Option 1: Use the Atlan S3 bucket
To avoid access issues, we recommend uploading the required files β manifest.json
and run_results.json
β to the same S3 bucket as Atlan. Raise a support request to get the details of your Atlan bucket and include the ARN value of the IAM user or IAM role we can provision access to.
If you instead opt to use your own S3 bucket, you will need to complete the following steps:
Option 2: Use your own S3 bucket
You'll first need to create a cross-account bucket policy giving Atlan's IAM role access to your bucket. A cross-account bucket policy is required since your Atlan tenant and S3 bucket may not always be deployed in the same AWS account. The permissions required for the S3 bucket include β GetBucketLocation
, ListBucket
, and GetObject
.
To create a cross-account bucket policy:
- Raise a support ticket to get the ARN of the Node Instance Role for your Atlan EKS cluster.
- Create a new policy to allow access by this ARN and update your bucket policy with the following:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Principal": { "AWS": "<role-arn>" }, "Action": [ "s3:GetBucketLocation", "s3:ListBucket", "s3:GetObject" ], "Resource": [ "arn:aws:s3:::<bucket-name>", "arn:aws:s3:::<bucket-name>/<prefix>/*" ] } ] }
- Replace
<role-arn>
with the role ARN of Atlan's node instance role. - Replace
<bucket-name>
with the name of the bucket you are creating. - Replace
<prefix>
with the name of the prefix (directory) within that bucket where you will upload the files.
- Replace
-
Once the new policy has been set up, please notify the support team. Your request should include the S3 bucket name and prefix. This should be done prior to setting up the workflow so that we can create and attach an IAM policy for your bucket to Atlan's IAM role.
(Optional) Update KMS policy
If your S3 bucket is encrypted, you will need to update your KMS policy. This will allow Atlan to decrypt the objects in your S3 bucket.
- Provide the KMS key ARN and KMS key alias ARN to the Atlan support team.
- To whitelist the ARN of Atlan's node instance, update the KMS policy with the following:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "Decrypt Cross Account", "Effect": "Allow", "Principal": { "AWS": "<role-arn>" }, "Action": [ "kms:Decrypt", "kms:DescribeKey" ], "Resource": "*" } ] }
- Replace
<role-arn>
with the role ARN of Atlan's node instance role.
Structure the bucket
Multiple projects
Atlan supports extracting dbt metadata from multiple dbt projects. You need to use one of the following structures:
Environment-inclusive | Without an environment |
---|---|
main-prefix
|
main-prefix
|
Both examples will be processed as five different dbt projects. The base folder name (for example, project2
) will be stored as Project Name
in the dbt metadata.
Single project
For a single dbt project you can directly upload files in the main S3 prefix or inside another folder that has the dbt project name.
Project-inclusive | Without a project |
---|---|
main-prefix
|
main-prefix |
Upload project files
Upload the following files from the target
directory of the dbt project into one of the bucket structures outlined above:
manifest.json
, which you can generate by running:dbt compile --full-refresh
- This single file contains a full representation of your dbt project's resources, including models, tests, macros, node configurations, resource properties, and more.
catalog.json
, which you can generate by running:dbt docs generate
- This file contains metadata about the tables and views produced by the models in your dbt project β for example, column data types and table statistics.
run_results.json
, which you can generate by running:dbt test
- This file contains information about a completed invocation of dbt, including timing and status details for each node β such as model, test, and more β that was executed.
run_results.json
file. We recommend uploading the file to the same folder as the manifest.json
file.