Skip to content

Commit ba21165

Browse files
authored
feat: add cloud advanced usage (#2945)
1 parent 644ad38 commit ba21165

File tree

13 files changed

+95
-55
lines changed

13 files changed

+95
-55
lines changed

docs/en/guides/20-cloud/10-using-databend-cloud/01-warehouses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,4 +208,4 @@ For more details, see [CREATE USER](/sql/sql-commands/ddl/user/user-create-user)
208208

209209
### Connection Security
210210

211-
All connections to Databend Cloud warehouses use TLS encryption by default. For enterprise users requiring additional security, [AWS PrivateLink](/guides/sql-clients/privatelink) is available to establish private connections between your VPC and Databend Cloud.
211+
All connections to Databend Cloud warehouses use TLS encryption by default. For enterprise users requiring additional security, [AWS PrivateLink](/guides/cloud/advanced/private-link) is available to establish private connections between your VPC and Databend Cloud.

docs/en/guides/40-load-data/00-stage/06-aws-iam-role.md renamed to docs/en/guides/20-cloud/30-advanced/01-iam-role/01-aws.md

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,8 @@
11
---
2-
title: "Creating External Stage with AWS IAM Role"
2+
title: "Authenticate with AWS IAM Role"
3+
sidebar_label: "AWS IAM Role"
34
---
45

5-
# Why IAM Role
6-
7-
AWS IAM (Identity and Access Management) Role provides a secure and flexible way to manage access to your AWS resources. When working with Databend Cloud, using IAM Role offers several key benefits:
8-
9-
- **Enhanced Security**: Instead of storing AWS access keys and secrets, IAM Role enables temporary credential access, significantly reducing security risks.
10-
- **Simplified Access Management**: You can manage permissions centrally through AWS IAM, making it easier to control who can access your S3 buckets and what operations they can perform.
11-
- **Seamless Integration**: Databend Cloud can securely access your AWS S3 buckets without requiring you to manage or rotate credentials manually.
12-
- **Compliance and Audit**: IAM Role provides detailed audit trails of access to your S3 buckets, helping you maintain compliance with security policies.
13-
14-
By using IAM Role, you can securely connect your Databend Cloud environment to your AWS S3 buckets while maintaining full control over access permissions and security policies.
15-
166
# How to Use IAM Role
177

188
1. Raise a support ticket to get the IAM role ARN for your Databend Cloud organization:
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"label": "IAM Role"
3+
}
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: IAM Role
3+
---
4+
5+
import IndexOverviewList from '@site/src/components/IndexOverviewList';
6+
7+
# Why IAM Role
8+
9+
Cloud-native identity delegation (AWS IAM Role, Azure Managed Identity, Google Service Account federation, etc.) lets Databend Cloud obtain short-lived credentials to your object storage without ever handling raw access keys. That keeps data plane access inside your cloud provider's control plane while you retain ownership of every permission.
10+
11+
## Benefits
12+
13+
- No static keys: temporary credentials eliminate long-lived secrets to rotate or leak.
14+
- Least privilege: fine-grained policies restrict Databend Cloud to only the buckets and actions you approve.
15+
- Central governance: continue auditing and revoking access through your existing IAM workflows.
16+
- Automated rotation: the cloud provider refreshes tokens, so integrations keep working when teams change.
17+
18+
## How It Works
19+
20+
After Databend Cloud support shares the trusted principal information for your organization, you create an IAM role/identity in your cloud account, attach a policy that allows the object storage operations you need (for example reading a set of buckets), and configure the trust policy so only Databend Cloud can assume the role with a unique external ID. Databend Cloud then assumes that role on demand, uses the temporary credentials to access your storage, and automatically logs out when the session expires.
21+
22+
<IndexOverviewList />

docs/en/guides/30-sql-clients/03-privatelink.md renamed to docs/en/guides/20-cloud/30-advanced/02-private-link/01-aws.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,11 @@ title: "Connecting to Databend Cloud with AWS PrivateLink"
33
sidebar_label: "AWS PrivateLink"
44
---
55

6-
# Why PrivateLink
7-
8-
Connecting to Databend Cloud with AWS PrivateLink provides a secure and private way to access Databend Cloud services without traversing the public internet.
9-
10-
By leveraging AWS PrivateLink, you can establish a private connection between your Virtual Private Cloud (VPC) and Databend Cloud, ensuring that your data remains within your VPC boundaries and is not exposed to the internet. This setup enhances the security of your data and minimizes the risk of unauthorized access.
11-
12-
To connect to Databend Cloud using AWS PrivateLink, you need to configure a VPC endpoint in your VPC. This endpoint acts as a proxy that allows traffic to flow securely between your VPC and Databend Cloud. The VPC endpoint has a private IP address within your VPC and facilitates direct communication with Databend Cloud services.
13-
14-
Once the VPC endpoint is established, you can securely access Databend Cloud services, such as data storage, data processing, and analytics tools, using private IP addresses. This ensures that your data remains within the secure boundaries of your VPC, providing an additional layer of protection.
15-
166
# How to Setup AWS PrivateLink
177

188
1. Provide the AWS account ID you are planning to connect to Databend Cloud:
199

20-
For example: `952853449216`
10+
For example: `123456789012`
2111

2212
2. Verify your VPC settings
2313

@@ -27,8 +17,7 @@ Once the VPC endpoint is established, you can securely access Databend Cloud ser
2717

2818
3. Wait for cloud admin adding your account to whitelist, and get a service name for the cluster to connect to:
2919

30-
- `com.amazonaws.vpce.us-east-2.vpce-svc-0e494364a37d35445` (aws, us-east-2, white)
31-
- `com.amazonaws.vpce.us-east-1.vpce-svc-0d9cd5a4a7c19796f` (aws, us-east-1, ivory)
20+
For example: `com.amazonaws.vpce.us-east-2.vpce-svc-0123456789abcdef0`
3221

3322
4. Prepare a security group with tcp 443 port open:
3423

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"label": "Private Link"
3+
}
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Advanced Usage
3+
---
4+
5+
import IndexOverviewList from '@site/src/components/IndexOverviewList';
6+
7+
# Why PrivateLink
8+
9+
PrivateLink-style private endpoints offered by major clouds (AWS PrivateLink, Azure Private Link, Google Private Service Connect, etc.) let you reach Databend Cloud through private IP addresses inside your own network boundary, so no traffic has to traverse the public internet. That keeps your datasets, credentials, and admin actions on the provider's backbone and aligned with the network policies you already operate.
10+
11+
## Benefits
12+
13+
- Network isolation: traffic never leaves your VPC/VPN boundary, removing exposure to public endpoints.
14+
- Compliance ready: easier to satisfy internal audits and industry requirements that forbid internet egress.
15+
- Stable performance: traffic follows the cloud provider backbone instead of unpredictable internet routes.
16+
- Simplified controls: reuse your existing security groups, route tables, and monitoring to govern access.
17+
18+
## How It Works
19+
20+
After Databend Cloud approves the cloud account or project you plan to connect, you create a private endpoint that points to the Databend PrivateLink service for your region. The cloud provider automatically allocates private IP addresses and, once private DNS is enabled, your Databend Cloud domains resolve to those addresses so every session stays on the secure, private path.
21+
22+
<IndexOverviewList />
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"label": "Advanced Usage"
3+
}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
title: Advanced Usage
3+
---
4+
5+
import IndexOverviewList from '@site/src/components/IndexOverviewList';
6+
7+
<IndexOverviewList />

docs/en/guides/30-sql-clients/index.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,3 @@ Databend supports multiple connection methods to suit different use cases. All S
2727
| **Node.js** | JavaScript Driver | Web Applications | [Node.js Guide](/guides/sql-clients/developers/nodejs) |
2828
| **Java** | JDBC Driver | Enterprise Applications | [JDBC Guide](/guides/sql-clients/developers/jdbc) |
2929
| **Rust** | Native Driver | System Programming | [Rust Guide](/guides/sql-clients/developers/rust) |
30-
31-
## Connection Methods
32-
33-
| Method | Security Level | Use Case | Setup Complexity |
34-
|--------|----------------|----------|------------------|
35-
| **Direct Connection** | Standard | Development, Testing | ⭐ Simple |
36-
| **[AWS PrivateLink](/guides/sql-clients/privatelink)** | High | Production, Enterprise | ⭐⭐⭐ Advanced |

0 commit comments

Comments
 (0)