Setup Access Management for Dremio¶
This section outlines the steps to set up the Dremio connector in Privacera. Ensure that all prerequisites are met before proceeding.
Best Practice for enabling the connector
This connector will manage the access control policies for the Dremio. If there are existing policies in Dremio, then it they will be overwritten by the policies from Privacera. It is strongly recommended that to test managing few resources initially before enabling the connector for all resources. You could create a test space in Dremio and manage the access control policies for that space and after you are comfortable you can enable the connector for all spaces.
Create Instance of Dremio¶
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to navigate to the
/config
directory.Bash -
Create a new directory for the Dremio connector configuration.
Note
In the example below,
instance1
is the name of the connector instance. You can change this name to uniquely identify your installed connector configuration. The connector instance name should consist of only hyphens and alphanumeric characters.Bash -
Copy the sample connector configuration file to your custom directory:
Bash -
Run the following command to open the
.yml
file to be edited:Bash
Connection Details¶
- Specify the Dremio URL. For example,
http://xx.xxx.xxx.xx:9047/
. - Specify the Dremio JDBC URL. For example,
jdbc:dremio:direct=xx.xx.xxx.xx:31010
. - Specify the Dremio JDBC Username and password.
Replace the below example values with your actual values.
Managed Space and Source¶
This property is used to define comma-separated space and source names for which access control policies should be enforced.
Example: test_space1,test_space2,test_space_*
.
Warning
- Values are case-sensitive.
- Replace the below example value with your actual value.
It is recommended to first test the connector with a dedicated test space and source before enabling it for all spaces. This helps validate configuration and behavior in a controlled environment.
To enforce grants/revoke¶
This property is used to enable grants/revoke
YAML | |
---|---|
Apply the Configuration¶
After all the changes are done you can start the connector by running the following instructions:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.- Prev topic: Prerequisites
- Next topic: Advanced Configuration