Aws resources on RDS IAM Auth
AWS Reference Doc
Requirements
- AWS RDS Cluster with IAM auth enabled
- User on DB Cluster with IAM enabled
- IAM policy with permission on RDS connect
- Role with IAM policy attached
- IAM role attached to an EC2 instance on which openmetadata is deployed or ServiceAccount/Kube2Iam role attached to pod.
How to enable ADS RDS IAM Auth on postgresql
Set the environment variables
DB_USER_PASSWORD: "dummy"
DB_PARAMS: "awsRegion=eu-west-1&allowPublicKeyRetrieval=true&sslmode=require&serverTimezone=UTC"
Either through helm (if deployed in kubernetes) or as env vars.
The DB_USER_PASSWORD is still required and cannot be empty. Set it to a random/dummy string.
When using IAM authentication for AWS RDS, you must still provide a dummy value for the DB_PASSWORD environment variable. OpenMetadata automatically handles the IAM credentials internally. Ensure the following parameters are set for successful connection:
DB_PARAMS=awsRegion=us-east-1&allowPublicKeyRetrieval=true&serverTimezone=UTC
DB_USE_SSL=true
These settings ensure proper token generation and secure communication with the RDS instance.