Creating an IAM role on AWS - 7.1

Amazon DynamoDB

author
Talend Documentation Team
EnrichVersion
7.1
EnrichProdName
Talend Big Data
Talend Big Data Platform
Talend Data Fabric
Talend Open Studio for Big Data
Talend Real-Time Big Data Platform
task
Data Governance > Third-party systems > Amazon services (Integration) > Amazon DynamoDB components
Data Quality and Preparation > Third-party systems > Amazon services (Integration) > Amazon DynamoDB components
Design and Development > Third-party systems > Amazon services (Integration) > Amazon DynamoDB components
EnrichPlatform
Talend Studio
You need an IAM role to delegate permissions to the AWS service to be used by your Job. If this IAM role does not exist, define it on AWS.

Before you begin

  • You have the appropriate rights and permissions to create a new role on AWS.

Procedure

  1. Log in to your account on AWS and navigate to the AWS console.
  2. Select IAM.
  3. In the navigation pane of the IAM console, select Roles, and then select Create role.
  4. Select AWS service and in the Choose the service that will use this role section, select the AWS service to be run with your Job. For example, select Redshift.
  5. Select the use case to be used for this service. An use case in terms of AWS is defined by the service to include the trust policy that this service requires. Depending on the service and the use case that you selected, the available options vary. For example, with Redshift, you can choose an use case from:
    • Redshift (with a pre-defined Amazon Redshift Service Linked Role Policy);
    • Redshift - Customizable. In this use case, you are prompted to select either read-only policies or full-access policies.
  6. In the Role name field, enter the name to be used for the role being created.
  7. Select Create role.

Results

A custom role has been created to delegate permissions to an AWS service. For the full documentation about creating a role on AWS, see Role creation from the AWS documentation.