Configure AWS access credentials
NineData supports access key of the AWS account to create the terminal node of the private network connection for NineData, query some necessary information of the private network connection, EC2, RDS and other products, and establish the connection between the NineData server and the database. Peer-to-peer network connection.
Permission description
To leverage this menthod, user's AWS access credentials need to have the following permissions (presented in the form of JSON permission scripts).
{
"Version":"2012-10-17",
"Statement":[
{
"Effect":"Allow",
"Action":[
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CreateSecurityGroup",
"ec2:CreateVpcEndpoint",
"ec2:CreateSubnet",
"ec2:DescribeInstances",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeVpcEndpointServices",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSecurityGroupRules",
"ec2:ModifyVpcEndpointServicePermissions",
"rds:DescribeDBInstances"
],
"Resource":"*"
}
]
}
For a sub-account, please contact the administrator to authorize the sub-account according to the content of this article.
Step 1: Create a custom policy
Log in to the AWS IAM Console, click Access management > Policies in the left navigation bar.
Click Create Policy in the upper right corner of the page to enter the Create Policy page.
Click the JSON tab, copy the permission script in the Permission Description of this article, paste it into the text box below JSON, and click Next: Tags.
Click Next: Review, and enter the policy name on the Review Policy page.
tipThe policy name supports 1 to 128 characters, which can contain English letters, numbers and special characters (‘+=,.@-_’).
Click Create Policy.
Step 2: Add AccessKey
Log in to the AWS IAM console, click Access management > Users in the left navigation bar, in the user list Find an authorized user and click on their username.
tipThe authorized user must belong to the AccessKey to be added.
On the user details page, click Add permissions under the Permissions tab.
Click Attach existing policies directly option, and find the custom policy created in Step 1 in the policy list below, click to select the policy, and click Next: Review.
tipEnter a policy name in the search box for fuzzy search.
Click Add Permissions to complete the authorization.
Click the user name in the upper right corner of the console, click Security credentials in the pop-up drop-down window, or click [here](https://console.aws.amazon.com/iam/ home#/security_credentials) to enter the My security credentials page to obtain Access key ID and Secret access key. For more information, see Managing access keys for IAM users.
Log in to NineData Console, click Datasource > Access Credentials on the left console, and click Create Credentials in the upper right corner, configure according to the table below, and click Create Credential.
Parameter Description Name Enter a credential name. To facilitate subsequent search and management, please try to use meaningful names. Cloud Vendor Click AWS. Type Select AccessKey . Access Key Enter the obtained Access key ID. Access Key Secret Enter the obtained Secret access key.