[M] AWS Athena
AWS setup
The KADA Athena extractor requires a User with the following IAM policy OR a User that can assume a role with equivalent IAM policy.
The Athena integration is currently in beta. Some changes may occur in the near future. Please check with the KADA team prior to using this.
The IAM policy for the KADA Athena extractor requires the following:
Permissions to execute queries against Athena
INFORMATION_SCHEMA
. In particular the following tables:information_schema.views
information_schema.tables
information_schema.columns
Executing queries in Athena requires an s3 bucket to temporary store results.
The IAM policy must also allow Read Write Listing access to objects to the bucket and the s3 Bucket policy will require the same permissions for the IAM User / Role.Permission to call the following Athena APIs
list_databases
list_table_metadata
list_query_executions
list_work_groups
batch_get_query_executions
start_query_execution
get_query_execution
The IAM policy will need permissions to access all Athena workgroups to be able to extract query logs data. Without access to the workgroups KADA can not track data usage.
To limit access to workgroups See Use IAM policies to control workgroup access - Amazon Athena
Athena reports usage at the workgroup. This means usage can not be attributed to the user that executed the query. In K Athena usage will be reported against each work group in the format “athena_workgroup_<name>”
Example Role Policy to allow Athena Access with least privileges for actions.
Note
This policy has access to ALL Athena workgroups, due to the
Resources: '*'
ATHENA RESULTS BUCKET NAME
needs to be changed to your bucket.
AWSTemplateFormatVersion: "2010-09-09"
Description: 'AWS IAM Role - Athena and Cloudtrail Access to KADA'
Resources:
KadaAthenaRole:
Type: "AWS::IAM::Role"
Properties:
RoleName: "KadaAthenaRole"
MaxSessionDuration: 43200
Path: "/"
KadaAthenaPolicy:
Type: 'AWS::IAM::Policy'
Properties:
PolicyName: root
PolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: Allow
Action:
- athena:BatchGetQueryExecution
- athena:GetQueryExecution
- athena:GetQueryResults
- athena:GetQueryResultsStream
- athena:ListQueryExecutions
- athena:StartQueryExecution
- athena:ListWorkGroups
- athena:ListDataCatalogs
- athena:ListDatabases
- athena:ListTableMetadata
Resource: '*'
- Effect: Allow
Action:
- s3:GetBucketLocation
- s3:GetObject
- s3:ListBucket
- s3:ListBucketMultipartUploads
- s3:ListMultipartUploadParts
- s3:AbortMultipartUpload
- s3:PutObject
- s3:PutBucketPublicAccessBlock
- s3:DeleteObject
Resource:
- arn:aws:s3:::[ATHENA RESULTS BUCKET NAME]
Roles:
- !Ref KadaAthenaRole
Running the extractor
Setup a python environment Python 3.8+
KADA Support will provide the extractor on request.
Run the extractor from the kada-athena-extractor
directory
To run you will need to the following inputs
Onboard the Athena Source in K. Note the host name used in onboarding
An AWS User access key and secret.
Optionally if assuming a role. ARN of a role to assume.
List of catalogs to extract from Athena. If not provided default is
AwsDataCatalog
pipenv run python kada-athena-extractor.py -k <aws user key> -s <aws user seccret> -hn <k host name for athena> -b <s3 temp results location for athena> -ro <optional role to assume if needed> -c <comma seperated list of catalogs to extract, default is just AwsDataCatalog>
Full Populated Example
pipenv run python kada-athena-extractor.py -k mykey -s mysecret -hn athena -b s3://kada-athena-temp-results -ro arn:aws:iam::xxxxx:role/myrole -c AwsDataCatalog,CustomCatalog