Configure AWS for Athena

<< Click to Display Table of Contents >>

Raynet One Data Hub > 14.0 u1 > Connectors > Alphabetic Connector List > Amazon Athena > Prerequisites 

Configure AWS for Athena

This section of the document provides basic information on how to configure an AWS account to enable the Raynet One Data Hub agent to authenticate against the account and inventory the data from Amazon Athena.

 

Identity and Access Management

The AWS Identity and Access Management (IAM) feature enables its users to manage access to AWS services and resources under the respective AWS user account. Furthermore, it allows users to set the interconnection between AWS accounts. IAM includes four major areas/components:

 

Users: AWS accounts

Groups: A collection of user accounts under one set of permissions

Roles: A role can be created and assigned to AWS resources

Policies: A document that defines one or more permissions

 

Use the Management Console to access the IAM login to the AWS account. After the login select IAM under the Security, Identity, & Complicance category of the AWS Service list.

 

AEC2_AWSAccess01

 

Once the IAM dashboard is loaded select the Users from the IAM resources.

 

AEC2_AWSAccess02

 

User Setup

Click on the Add users button on the IAM -> Users dashboard.

 

AEC2_AWSAccess03

 

Follow the steps as illustrated below to add a new user for the inventory.

 

1)

AEC2_AWSAccess04

 

2)

AEC2_AWSAccess05

 

3)

AEC2_AWSAccess06

 

4)

AEC2_AWSAccess07

 

5)

AEC2_AWSAccess08

 

 

Only allow programmatic access for the user.

Permission assignment will be done later.

Once the user is created, download the Access Key and the Secret Key as .csv file.

Store the .csv file in a secure location.

 

To add a new role, navigate back to the IAM console, select Roles, and click on the Create new button.

 

Attach the following managed policy to the role:

 

AmazonAthenaFullAccess

 

Edit the Trust Relationship to point to the parent user account.

 

Copy the Role ARN for the next step.

 

Assign User Account to the Role

At this step, assign the permission to use AssumeRole to the user account created in the first step. AssumeRole is an action available under the AWS Security Token service that returns a set of temporary security credentials that can be used to access the AWS resources. These temporary credentials consist of an access key ID, a secret access key, and a security token.

 

To assign the permission navigate back to IAM > Users. Select the user created in the previous step. Once selected click on the Add permissions button located in the Permissions tab. This will open the Grant permissions page.