Aws resources on RDS IAM Auth
Requirements
- AWS RDS Cluster with IAM auth enabled
- User on DB Cluster with IAM enabled
- IAM policy with permission on RDS connect
- Role with IAM policy attached
- IAM role attached to an EC2 instance on which openmetadata is deployed or ServiceAccount/Kube2Iam role attached to pod.
How to enable ADS RDS IAM Auth on postgresql
Set the environment variables
Either through helm (if deployed in kubernetes) or as env vars.
The DB_USER_PASSWORD
is still required and cannot be empty. Set it to a random/dummy string.
When using IAM authentication for AWS RDS, you must still provide a dummy value for the DB_PASSWORD
environment variable. OpenMetadata automatically handles the IAM credentials internally. Ensure the following parameters are set for successful connection:
DB_PARAMS=awsRegion=us-east-1&allowPublicKeyRetrieval=true&serverTimezone=UTC
DB_USE_SSL=true
These settings ensure proper token generation and secure communication with the RDS instance.