Amazon Athena Sources > Before you begin > Create a connection
  

Create a connection

Create an Amazon Athena connection object in Administrator with the connection details of the Amazon Athena source system.
    1In Administrator, select Connections.
    2Click Add Connection.
    3Select Amazon Athena and click Next.
    4Enter the connection properties.
    The following table describes the connection properties:
    Property
    Description
    Connection Name
    Name of the connection.
    Each connection name must be unique within the organization. Connection names can contain alphanumeric characters, spaces, and the following special characters: _ . + -,
    Maximum length is 255 characters.
    Description
    Description of the connection. Maximum length is 4000 characters.
    Runtime Environment
    The name of the runtime environment where you want to run tasks.
    Authentication type
    Authentication mechanism to connect to Amazon Athena .
    Select Permanent IAM Credentials, EC2 Instance Profile, or EC2 role to asssume role.
    Permanent IAM Credentials is the default authentication mechanism. It requires an access key and secret key to connect to Amazon Athena .
    Use EC2 Instance Profile when you installed the Secure Agent on an Amazon Elastic Compute Cloud (EC2) system. You can configure AWS Identity and Access Management (IAM) authentication to connect to Amazon Athena .
    You can also configure an EC2 role to assume an IAM role and generate temporary security credentials to connect to Amazon Athena from the same or different AWS accounts. The EC2 role can assume an IAM role without a permanent access key and secret key.
    JDBC URL
    The JDBC URL to connect to Amazon Athena .
    Enter the JDBC URL in the following format:
    jdbc:awsathena://AwsRegion=<region_name>;
    S3OutputLocation=<S3_Output_Location>;
    Workgroup=<Workgroup_Name>;
    Note:
    If you use a workgroup with customer managed query results, specify at least one of the two parameters in the JDBC URL, either the S3 output location or the workgroup name. For a workgroup with Athena managed query results, specify only the workgroup name and do not include the S3 output location in the JDBC URL.
    IAM Role ARN
    Required if you configure the EC2 Role to Assume Role authentication to connect to Amazon Athena .
    The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role assumed by the EC2 role. The EC2 role uses dynamically generated temporary security credentials.
    External ID (Advanced Setting)
    The external ID associated with the IAM role. External ID is a unique, user-defined string value that the IAM role requires the EC2 role to provide when calling the sts:AssumeRole API.
    5Click Test to test your connection to the source system.
    6Click Save.