
You can now query information from the tables exposed by the connection: Right-click a Table and then click Edit Table. Jdbc:amazonathena:AccessKey='a123' SecretKey='s123' Region='IRELAND' Database='sampledb' S3StagingDirectory='s3://bucket/staging/' Either double-click the JAR file or execute the jar file from the command-line.įill in the connection properties and copy the connection string to the clipboard. If Database is not set in the connection, the data provider connects to the default database set in Amazon Athena.įor assistance in constructing the JDBC URL, use the connection string designer built into the Amazon Athena JDBC Driver. Set S3StagingDirectory to a folder in S3 where you would like to store the results of queries. Set Region to the region where your Amazon Athena data is hosted. In addition to the AccessKey and SecretKey properties, specify Database, S3StagingDirectory and Region. Note that theĭuration of the temporary credentials may be controlled via the TemporaryTokenDuration (default 3600 seconds). This will cause the CData Data Provider for Amazon Athena 2018 to submit the MFA credentials in a request to retrieve temporary authentication credentials.

When specifying the AccessKey and SecretKey of an AWS root user.įor users and roles that require Multi-factor Authentication, specify the MFASerialNumber and MFAToken connection properties. If you are connecting to AWS (instead of already being connected such as on an EC2 instance), you mustĪdditionally specify the AccessKey and SecretKey of an IAM user to assume the role for. This will cause the CData Data Provider for Amazon Athena 2018 to attempt to retrieve credentials for In many situations it may be preferable to use an IAM role for authentication instead of the direct security credentials of an AWS root user.Īn AWS role may be used instead by specifying the RoleARN. The CData Data Provider for Amazon Athena 2018 will automatically obtain your IAM Role credentials and authenticate with them. To do so, set UseEC2Roles to true and leave AccessKey and SecretKey empty. If you are using the CData Data Provider for Amazon Athena 2018 from an EC2 Instance and have an IAM Role assigned to the instance, you can use the Click Continue to Security Credentials and expand the Access Keys section to manage or create root account access keys.Select your account name or number and select My Security Credentials in the menu that is displayed.Sign into the AWS Management console with the credentials for your root account.To obtain the credentials for your AWS root account, follow the steps below: To create or manage the access keys for a user, select the user and then select the Security Credentials tab.To obtain the credentials for an IAM user, follow the steps below:

Note: Though you can connect as the AWS account administrator, it is recommended to use IAM user credentials to access AWS services. To authorize Amazon Athena requests, provide the credentials for an administrator account or for an IAM user with custom permissions: Set AccessKey to the access key Id.
#DATAGRIP VS DBEAVER DRIVER#

Click New to open the Create New Driver form.

Open the DBeaver application and, in the Databases menu, select the Driver Manager option.
#DATAGRIP VS DBEAVER HOW TO#
This article shows how to connect to Amazon Athena data with wizards in DBeaver and browse data in the DBeaver GUI.Ĭreate a JDBC Data Source for Amazon Athena Dataįollow the steps below to load the driver JAR in DBeaver. The CData JDBC Driver for Amazon Athena implements JDBC standards that enable third-party tools to interoperate, from wizards in IDEs to business intelligence tools.
