Athena

Last modified on October 4, 2023

To add Athena as a datasource in the Admin UI, set the following configuration properties. For more information, see our main guide, Add a Datasource.

Configuration Properties

Add Athena Datasource Dialog
Add Athena Datasource Dialog
  • Display Name (Required): Enter a meaningful name for this resource, such as “athena.” This name displays throughout StrongDM. Do not include special characters like quotes (") or angle brackets (< or >).
  • Datasource Type (Required): Select Athena.
  • AWS Region (Required): Enter the AWS region where the database is being hosted (for example, us-east-1).
  • Bind Interface (Read only): Bind Interface is the IP address to which the port override of this resource is bound. The IP address value is automatically generated in the 127.0.0.1 to 127.255.255.254 IP address range after the resource is created. The default is 127.0.0.1. You can modify this value with your preferred bind interface value later under Settings > Port Overrides.
  • Port Override (Read only): After this datasource has been created, this field will be automatically filled with a port between 1024-59999 that is not in use by another datasource. You can optionally overwrite it with your own preferred port later in the Port Overrides settings.
  • Secret Store (Optional): This field lets you specify where the credentials for this resource are stored. The default Secret Store type is Strong Vault. Selecting any other Secret Store type causes properties unique to that Secret Store to appear, such as Username (path), Password (path), and so forth. For more detailed information about path to the secrets you have stored in a particular Secret Store, see the Secret Store integration configuration guide for the one you are using.
  • AWS Access Key ID (Required): This field is shown when Secret Store integration is not configured for your organization, or when it is and StrongDM is the selected Secret Store type. Enter the access key ID that is configured for the database (for example, AKIAIOSFODNN7EXAMPLE).
  • AWS Access Key ID (path) (Required): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not StrongDM, enter the path to the secret in your Secret Store (for example, path/to/credential?key=optionalKeyName). The key argument is optional.
  • AWS Secret Access Key (Required): This field is shown when Secret Store integration is not configured for your organization, or when it is and StrongDM is the selected Secret Store type. Enter the AWS secret access key associated with your AWS access key ID.
  • AWS Secret Access Key (path) (Required): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not StrongDM, enter the path to the secret in your Secret Store (for example, path/to/credential?key=optionalKeyName). The key argument is optional.
  • AWS S3 Output Location (Required): Enter the Amazon S3 output location (for example, s3://aws-athena-query-results-123456789012-us-east-1/MyInsertQuery/2021/10/04/abc1234d-5efg-67hi-jklm-89n0op12qr34).
  • Assume Role ARN (Optional): This field is shown when Secret Store integration is not configured for your organization, or when it is and StrongDM is the selected Secret Store type. Provide the role ARN (for example, arn:aws:iam::000000000000:role/RoleName) to allow users accessing this resource to assume a role using AWS AssumeRole functionality. The Assume Role ARN is required when the Elasticsearch master user to be used by this datasource is a Role ARN.
  • Assume Role ARN (path) (Optional): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not StrongDM, enter the path to the secret in your Secret Store (for example, path/to/credential?key=optionalKeyName). The key argument is optional.
  • Assume Role External ID (Optional): This field is shown when Secret Store integration is not configured for your organization, or when it is and StrongDM is the selected Secret Store type. Provide the external ID (for example, 12345) if leveraging an external ID to users assuming a role from another account. Note that this is optional, but if used, it must be used in conjunction with Assume Role ARN. See the AWS Documentation on using External IDs for more information.
  • Assume Role External ID (path) (Optional): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not StrongDM, enter the path to the secret in your Secret Store (for example, path/to/credential?key=optionalKeyName). The key argument is optional.
  • Resource Tags (Optional): Assign tags to the datasource by entering key-value pairs in the format <KEY>=<VALUE> (for example, env=dev, region=us-east-1, and so forth).