From 2d5ee4faaa14fe432238e2d9bed14aa271e38bd6 Mon Sep 17 00:00:00 2001 From: Gabriel Forien Date: Thu, 27 Oct 2022 14:18:10 +0200 Subject: [PATCH] docs(athena): add assuming IAM role with PyAthena (#21951) --- docs/docs/databases/athena.mdx | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/docs/docs/databases/athena.mdx b/docs/docs/databases/athena.mdx index feabad302..55282d68a 100644 --- a/docs/docs/databases/athena.mdx +++ b/docs/docs/databases/athena.mdx @@ -32,3 +32,11 @@ following connection string: ``` awsathena+rest://{aws_access_key_id}:{aws_secret_access_key}@athena.{region_name}.amazonaws.com/{schema_name}?s3_staging_dir={s3_staging_dir}&... ``` + +The PyAthena library also allows to assume a specific IAM role, by [importing the datasource from YAML](https://superset.apache.org/docs/miscellaneous/importing-exporting-datasources/#importing-datasources-from-yaml) and passing extra parameters: +``` +databases: + - database_name: awsathena + sqlalchemy_uri: awsathena+rest://athena.{region_name}.amazonaws.com/{schema_name}?s3_staging_dir={s3_staging_dir}&... + extra: "{\"engine_params\": {\"connect_args\": {\"role_arn\": \"{{ ROLE_ARN }}\" }}}" +```