When you are running the Designer Cloud Powered by Trifacta platform on an EC2 instance, you can leverage your enterprise IAM roles to manage permissions on the instance for the Designer Cloud Powered by Trifacta platform. When this type of authentication is enabled, Alteryx administrators can apply a role to the EC2 instance where the platform is running. That role's permissions apply to all users of the platform.
Before you begin, your IAM roles should be defined and attached to the associated EC2 instance.
NOTE: The IAM instance role used for S3 access should have access to resources at the bucket level.
For more information, see http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html.
AWS System Mode
To enable role-based instance authentication, the following parameter must be enabled.
Additional AWS Configuration
The following additional parameters must be specified:
|Set this value to |
Set this value to
Shared instance provider class information
Cloudera 6.0.0 and later:
Set the above parameters as follows:
"aws.credentialProvider": "instance", "aws.hadoopFSUseSharedInstanceProvider": false,
Use of S3 Sources
To access S3 for storage, additional configuration for S3 may be required.
NOTE: Do not configure the properties that apply to
Output sizing recommendations:
- Single-file output: If you are generating a single file, you should try to keep its size under 1 GB.
- Multi-part output: For multiple-file outputs, each part file should be under 1 GB in size.
- For more information, see https://docs.aws.amazon.com/redshift/latest/dg/c_best-practices-use-multiple-files.html
For more information, see Enable S3 Access.
This page has no comments.