Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To create or modify RDS AWS SQL GI:

One time configuration of the AWS environment
Info

All actions should be from from the AWS console!

  1. Go to S3 service
    Create S3 bucket with name accelario_rds_bucket.

  2. Go to IAM service.

  3. Click the Roles from left menu and then click the Create role.

    • Under Select type of trusted entity, select the AWS service.

    • Under Choose a use case (that will use this role), select the RDS 

    • In Use cases for other AWS services choose RDS - Add Role to Database

      Image Added
    • Click the Next: Permissions.

    • Click the Next: Tags.

    • Click the Next: Review.

    • Enter the Role name.

    • Click the Create role. The Role is created successfully. You will be navigated to create role page with newly created role.

  4. In the role list, click on the newly created role. Now, let’s add an inline policy to the role. This policy grants access to the S3 bucket.

    • Under Permissions tab, click the Create inline policy.

    • Click the JSON tab

    • Copy the below policy and set ${s3_bucket_name} to the name of your bucket (e.g., accelario_rds_bucket). Note: The policy in the JSON can be changed as per your requirement.

Code Block
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "s3:ListBucket"
            ],
            "Resource": [
                "arn:aws:s3:::${accelario_rds_bucket}"
            ]
        },
        {
            "Effect": "Allow",
            "Action": [
                "s3:PutObject",
                "s3:GetObject",
                "s3:DeleteObject",
                "s3:PutObjectAcl"
            ],
            "Resource": [
                "arn:aws:s3:::${accelario_rds_bucket}/*"
            ]
        }
    ]
} 

  1. Click the Review Policy.

  2. Enter the Policy name.

  3. Click the Create policy.

  4. In the role summary, copy the Instance Profile ARNs.

e.g. arn:aws:iam::680471277400:role/Accelario_RDS_S3

  1. Assign created IAM role to RDS instance

    • Go to your RDS instance

    • Scroll down to Manage IAM Roles

      A screenshot of a computer

Description automatically generatedImage Added
    • Click “Add role” button and choose the role you created

  2. Create a user with permissions RDS_full_access, S3_full_access.
    Make sure, the user has access key and secret key

    image-20240715-102741.pngImage Added

  3. On the source server, create an empty directory, that will be used to store backups copied from S3

Configuration of a new GI
Info

All actions should be from from the Accelario application!

  1. Create GI.

...

Create or modify Test data environment.

...