mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-12-11 07:16:38 +00:00
Update S3 storage permissions (#12064)
This commit is contained in:
parent
d9cd484657
commit
49114cdad4
@ -26,11 +26,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### Python Requirements
|
### Python Requirements
|
||||||
|
|
||||||
|
|||||||
@ -33,11 +33,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### Python Requirements
|
### Python Requirements
|
||||||
|
|
||||||
|
|||||||
@ -52,11 +52,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
## Metadata Ingestion
|
## Metadata Ingestion
|
||||||
|
|
||||||
|
|||||||
@ -26,11 +26,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### Python Requirements
|
### Python Requirements
|
||||||
|
|
||||||
|
|||||||
@ -33,11 +33,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### Python Requirements
|
### Python Requirements
|
||||||
|
|
||||||
|
|||||||
@ -52,11 +52,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
## Metadata Ingestion
|
## Metadata Ingestion
|
||||||
|
|
||||||
|
|||||||
@ -14,11 +14,54 @@ For all the buckets that we want to ingest, we need to provide the following:
|
|||||||
- `s3:ListBucket`
|
- `s3:ListBucket`
|
||||||
- `s3:GetObject`
|
- `s3:GetObject`
|
||||||
- `s3:GetBucketLocation`
|
- `s3:GetBucketLocation`
|
||||||
|
- `s3:ListAllMyBuckets`
|
||||||
|
|
||||||
|
Note that the `Resources` should be all the buckets that you'd like to scan. A possible policy could be:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket",
|
||||||
|
"s3:GetBucketLocation",
|
||||||
|
"s3:ListAllMyBuckets"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
### CloudWatch Permissions
|
### CloudWatch Permissions
|
||||||
|
|
||||||
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
Which is used to fetch the total size in bytes for a bucket and the total number of files. It requires:
|
||||||
- `cloudwatch:GetMetricData`
|
- `cloudwatch:GetMetricData`
|
||||||
|
- `cloudwatch:ListMetrics`
|
||||||
|
|
||||||
|
The policy would look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Sid": "VisualEditor0",
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"cloudwatch:GetMetricData",
|
||||||
|
"cloudwatch:ListMetrics"
|
||||||
|
],
|
||||||
|
"Resource": "*"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
You can find further information on the Kafka connector in the [docs](https://docs.open-metadata.org/connectors/storage/s3).
|
You can find further information on the Kafka connector in the [docs](https://docs.open-metadata.org/connectors/storage/s3).
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user