Movatterモバイル変換


[0]ホーム

URL:


✨ As of November 2023, Arcion has become a part of Databricks.Learn more here
AWS Secrets Manager

Use AWS Secrets Manager with Arcion#

AWS Secrets Manager works as a key-value store for secrets like passwords, tokens, and various database connection credentials. AWS encrypts these secrets with the AWS Key Management Service (AWS-KMS).

This page discusses how Arcion works with AWS Secrets Manager and configurations for different authentication methods. You can choose what method Arcion uses to retrieve the necessary secrets for your replication pipelines.

Overview#

Arcion uses the concept ofnamespaces to allow different authentication methods with AWS Secrets Manager. Depending on the parameters you specify, you can choose how Arcion establishes an authenticated connection with AWS Secrets Manager and retrieves secrets.

Authentication methods#

Arcion supports the following three authentication methods:

Cross-account access using IAM role with IAM user access keys#

In this method, the IAM user you specify usestemporary credentials to access AWS Secrets Manager and fetches the secrets. You can also use this method for cross-account access. Cross-account access means allowing users in one account to access secrets in another account.

To use this method, specify the IAM user’s credentials in the following manner for a namespace:

namespaces:dbConnection:secret-key:IAM_USER_SECRET_ACCESS_KEYaccess-key:IAM_USER_ACCESS_KEY_IDrole-arn:IAM_ROLE_ARNsession-name:SESSION_NAMEregion:AWS_REGION

Replace the following:

Cross-account access using IAM role with default credentials#

In this method, you don’t need to specify the IAM user’s access keys explicitly in the secrets management configuration file. Rather, Arcion searches for the necessary credentials in these locations:

To use this method, specify the namespace in the following manner:

namespaces:dbConnection2:role-arn:IAM_ROLE_ARNsession-name:SESSION_NAMEregion:AWS_REGION

Replace the following:

Access with IAM user credentials#

In this method, the IAM user you specify has direct access to Secrets Manager and the secrets.

namespaces:metadataConnection:secret-key:IAM_USER_SECRET_ACCESS_KEYaccess-key:IAM_USER_ACCESS_KEY_IDregion:AWS_REGION

Replace the following:

Configure Secrets Manager details#

You can optionally choose to use a YAML configuration file that specifies details about the secrets and how to retrieve them. Without the the secrets management configuration file, Arcion looks for authentication credentials in some specfic locations. For more information, see theAWS Secrets Manager tab in Configure secrets management details.

The configuration file contains the following parameters:

type#

The secrets management service you’re using. For Amazon Secrets Manager, set this toAWS.

use-password-rotation#

{true|false}.

Enables or disables password rotation.

Default:false.

cache-refresh-max-retries#

The maximum number of cache retries Replicant performs to retrieve secrets from AWS Secrets Manager caching system.

Default:20.

namespaces#

Contains the following details:

Arcion considers the first part of the secret name a namespace. For example, consider the following two names and how Arcion interprets the corresponding namespaces in the secrets URI and the secrets management configuration file:

Secret nameNamespace
mysql_srcmysql_src
mysql_prod/connectionmysql_prod

For example:

namespaces:mysql_src:secret-key:wJalrXUtnFEMIaccess-key:AKIAIOSFODNN7EXAMPLEregion:us-east-1

To learn how to define namespace for different authentication methods to access Secrets Manager, seeAuthentication methods.


[8]ページ先頭

©2009-2026 Movatter.jp