menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Big Data News

>

Read and w...
source image

Amazon

1M

read

357

img
dot

Image Credit: Amazon

Read and write Apache Iceberg tables using AWS Lake Formation hybrid access mode

  • Enterprises are adopting Apache Iceberg table format for its features like CDC, ACID compliance, and schema evolution.
  • AWS Lake Formation allows managing fine-grained data access permissions centrally and scaling data access within and outside organizations.
  • Lake Formation hybrid access mode enables using IAM policy-based permissions for write workloads and Lake Formation permissions for read access to Iceberg tables in Amazon S3.
  • Use cases for Lake Formation hybrid access mode include avoiding data replication, minimal interruption to existing IAM policy-based user access, and supporting transactional table writes.
  • Key steps in setting up permissions involve registering data locations, granting permissions to roles, and verifying permissions for Data-Analyst and IAMAllowedPrincipals.
  • Creation of IAM roles, Iceberg tables, opt-in to hybrid access mode, and testing table access as Data-Analyst in Athena are critical steps in the setup.
  • Using Amazon EMR Studio for upsert operations on Iceberg tables, verifying data updates, and cleaning up resources post-use are essential parts of the process.
  • Hybrid access mode in Lake Formation allows gradual adoption of Lake Formation permissions alongside IAM-based permissions for different use cases, ensuring flexible access control.
  • The approach demonstrated can be extended to other open table formats and Data Catalog tables, providing organizations with control over schema and data updates.
  • Authors include Aarthi Srinivasan, a Senior Big Data Architect, and Parul Saxena, a Senior Big Data Specialist Solutions Architect, both with expertise in AWS Lake Formation and big data solutions.
  • The methodology outlined encourages experimentation and adoption of Lake Formation permissions while maintaining control over data operations through IAM policies.

Read Full Article

like

21 Likes

For uninterrupted reading, download the app