Create an Amazon S3 connection in the Data Management app to authenticate federated searches over Amazon S3 datasets from your Splunk platform deployment.
Create an Amazon S3 connection in the Data Management app to authenticate federated searches over Amazon S3 datasets from your Splunk platform deployment.
Begin by determining the data store of the Amazon S3 connection, identifying the AWS account that it connects to, and indicating what abilities it supports. Then copy a Splunk-generated custom trust policy and use that policy to set up IAM role authentication in your AWS account, to enable federated searches of your Amazon S3 data. Finally, optionally configure Apache Iceberg REST catalog authentication and create your connection.
- Your Splunk Cloud Platform deployment must be on version 10.4.2604 or higher.
- Your user account on the Splunk Cloud Platform deployment must have a role with the
edit_datasets and edit_federated_providers capabilities. See Define roles on the Splunk platform with capabilities in the Splunk Cloud Platform Manage Users and Security manual.
- You must have an Amazon Web Services (AWS) account and an AWS IAM role with permissions that let you attach and modify custom trust policies and resource policies for IAM roles. Contact your AWS administrator for assistance with AWS permissions. See IAM role creation in the AWS Identity and Access Management User Guide.
- On your Splunk Cloud Platform deployment, in Splunk Web, open the Data Management app.
- Select to enter the Create connection workflow.
- On Select data store, select Amazon S3. Then select Next.
- On General, provide values for the following settings, and then select Next.
- On Select abilities, select Run Federated Search.
You can optionally select Send data from Ingest Processor or Send data from Edge Processor and choose their authentication methods if you want to use this connection to send data from your Splunk Cloud Platform deployment to the same Amazon S3 datasets that you run federated searches over.
For details about setting up a connection that supports sending data to Amazon S3 datasets with Edge Processor, see Create an Amazon S3 connection for Edge Processor pipelines in Use Edge Processors for Splunk Cloud Platform.
For details about setting up a connection that supports sending data to Amazon S3 datasets with Ingest Processor, see Create an Amazon S3 connection for Ingest Processor pipelines in Use Ingest Processors.
- Select Next to go to the Storage authentication step.
Set up IAM role authentication in your AWS account:
- At the Storage authentication step, select Copy for the Custom trust policy to copy the trust policy to your clipboard.
You can optionally open the custom trust policy window to review the generated trust policy.
- In a new browser tab, log in to your AWS account and navigate to the Identity and Access Management (IAM) console.
- In the left-hand navigation pane of the IAM console, select Roles and then select Create role.
- On the Select trusted entity page, in the Trusted entity type section, select Custom trust policy.
- In the custom trust policy editor, replace the example custom trust policy with the custom trust policy you copied from your Splunk deployment. Then, select Next.
- On the Add permissions page, do not make any changes. Select Next.
- On the Name, review, and create page, do the following things.
- Give the role a Name that is unique within your AWS account.
Role names are not distinguished by case, meaning that you cannot simultaneously have roles named MyRole and myrole.
- Review the Trust policy that you added in the previous steps to ensure that it is correct.
- In Add tags, add a resource tag with a Key of splunk-assumable-role and a Value of true.
- Select Create role.
- Find the role you just created and select the role name to open it.
- Select the copy icon to copy the role ARN.
- Go back to your first browser tab then do the following things: and paste the role ARN value into the IAM role ARN field for the Data Management app.
- Paste the ARN into the IAM role ARN field.
- Select I confirm that I have added the tag to the new IAM role.
- Depending on whether you previously selected other abilities or authentication methods on the Select abilities page for this connection, do one of the following:
Authenticate your Apache Iceberg REST catalog:
- At the Catalog authentication step, indicate whether you use an Apache Iceberg REST catalog to represent your data.
Note: If you do not use an Apache Iceberg REST catalog, select No for Do you use an Apache Iceberg REST catalog to represent your data? and select Next. Skip to the last step of this procedure.
- In Catalog URL, provide the URL of your Apache Iceberg REST catalog account endpoint.
- Select No catalog authentication required.
Note: OAuth2 catalog authentication is currently not supported.
- Select Next to go to the Review page for your connection.
- If the connection is defined correctly, select Create to create the connection.