mirror of
				https://github.com/open-metadata/OpenMetadata.git
				synced 2025-10-31 02:29:03 +00:00 
			
		
		
		
	
		
			
				
	
	
	
		
			1.6 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	
			1.6 KiB
		
	
	
	
	
	
	
	
| title | description | slug | collate | 
|---|---|---|---|
| How to enable AWS RDS IAM Auth | Official Documentation | Learn how to securely connect OpenMetadata to AWS RDS using IAM authentication with correct environment variables and configuration best practices. | /deployment/rds-iam-auth | false | 
Aws resources on RDS IAM Auth
Requirements
- AWS RDS Cluster with IAM auth enabled
- User on DB Cluster with IAM enabled
- IAM policy with permission on RDS connect
- Role with IAM policy attached
- IAM role attached to an EC2 instance on which openmetadata is deployed or ServiceAccount/Kube2Iam role attached to pod.
How to enable ADS RDS IAM Auth on postgresql
Set the environment variables
  DB_USER_PASSWORD: "dummy"
  DB_PARAMS: "awsRegion=eu-west-1&allowPublicKeyRetrieval=true&sslmode=require&serverTimezone=UTC"
Either through helm (if deployed in kubernetes) or as env vars.
{% note %}
The DB_USER_PASSWORD is still required and cannot be empty. Set it to a random/dummy string.
{% /note %}
{% note %}
When using IAM authentication for AWS RDS, you must still provide a dummy value for the DB_PASSWORD environment variable. OpenMetadata automatically handles the IAM credentials internally. Ensure the following parameters are set for successful connection:
- DB_PARAMS=awsRegion=us-east-1&allowPublicKeyRetrieval=true&serverTimezone=UTC
- DB_USE_SSL=true
These settings ensure proper token generation and secure communication with the RDS instance.
{% /note %}
