Setting Up Assume Role on Analytics Database - Teradata Vantage

Teradata® VantageCloud Lake

Deployment
VantageCloud
Edition
Lake
Product
Teradata Vantage
Published
January 2023
Language
English (United States)
Last Update
2024-04-03
dita:mapPath
phg1621910019905.ditamap
dita:ditavalPath
pny1626732985837.ditaval
dita:id
phg1621910019905
The following is required to complete these steps:
  • ARN obtained from creating the IAM on AWS
  • Vantage Site ID obtained from your Teradata account team.
  1. First, complete the steps in Setting Up Assume Role on AWS.
  2. On Analytics Database create an authorization object for access to the external object storage or ask your administrator to create it. For example:
    CREATE AUTHORIZATION AUTH_S3
    USING
    AUTHSERVICETYPE 'ASSUME_ROLE'
    ROLENAME 'arn:aws:iam::915556001112:role/teradata_role'
    EXTERNALID '915556001112';
    Where:
    • ROLENAME contains the ARN obtained from creating the IAM on AWS.
    • EXTERNALID is your Vantage Site ID.

    For more examples creating authorization objects, see CREATE AUTHORIZATION and REPLACE AUTHORIZATION Examples.

  3. Access the external object storage using READ_NOS, WRITE_NOS, or a foreign table. For example, the following query selects data from the S3 bucket using READ_NOS:
    SELECT * FROM (
      LOCATION = '/s3/sts-test.s3.amazonaws.com/csv_default.csv'
      AUTHORIZATION = S3_auth) as dt;