AWS Athena (Pre-release)

Amazon’s serverless, interactive query service that lets you analyze data directly in Amazon S3 using standard SQL.

Supported Connection Methods

Available methods for connections to the target system from Lumi AI:

Supported Limits

The following are limits that can be configured for the system to moderate access and usage from users in Lumi AI:

Available Parameters

These properties are the essential source system connection properties that all queries are directed towards.

* Required parameters

Note: The Gateway parameter is common to all systems (when supported) and is only available when gateway is the selected connection method.

AWS Role ARN*

The ARN (Amazon Resource Name) of the IAM role that will be assumed by Lumi to run queries against Athena.

πŸ‘ Valid Examples

  • arn:aws:iam::123456789012:role/lumi-athena-query-runner

πŸ‘Ž Invalid Examples

  • 123456789012:role/lumi-athena-query-runner

  • lumi-athena-query-runner

AWS Region*

AWS Region where Athena and S3 staging bucket resides in.

πŸ‘ Valid Examples

  • us-east-1

  • us-west-2

πŸ‘Ž Invalid Examples

  • US-East-1

  • North America

S3 Staging Directory*

The S3 URI (bucket + optional prefix) where Athena writes its query results

πŸ‘ Valid Examples

  • s3://my-athena-bucket

  • s3://my-athena-bucket/staging

πŸ‘Ž Invalid Examples

  • /s3/my-athena-bucket

  • my-athena-bucket

Database*

The Athena database name.

πŸ‘ Valid Examples

  • analytics

  • default

πŸ‘Ž Invalid Examples

  • AwsDataCatalog.analytics

  • analytics.products

AWS External ID*

AWS External ID. Can be any arbitrary string that matches aws-external-id of the cross-account IAM role (see below).

πŸ‘ Valid Examples

  • 6ee2f609-cb2c-4d66-b39b-a3a13985b622

πŸ‘Ž Invalid Examples

  • Empty string

System Permissions & Configuration

You will need to create cross-account IAM role whose trust policy allows Lumi's AWS account to run queries against Athena.

Create IAM policy with access to your Athena instance

  1. Navigate to IAM -> Policies -> Create policy.

  2. Select the JSON option and paste the following snippet, replacing <your-data-bucket> with <your-athena-staging-bucket> with the name of your S3 Athena data bucket and S3 your staging (query results) bucket, respectively. /

  1. Click Next.

  2. Name the policy AthenaQueryPermissions and click Create Policy.

Create a Cross-Account IAM Role with the above IAM policy

  1. Navigate to IAM β†’ Roles β†’ Create role.

  2. Select Custom trust policy option and paste the following snippet, replacing <lumi-account-id> with Lumi's Account ID (provided during onboarding) and <aws-external-id> with AWS external ID (can be any arbitrary string)

  1. Click Next.

  2. In the Permissions policies, search for AthenaQueryPermissions and select it.

  3. Click Next.

  4. Name the role LumiAI-athena-query-runner and click Create Role.

Last updated

Was this helpful?