Skip to content

Commit 45ae78f

Browse files
committed
Editing pass [DOC-467]
1 parent c41c96d commit 45ae78f

File tree

1 file changed

+29
-26
lines changed

1 file changed

+29
-26
lines changed
Lines changed: 29 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,74 +1,77 @@
11
---
22
title: AWS Lake Formation
33
---
4-
AWS Lake Formation is a fully managed service built on top of the AWS Glue Data Catalog that provides one central set of tools to securely build and manage a Data Lake. These tools help import, catalog, transform, and deduplicate data, as well as provide strategies to optimize your storage and security.
4+
5+
{% include content/plan-grid.md name="data-lakes" %}
6+
7+
AWS Lake Formation is a fully managed service built on top of the AWS Glue Data Catalog that provides one central set of tools to build and manage a Data Lake. These tools help import, catalog, transform, and deduplicate data, as well as provide strategies to optimize data storage and security.
58

69
> note "Learn more about AWS Lake Formation features"
7-
> To learn more about AWS Lake Formation features, refer to the [Amazon Web Services documentation](https://aws.amazon.com/lake-formation/features/).
10+
> To learn more about AWS Lake Formation features, refer to the [Amazon Web Services documentation](https://aws.amazon.com/lake-formation/features/){:target="_blank"}.
811
9-
The security policies in Lake Formation use two layers of permissions: each resource is protected by Lake Formation permissions (which control access to Data Catalog resources and S3 locations) and IAM permissions (which control access to Lake Formation and AWS Glue API resources). When any user or role reads or writes to a resource, that action must pass a both a Lake Formation and an IAM resource check: for example, a user trying to create a new table in the Data Catalog may have Lake Formation access to the Data Catalog, but if they don't have the correct IAM permissions, will be unable to create the table.
12+
The security policies in Lake Formation use two layers of permissions: each resource is protected by Lake Formation permissions (which control access to Data Catalog resources and S3 locations) and IAM permissions (which control access to Lake Formation and AWS Glue API resources). When any user or role reads or writes to a resource, that action must pass a both a Lake Formation and an IAM resource check: for example, a user trying to create a new table in the Data Catalog may have Lake Formation access to the Data Catalog, but if they don't have the correct Glue API permissions, they will be unable to create the table.
1013

11-
For more information about security practices in Lake Formation, see Amazon's [Lake Formation Permissions Reference](https://docs.aws.amazon.com/lake-formation/latest/dg/lf-permissions-reference.html) documentation.
14+
For more information about security practices in Lake Formation, see Amazon's [Lake Formation Permissions Reference](https://docs.aws.amazon.com/lake-formation/latest/dg/lf-permissions-reference.html){:target="_blank"} documentation.
1215

1316
## Configuring Lake Formation
1417
You can configure Lake Formation using the [`IAMAllowedPrincipals` group](#configuring-lake-formation-using-the-iamallowedprincipals-group) or by [using IAM policies for access control](#configuring-lake-formation-using-iam-policies). Configuring Lake Formation using the `IAMAllowedPrincipals` group is an easier method, recommended for those exploring Lake Formation. Setting up using IAM policies for access control is a more advanced setup option, recommended for those who want additional customization options.
1518

1619
> info "Permissions required to configure Data Lakes"
1720
> To configure Lake Formation, you must be logged in to AWS with data lake administrator or database creator permissions.
1821
19-
### Configuring Lake Formation using the IAMAllowedPrincipals group
22+
### Configure Lake Formation using the IAMAllowedPrincipals group
2023

2124
#### Existing databases
22-
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/).
25+
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/){:target="_blank"}.
2326
2. Under **Data catalog**, select the **Settings** tab. Ensure the checkboxes under the **Default permissions for newly created databases and tables** are not checked.
24-
3. Under **Permissions**, select the **Data lake permissions** section. Select the **Grant** button.
27+
3. Under **Permissions**, select the **Data lake permissions** section. Click **Grant**.
2528
4. On the **Grant data permissions** page, select the `IAMAllowedPrincipals` group in the Principals section.
26-
5. Under the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
27-
6. Select the **Grant** button.
29+
5. In the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
30+
6. Click **Grant**.
2831
7. On the **Permissions** page, verify the `IAMAllowedPrincipals` group has "All" permissions.
2932

3033
#### New databases
31-
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/).
34+
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/){:target="_blank"}.
3235
2. Under **Data catalog**, select the **Settings** tab. Ensure the checkboxes under the **Default permissions for newly created databases and tables** are not checked.
33-
3. Select the Databases tab. Click the **Create database** button, and create your database.
36+
3. Select the Databases tab and click **Create database**. On the **Create database** page:
3437
1. Select the **Database** button.
3538
2. Name your database.
3639
3. Set the location to `s3://$datalake_bucket/segment-data/`. <br/> **Optional:** Add a description to your database.
3740
4. Select the `Use only IAM access control for new tables in this database`.
3841
5. Click **Create database**.
39-
4. On the **Databases** page, select your database. From the **Actions** menu, select **Grant** under the Permissions section.
42+
4. On the **Databases** page, select your database. From the **Actions** menu, select **Grant**.
4043
5. On the **Grant data permissions** page, select the `IAMAllowedPrincipals` group in the Principals section.
41-
6. Under the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
42-
7. Select the **Grant** button.
44+
6. In the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
45+
7. Click **Grant**.
4346
8. On the **Permissions** page, verify the `IAMAllowedPrincipals` group has "All" permissions.
4447

4548
#### Verifying your configuration
46-
To verify that you've successfully configured Lake Formation, open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/), select **Data lake permissions**, and verify the `IAMAllowedPrincipals` group is listed with "All" permissions.
49+
To verify that you've configured Lake Formation, open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/){:target="_blank"}, select **Data lake permissions**, and verify the `IAMAllowedPrincipals` group is listed with "All" permissions.
4750

48-
### Configuring Lake Formation using IAM policies
51+
### Configure Lake Formation using IAM policies
4952

5053
> note "Granting Super permission to IAM roles"
51-
> If you manually configured your database, assign the `EMR_EC2_DefaultRole` Super permissions. If you configured your database using Terraform, assign the `segment_emr_instance_profile` Super permissions.
54+
> If you manually configured your database, assign the `EMR_EC2_DefaultRole` Super permissions in step 8. If you configured your database using Terraform, assign the `segment_emr_instance_profile` Super permissions in step 8.
5255
5356
#### Existing databases
54-
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/).
57+
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/){:target="_blank"}.
5558
2. Under **Data catalog**, select the **Settings** tab. Ensure the checkboxes under the **Default permissions for newly created databases and tables** are not checked.
56-
3. On the **Databases** page, select your database. From the **Actions** menu, select **Grant** under the Permissions section.
59+
3. On the **Databases** page, select your database. From the **Actions** menu, select **Grant**.
5760
5. On the **Grant data permissions** page, select the `EMR_EC2_DefaultRole` (or `segment_emr_instance_profile`, if you configured your data lake using Terraform) and `segment-data-lake-iam-role` roles in the Principals section.
58-
6. Under the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
59-
7. Select the **Grant** button.
61+
6. In the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
62+
7. Click **Grant**.
6063
8. On the **Permissions** page, verify the `EMR_EC2_DefaultRole` (or `segment_emr_instance_profile`) and `segment-data-lake-iam-role` roles have "All" permissions.
6164

6265
#### New databases
63-
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/).
66+
1. Open the [AWS Lake Formation service](https://console.aws.amazon.com/lakeformation/){:target="_blank"}.
6467
2. Under **Data catalog**, select the **Settings** tab. Ensure the checkboxes under the **Default permissions for newly created databases and tables** are not checked.
65-
3. Select the Databases tab. Click the **Create database** button, and create your database:
68+
3. Select the Databases tab and click **Create database**. On the **Create database** page:
6669
1. Select the **Database** button.
6770
2. Name your database.
6871
3. Set the location to `s3://$datalake_bucket/segment-data/`. <br/> **Optional:** Add a description to your database.
6972
4. Click **Create database**.
70-
4. On the **Databases** page, select your database. From the **Actions** menu, select **Grant** under the Permissions section.
73+
4. On the **Databases** page, select your database. From the **Actions** menu, select **Grant**.
7174
5. On the **Grant data permissions** page, select the `EMR_EC2_DefaultRole` (or `segment_emr_instance_profile`, if you configured your data lake using Terraform) and `segment-data-lake-iam-role` roles in the Principals section.
72-
6. Under the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
73-
7. Select the **Grant** button.
75+
6. In the **Database permissions** section, select the checkboxes for **Super** database permissions and **Super** grantable permissions.
76+
7. Click **Grant**.
7477
8. On the **Permissions** page, verify the `EMR_EC2_DefaultRole` (or `segment_emr_instance_profile`) and `segment-data-lake-iam-role` roles have "All" permissions.

0 commit comments

Comments
 (0)