<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Databricks on AWS - Changes to your Unity Catalog storage credentials in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/94183#M2077</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Context:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;On June 30, 2023, AWS&amp;nbsp;&lt;A href="https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/" target="_blank" rel="noopener"&gt;updated&lt;/A&gt;&amp;nbsp;its IAM role trust policy, which requires updating&amp;nbsp;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;. Databricks previously sent an email communication to customers in March 2023 on this topic and updated the&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#step-3-update-the-iam-role-policy" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://registry.terraform.io/providers/databricks/databricks/latest/docs/guides/unity-catalog#configure-external-locations-and-credentials" target="_blank" rel="noopener"&gt;terraform template&lt;/A&gt;&amp;nbsp;to reflect the required&amp;nbsp;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;. To allow customers time to adjust, we implemented a temporary workaround to allow&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;&amp;nbsp;with previous role policy settings to continue working to give customers time to make the required&amp;nbsp;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;. As per our previous email,&amp;nbsp;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;&amp;nbsp;must be configured with a&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#step-3-update-the-iam-role-policy" target="_blank" rel="noopener"&gt;self-assuming IAM role&lt;/A&gt;.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;&lt;STRONG&gt;Action Required&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;You are receiving this email because you used a&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;credential configured with an IAM role that does not allow self-assuming, and we ask that you update it before January 20, 2025 at which point&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;&lt;STRONG&gt;existing credential&lt;/STRONG&gt;&amp;nbsp;will stop working.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;To update&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;non-self-assuming&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;, please follow guidance in the&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#create-a-storage-credential-for-connecting-to-aws-s3" target="_blank" rel="noopener"&gt;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;documentation&lt;/A&gt;&amp;nbsp;or the&amp;nbsp;&lt;A href="https://registry.terraform.io/providers/databricks/databricks/latest/docs/guides/unity-catalog#configure-external-locations-and-credentials" target="_blank" rel="noopener"&gt;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;terraform templates&lt;/A&gt;. Please ensure that they are self-assume-capable (please see&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#step-3-update-the-iam-role-policy" target="_blank" rel="noopener"&gt;“Step 3: Update the IAM role policy”&lt;/A&gt;). If you are unsure how to update&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;IAM policies to self-assume, please check with&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;Account Representative.&lt;/EM&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;We need&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;help here since it looks like the course of action here is to update the trust relationship policy of the IAM role&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;lt;company&amp;gt;-metadata-databricks-access-role&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;which was created by the cloudformation stack provided by Databricks itself. We had reached out to our AWS support representative and below is the response - please advise how exactly to move forward.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;To begin with, regarding&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;query of whether to change the CloudFormation stack and re-apply, or change the policy in the IAM console, based on my analysis, the recommended approach would be to modify the CloudFormation stack and re-apply it. This method ensures that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;infrastructure remains in sync with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;source code and maintains the integrity. However, given that the CloudFormation stack was automatically provided by Databricks, please contact Databricks support further to inquire about the proper procedure for updating the IAM policies within their provided CloudFormation stack and If Databricks allows modifications to their stack, request guidance on how to safely implement these&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;whereas If Databricks does not recommend modifying their stack, then changing the policy directly in the IAM console may be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;best option.&lt;BR /&gt;Having said that, given that the managing resources like cloudformation stacks are provided by a third-party service like Databricks, I would strongly recommend reaching out to their support team for guidance on best practices for modifying the automatically provided CloudFormation stack as third-party assistance is out of AWS support scope. They should be able to provide you with the most up-to-date and safe methods for making necessary&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;.&lt;/I&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thanks&lt;/DIV&gt;</description>
    <pubDate>Tue, 15 Oct 2024 18:26:49 GMT</pubDate>
    <dc:creator>abhishekdas</dc:creator>
    <dc:date>2024-10-15T18:26:49Z</dc:date>
    <item>
      <title>Databricks on AWS - Changes to your Unity Catalog storage credentials</title>
      <link>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/94183#M2077</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Context:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;On June 30, 2023, AWS&amp;nbsp;&lt;A href="https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/" target="_blank" rel="noopener"&gt;updated&lt;/A&gt;&amp;nbsp;its IAM role trust policy, which requires updating&amp;nbsp;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;. Databricks previously sent an email communication to customers in March 2023 on this topic and updated the&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#step-3-update-the-iam-role-policy" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://registry.terraform.io/providers/databricks/databricks/latest/docs/guides/unity-catalog#configure-external-locations-and-credentials" target="_blank" rel="noopener"&gt;terraform template&lt;/A&gt;&amp;nbsp;to reflect the required&amp;nbsp;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;. To allow customers time to adjust, we implemented a temporary workaround to allow&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;&amp;nbsp;with previous role policy settings to continue working to give customers time to make the required&amp;nbsp;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;. As per our previous email,&amp;nbsp;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;&amp;nbsp;must be configured with a&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#step-3-update-the-iam-role-policy" target="_blank" rel="noopener"&gt;self-assuming IAM role&lt;/A&gt;.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;&lt;STRONG&gt;Action Required&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;You are receiving this email because you used a&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;credential configured with an IAM role that does not allow self-assuming, and we ask that you update it before January 20, 2025 at which point&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;&lt;STRONG&gt;existing credential&lt;/STRONG&gt;&amp;nbsp;will stop working.&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;To update&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;non-self-assuming&amp;nbsp;&lt;SPAN class=""&gt;storage&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;credentials&lt;/SPAN&gt;, please follow guidance in the&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#create-a-storage-credential-for-connecting-to-aws-s3" target="_blank" rel="noopener"&gt;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;documentation&lt;/A&gt;&amp;nbsp;or the&amp;nbsp;&lt;A href="https://registry.terraform.io/providers/databricks/databricks/latest/docs/guides/unity-catalog#configure-external-locations-and-credentials" target="_blank" rel="noopener"&gt;&lt;SPAN class=""&gt;Unity&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Catalog&lt;/SPAN&gt;&amp;nbsp;terraform templates&lt;/A&gt;. Please ensure that they are self-assume-capable (please see&amp;nbsp;&lt;A href="https://docs.databricks.com/en/connect/unity-catalog/storage-credentials.html#step-3-update-the-iam-role-policy" target="_blank" rel="noopener"&gt;“Step 3: Update the IAM role policy”&lt;/A&gt;). If you are unsure how to update&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;IAM policies to self-assume, please check with&amp;nbsp;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&amp;nbsp;Account Representative.&lt;/EM&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;We need&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;help here since it looks like the course of action here is to update the trust relationship policy of the IAM role&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;lt;company&amp;gt;-metadata-databricks-access-role&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;which was created by the cloudformation stack provided by Databricks itself. We had reached out to our AWS support representative and below is the response - please advise how exactly to move forward.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;To begin with, regarding&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;query of whether to change the CloudFormation stack and re-apply, or change the policy in the IAM console, based on my analysis, the recommended approach would be to modify the CloudFormation stack and re-apply it. This method ensures that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;infrastructure remains in sync with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;source code and maintains the integrity. However, given that the CloudFormation stack was automatically provided by Databricks, please contact Databricks support further to inquire about the proper procedure for updating the IAM policies within their provided CloudFormation stack and If Databricks allows modifications to their stack, request guidance on how to safely implement these&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;whereas If Databricks does not recommend modifying their stack, then changing the policy directly in the IAM console may be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;your&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;best option.&lt;BR /&gt;Having said that, given that the managing resources like cloudformation stacks are provided by a third-party service like Databricks, I would strongly recommend reaching out to their support team for guidance on best practices for modifying the automatically provided CloudFormation stack as third-party assistance is out of AWS support scope. They should be able to provide you with the most up-to-date and safe methods for making necessary&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;changes&lt;/SPAN&gt;.&lt;/I&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thanks&lt;/DIV&gt;</description>
      <pubDate>Tue, 15 Oct 2024 18:26:49 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/94183#M2077</guid>
      <dc:creator>abhishekdas</dc:creator>
      <dc:date>2024-10-15T18:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: Databricks on AWS - Changes to your Unity Catalog storage credentials</title>
      <link>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/95074#M2126</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/127131"&gt;@abhishekdas&lt;/a&gt;&amp;nbsp;Thank you for your patience. We have been checking internally with a few folks for the best approach! We will keep you posted soon.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2024 13:27:07 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/95074#M2126</guid>
      <dc:creator>Sujitha</dc:creator>
      <dc:date>2024-10-20T13:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Databricks on AWS - Changes to your Unity Catalog storage credentials</title>
      <link>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/95101#M2127</link>
      <description>&lt;P&gt;Hi Abhishek,&lt;/P&gt;
&lt;P&gt;100% agree that &lt;EM&gt;"the recommended approach would be to modify the CloudFormation stack and re-apply it"&lt;/EM&gt; as stated by AWS Support.&lt;/P&gt;
&lt;P&gt;Here is a template which you can consider re-using to execute.&lt;BR /&gt;(Obviously you'll change the bucket, role names etc)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;AWSTemplateFormatVersion: 2010-09-09
Resources:

  UnityCatalogBucket:
    Type: AWS::S3::Bucket
    Properties:
      BucketName: "{{ TEAM_NAME }}-unity-catalog-{{ ENV }}"

  UnityCatalogBucketRole:
    Type: AWS::IAM::Role
    Properties:
      RoleName: "{{ TEAM_NAME }}-unity-catalog-{{ ENV }}"
      AssumeRolePolicyDocument:
        Version: '2012-10-17'
        Statement:
          - Effect: Allow
            Principal:
              AWS:
                - arn:aws:iam::414351767826:role/unity-catalog-prod-UCMasterRole-14S5ZJVKOTYTL
                - !Sub arn:aws:iam::${AWS::AccountId}:root
            Action: sts:AssumeRole
             Condition:
              StringEquals:
                AWS:PrincipalArn:
                  - !Sub arn:aws:iam::414351767826:role/unity-catalog-prod-UCMasterRole-14S5ZJVKOTYTL
                  - !Sub arn:aws:iam::${AWS::AccountId}:role/{{ TEAM_NAME }}-unity-catalog-{{ ENV }}
                sts:ExternalId: "01481bf9-fd6f-4318-b9f4-4f3d743ff240"
      ManagedPolicyArns:
        - !Ref UnityCatalogBucketRolePolicy

  UnityCatalogBucketRolePolicy:
    Type: AWS::IAM::ManagedPolicy
    Properties:
      ManagedPolicyName: "{{ TEAM_NAME }}-unity-catalog-{{ ENV }}"
      PolicyDocument:
        Version: '2012-10-17'
        Statement:
          - Effect: Allow
            Action:
                - s3:GetObject
                - s3:PutObject
                - s3:DeleteObject
                - s3:ListBucket
                - s3:GetBucketLocation
            Resource:
                - !Sub arn:aws:s3:::${UnityCatalogBucket}
                - !Sub arn:aws:s3:::${UnityCatalogBucket}/*
          - Effect: Allow
            Action:
              - sts:AssumeRole
            Resource:
                - !Sub arn:aws:iam::${AWS::AccountId}:role/{{ TEAM_NAME }}-unity-catalog-{{ ENV }}&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you run into issues, then I highly recommend creating a Databricks Support Ticket through the Help Center. &lt;A href="https://help.databricks.com/s/" target="_blank" rel="noopener"&gt;https://help.databricks.com/s/&lt;/A&gt;&amp;nbsp;(&lt;EM&gt;as recommended by AWS Support&lt;/EM&gt;).&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2024 22:07:34 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/95101#M2127</guid>
      <dc:creator>MoJaMa</dc:creator>
      <dc:date>2024-10-20T22:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Databricks on AWS - Changes to your Unity Catalog storage credentials</title>
      <link>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/95634#M2144</link>
      <description>&lt;P&gt;Thank you for the response&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/425"&gt;@MoJaMa&lt;/a&gt;&amp;nbsp;- we will try it out tomorrow and post an update here.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 05:24:07 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/databricks-on-aws-changes-to-your-unity-catalog-storage/m-p/95634#M2144</guid>
      <dc:creator>abhishekdas</dc:creator>
      <dc:date>2024-10-23T05:24:07Z</dc:date>
    </item>
  </channel>
</rss>

