mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-12-05 20:15:15 +00:00
Update S3 storage permissions (#12064)
This commit is contained in:
parent
d9cd484657
commit
49114cdad4
@ -26,11 +26,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### Python Requirements
|
||||
|
||||
|
||||
@ -33,11 +33,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### Python Requirements
|
||||
|
||||
|
||||
@ -52,11 +52,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
## Metadata Ingestion
|
||||
|
||||
|
||||
@ -26,11 +26,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### Python Requirements
|
||||
|
||||
|
||||
@ -33,11 +33,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### Python Requirements
|
||||
|
||||
|
||||
@ -52,11 +52,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
## Metadata Ingestion
|
||||
|
||||
|
||||
@ -14,11 +14,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
||||
- `s3:ListBucket`
|
||||
- `s3:GetObject`
|
||||
- `s3:GetBucketLocation`
|
||||
- `s3:ListAllMyBuckets`
|
||||
|
||||
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"s3:GetObject",
|
||||
"s3:ListBucket",
|
||||
"s3:GetBucketLocation",
|
||||
"s3:ListAllMyBuckets"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:s3:::*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### CloudWatch Permissions
|
||||
|
||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||
- `cloudwatch:GetMetricData`
|
||||
- `cloudwatch:ListMetrics`
|
||||
|
||||
The policy would look like:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Sid": "VisualEditor0",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"cloudwatch:GetMetricData",
|
||||
"cloudwatch:ListMetrics"
|
||||
],
|
||||
"Resource": "*"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
You can find further information on the Kafka connector in the [docs](https://docs.open-metadata.org/connectors/storage/s3).
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user