Manage data credentials for AWS
A data credential for AWS in CelerData declares read and write permissions on an S3 bucket, which is used to store query profiles. A query profile is used to visualize the details of a query execution. The query profile helps you troubleshoot performance bottlenecks during the query's execution. Note that the bucket that you decide to use must reside in the AWS region in which you want to deploy CelerData clusters. If you do not have such a bucket, create one before you start your journey with CelerData.
CelerData automatically generates a data credential upon each successful cluster deployment on AWS. You can manage these data credentials for AWS, including creating, viewing, and deleting a data credential. You can also update policies attached to these data credentials.
To ensure a successful cluster deployment in your own VPC, you must have a data credential to select, or create one, during the deployment process.
Create a data credential
The instructions below show you how to create a data credential from the Cloud settings page in the CelerData Cloud BYOC console before you create a deployment. You can also create a data credential in a similar way as part of the workflow of creating a deployment. See Deployment on AWS.
NOTE
If you create a deployment without selecting an existing data credential, CelerData automatically creates a data credential based on your input during deployment and saves it for future use.
To create a data credential before deployment, follow these steps:
-
Sign in to the CelerData Cloud BYOC console.
-
In the left-side navigation pane, choose Cloud settings > AWS.
-
On the Data credentials tab of the AWS Cloud page, click Create data credential.
-
In the Create data credential dialog box, configure the following parameters and click Submit.
Parameter Required Description Data credential name Yes Enter the name of the data credential.
NOTE
The name must be unique within your CelerData cloud account.Bucket name Yes Enter the name of your bucket.
NOTE
When you create a cluster, you can only use a data credential that references a bucket located in the same region as the cluster.IAM policy information N/A The JSON policy document that you use to create a policy. The policy defines the permissions on your bucket. Instance profile ARN Yes Enter the instance profile ARN of the IAM role that you have created to grant CelerData permission to access your bucket. For Instance profile ARN, you need to follow the instructions provided in Create a service IAM role for EC2 to create a service IAM role in the AWS IAM console and copy the instance profile ARN of the service IAM role.
On the Data credentials tab of the AWS Cloud page, the data credential that you just created is shown.
When you create a cluster, you can select and reuse a data credential that you have already created. After you decide which data credential to use, you need to obtain the ARN of the data credential role and the name of the data credential bucket (for easy understanding, the IAM role and bucket referenced in the data credential are referred to as the data credential role and the data credential bucket) and create a deployment credential to which a policy that contains the data credential's ARN and the data credential bucket's name is attached. See Create a deployment credential and Create a cross-account IAM role.
View a data credential
Before you start a deployment, you can view all of the data credentials created within your CelerData cloud account and find the one that best suits your deployment requirements. Then, you can select that data credential during the deployment process.
To view a data credential, follow these steps:
-
Sign in to the CelerData Cloud BYOC console.
-
In the left-side navigation pane, choose Cloud settings > AWS.
-
On the Data credentials tab of the AWS Cloud page, click the data credential whose details you want to view.
-
On the right-side pane that appears, view the details about the data credential.
Delete a data credential
Data credentials cannot be edited after they are created. If a data credential has incorrect data or if you no longer need a data credential, you can follow these steps to delete it:
-
Sign in to the CelerData Cloud BYOC console.
-
In the left-side navigation pane, choose Cloud Settings > AWS.
-
On the Data credentials tab of the AWS Cloud page, click the data credential that you want to delete.
-
On the right-side pane that appears, click Delete.
-
In the dialog box that appears, enter Delete and click Delete.
NOTE
A data credential cannot be deleted if there are still CelerData clusters created based on it. Therefore, before you delete a data credential, make sure all CelerData clusters that are created by using the data credential are released.
Update policies for a data credential
You will need to update the policies (permissions) attached to an existing data credential when new features require additional permissions or access to new resources.
To update the policies in a data credential, follow these steps:
-
Sign in to the CelerData Cloud BYOC console.
-
In the left-side navigation pane, choose Cloud settings > AWS.
-
On the Data credentials tab of the AWS Cloud page, click the data credential which you want to update policies for. Usually, a data credential that needs policy updates is marked as Outdated.
-
On the right-side pane that appears, click Update.
-
In the dialog box that appears, you can compare the current policy and the one that required for the new features. Click the copy icon to copy the required policy, and save it to a location that you can access later.
-
In the dialog box, click the redirect link to your AWS IAM console, and update the policy with the one you save earlier.
-
Return to the CelerData Cloud BYOC console, and click I have updated in AWS in the dialog box. In the message that appears, click Confirm to confirm that you have updated the required policy in AWS.
Usage notes
When you are creating a deployment, you cannot edit an existing data credential that you select. If no existing data credentials can meet your deployment requirements, we recommend that you create a new data credential.