Athena

Last modified on August 10, 2022

To add Athena as a Datasource in the Admin UI, set the following configuration properties. For more information, see our main guide, Add a Datasource.

Configuration Properties

Add Athena Datasource Dialog
Add Athena Datasource Dialog
  • Display Name (Required): Enter a meaningful name for this resource, such as “athena.” This name displays throughout strongDM. Do not include special characters like quotes (") or angle brackets (< or >).
  • Datasource Type (Required): Select Athena.
  • AWS Region (Required): Enter the AWS region where the database is being hosted (e.g., us-east-1).
  • Port Override: After this Datasource has been created, this field will be automatically filled with a port between 1024-59999 that is not in use by another Datasource. You can optionally overwrite it with your own preferred port later in the Port Overrides settings.
  • Secret Store: This field lets you specify where the credentials for this Resource are stored (i.e., strongDM, AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, HashiCorp Vault, etc.). This field is only displayed if Secret Store integration is configured in the Admin UI. The default Secret Store type is strongDM. Selecting any other Secret Store type causes properties unique to that Secret Store to appear, such as Username (path), Password (path), and so forth. For more detailed information about path to the secrets you’ve stored in a particular Secret Store, see the Secret Store integration configuration guide for the one you are using.
  • AWS Access Key ID (Required): This field is shown when Secret Store integration is not configured for your organization, or when it is and strongDM is the selected Secret Store type. Enter the access key ID that is configured for the database (e.g., AKIAIOSFODNN7EXAMPLE).
  • AWS Access Key ID (path) (Required): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not strongDM, enter the path to the secret in your Secret Store (e.g., path/to/credential?key=optionalKeyName). The key argument is optional.
  • AWS Secret Access Key (Required): This field is shown when Secret Store integration is not configured for your organization, or when it is and strongDM is the selected Secret Store type. Enter the AWS secret access key associated with your AWS access key ID.
  • AWS Secret Access Key (path) (Required): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not strongDM, enter the path to the secret in your Secret Store (e.g., path/to/credential?key=optionalKeyName). The key argument is optional.
  • AWS S3 Output Location (Required): Enter the Amazon S3 output location (e.g., s3://aws-athena-query-results-123456789012-us-east-1/MyInsertQuery/2021/10/04/abc1234d-5efg-67hi-jklm-89n0op12qr34).
  • Assume Role ARN (Optional): This field is shown when Secret Store integration is not configured for your organization, or when it is and strongDM is the selected Secret Store type. Provide the role ARN (e.g., arn:aws:iam::000000000000:role/RoleName) to allow users accessing this resource to assume a role using AWS AssumeRole functionality. The Assume Role ARN is required when the Elasticsearch master user to be used by this Datasource is a Role ARN.
  • Assume Role ARN (path) (Optional): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not strongDM, enter the path to the secret in your Secret Store (e.g., path/to/credential?key=optionalKeyName). The key argument is optional.
  • Assume Role External ID (Optional): This field is shown when Secret Store integration is not configured for your organization, or when it is and strongDM is the selected Secret Store type. Provide the external ID (e.g., 12345) if leveraging an external ID to users assuming a role from another account. Note that this is optional, but if used, it must be used in conjunction with Assume Role ARN. See the AWS Documentation on using External IDs for more information.
  • Assume Role External ID (path) (Optional): If Secret Store integration is configured for your organization and you selected a Secret Store type that is not strongDM, enter the path to the secret in your Secret Store (e.g., path/to/credential?key=optionalKeyName). The key argument is optional.
  • Resource Tags (Optional): Assign tags to the Datasource by entering key-value pairs in the format <KEY>=<VALUE> (e.g., env=dev, region=us-east-1, etc.).

If any errors occur, please copy them into an email and send to support@strongdm.com.

Top