configured, refer to the Privacera Manager Quickstart.
There are two different ways to configure the authentication method in PrivaceraCloud. Follow the steps below:
-
ACCESS KEY and SECRET KEY:
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- Click the edit icon next to the
Account Name
, then go to Access Management -> BASIC tab. - Disable the Use IAM Role toggle button.
- In the AWS Access Key field, enter
your_access_key
. In the AWS Secret Key field, enteryour_secret_key
. - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
-
IAM ROLE:
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- Click the edit icon next to the
Account Name
, then go to Access Management -> BASIC tab. - Enable the Use IAM Role toggle button.
- In the AWS IAM Role field, enter
arn:aws:iam::<account_id>:role/<role_name>
. - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure S3 Encryption¶
- To enable Encryption for AWS S3 bucket, include the following property in the
vars.dataserver.aws.yml
file: - There are three parts to the
S3_ENCRYPTION_BUCKET_DATA
property:- S3_ENCRYPTION_BUCKET_NAME: Comma-separated list of S3 bucket names.
- S3_ENCRYPTION_SSETYPE: The type of server-side encryption to use for the S3 bucket. The supported values are
SSE-C
,SSE-KMS
, andSSE-S3
. - S3_ENCRYPTION_SSEKEY: The server-side encryption key to use for the S3 bucket. This is optional based on the
SSE_TYPE
value:- For SSE_TYPE
SSE-C
SSE_KEY is mandatory, for SSE_TYPESSE-KMS
SSE_KEY is optional and for SSE_TYPESSE-S3
there is no SSE_KEY.
- For SSE_TYPE
- To enable Encryption for Multiple S3 Buckets:
- Use the
S3_ENCRYPTION_BUCKET_DATA
property to specify encryption details for multiple S3 buckets. The format is as follows:YAML - For example:
YAML
- Use the
- Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- Click the edit icon next to the
Account Name
, then go to Access Management -> ADVANCED tab. - Add the following property with the appropriate value for
<your_profile_name>
,<your_s3_bucket_name>
,<sse_type>
, and<sse_key>
:Properties - S3_ENCRYPTION_BUCKET_NAME: Comma-separated list of S3 bucket names.
- S3_ENCRYPTION_SSETYPE: The type of server-side encryption to use for the S3 bucket. The supported values are
SSE-C
,SSE-KMS
, andSSE-S3
. - S3_ENCRYPTION_SSEKEY: The server-side encryption key to use for the S3 bucket. This is optional based on the
SSE_TYPE
value:- For SSE_TYPE
SSE-C
SSE_KEY is mandatory, for SSE_TYPESSE-KMS
SSE_KEY is optional and for SSE_TYPESSE-S3
there is no SSE_KEY.
- For SSE_TYPE
- Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure DBX OLAC service principal¶
The DATASERVER_DBX_OLAC_USE_DISPLAY_NAME
property is used to control how the Databricks OLAC service principal is displayed in audit logs. The property can be set to either true
or false
.
- When set to
true
(default), the name of the service principal will be displayed as the User in audits. - When set to
false
, the application ID of the service principal will be displayed as the User in audits.
- To configure the Databricks OLAC service principal, include the following property in the
vars.dataserver.aws.yml
file:YAML - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following property:
Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure Minio¶
- To configure Minio, include following properties in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following properties with the appropriate value for
<your_profile_name>
,<minio_host>
, and<minio_port>
: - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure AWS Region and Endpoint¶
The REGION
property specifies the AWS region for the S3 bucket. By default, the DataServer uses the default region for all buckets. To force the DataServer to use the default region for all buckets, set the USE_REGIONAL_ENDPOINT
property to true
.
- To configure the AWS region and endpoint, include the following properties in the
vars.dataserver.aws.yml
file with appropriate value foryour-s3-bucket-region
: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> BASIC tab.
- Add the AWS region for the S3 bucket in the AWS Region field.
- Click on ADVANCED tab and add the following property with the appropriate value for
<your_profile_name>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure AWS STS Token¶
- To configure the AWS STS token, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following property with the appropriate value for
<your_profile_name>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure User Information in AWS outgoing CloudWatch requests¶
- To add Privacera user info into AWS outgoing request for CloudWatch, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following property with the appropriate value for
<your_profile_name>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure RANGER_SERVICE_NAME_S3¶
It specifies the S3 Ranger policy repository name for S3 resource authorization. If this property is not configured, the DataServer will automatically use the privacera_s3
policy repository for S3 resource authorization.
- To configure the Ranger service name for S3, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following property with the appropriate value for
<your_profile_name>
and<s3_ranger_policy_repository_name>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure IAM Role External ID¶
- To set the External ID configured in the IAM role, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- Click the edit icon next to the
Account Name
, then go to Access Management -> BASIC tab. - In the AWS IAM Role External Id field, add
external_id_value
. - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Configure STS Role¶
- To set the AWS Security Token Service (STS) role, include the following property in the
vars.dataserver.aws.yml
file: - Once the properties are configured, refer to the Privacera Manager Quickstart.
- In PrivaceraCloud, navigate to Settings -> Applications.
- On the Connected Applications screen, select S3.
- On the screen, click the edit icon, click on Access Management -> ADVANCED tab.
- Add the following property with the appropriate value for
<your_profile_name>
,<account_id>
, and<your_STS_role>
:Properties - Click the Test Connection button to verify the connection.
- Once the connection is successful, click Save.
Add UserInfo in S3 Requests¶
This feature enables the logging of the privacera-username attempting to access S3 data via the Privacera Dataserver in the AWS CloudWatch logs.
You can find the privacera-username represented as a request parameter {privacera-user: callingUser} in the AWS CloudWatch Logs for the specific resource that the calling user is attempting to access.
To enable this feature, please follow these steps:
- Navigate to Settings > Applications > S3, and click the pencil icon to edit properties.
- Toggle the button for the service you wish to enable.
- In the ADVANCED tab, add the following custom property:
Properties - Click Save.
Create custom s3 service repo¶
For more information on using a custom s3 service repo please visit - Use Custom Service repo for S3
- Prev topic: Setup
- Next topic: Troubleshooting