<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS custom role for Databricks  clusters - no instance profile ARN in Administration &amp; Architecture</title>
    <link>https://community.databricks.com/t5/administration-architecture/aws-custom-role-for-databricks-clusters-no-instance-profile-arn/m-p/110982#M3042</link>
    <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/50560"&gt;@Wayne&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to understand more about what you’re trying to achieve,&lt;/P&gt;&lt;P&gt;but if you’re looking to grant permissions to the EC2 instances running behind a Databricks cluster using an instance profile, the following documentation provides a detailed explanation.&lt;/P&gt;&lt;P&gt;It includes an example of granting access to S3&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/connect/storage/tutorial-s3-instance-profile" target="_new" rel="noopener"&gt;Use Instance Profiles to Access S3 from Databricks&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2025 05:43:27 GMT</pubDate>
    <dc:creator>Takuya-Omi</dc:creator>
    <dc:date>2025-02-23T05:43:27Z</dc:date>
    <item>
      <title>AWS custom role for Databricks  clusters - no instance profile ARN</title>
      <link>https://community.databricks.com/t5/administration-architecture/aws-custom-role-for-databricks-clusters-no-instance-profile-arn/m-p/110927#M3039</link>
      <description>&lt;P&gt;Try to follow the instructions to create custom IAM role for EC2 instance in Databricks clusters, but I can't find the instance profile ARN on the role. If I create a regual IAM role on EC2, I can find both role ARN and instance profile ARN.&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/account-settings-e2/credentials" target="_blank" rel="noopener"&gt;https://docs.databricks.com/aws/en/admin/account-settings-e2/credentials&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Get your Databricks account ID. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.databricks.com/aws/en/admin/account-settings/#account-id" target="_blank" rel="noopener"&gt;Locate your account ID&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Log into your AWS Console as a user with administrator privileges and go to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;IAM&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;console.&lt;/LI&gt;&lt;LI&gt;Click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Roles&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab in the sidebar.&lt;/LI&gt;&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Create role&lt;/STRONG&gt;.&lt;OL&gt;&lt;LI&gt;In&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Select type of trusted entity&lt;/STRONG&gt;, click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;AWS account&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tile.&lt;/LI&gt;&lt;LI&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Another AWS account&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;checkbox.&lt;/LI&gt;&lt;LI&gt;In the Account ID field, enter the Databricks account ID&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;414351767826. This is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the Account ID you copied from the Databricks account console. If you are are using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.databricks.com/aws/en/security/privacy/gov-cloud" target="_blank" rel="noopener"&gt;Databricks on AWS GovCloud&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;use the Databricks account ID&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;044793339203&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for AWS GovCloud or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;170661010020&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for AWS GovCloud DoD.&lt;/LI&gt;&lt;LI&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Require external ID&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;checkbox.&lt;/LI&gt;&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;External ID&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;field, enter your Databricks account ID, which you copied from the Databricks account console.&lt;/LI&gt;&lt;LI&gt;Click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Next&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;button.&lt;/LI&gt;&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Add Permissions&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page, click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Next&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;button. You should now be on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Name, review, and create&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page.&lt;/LI&gt;&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Role name&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;field, enter a role name.&lt;/LI&gt;&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Create role&lt;/STRONG&gt;. The list of roles appears.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 21 Feb 2025 21:16:49 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/aws-custom-role-for-databricks-clusters-no-instance-profile-arn/m-p/110927#M3039</guid>
      <dc:creator>Wayne</dc:creator>
      <dc:date>2025-02-21T21:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: AWS custom role for Databricks  clusters - no instance profile ARN</title>
      <link>https://community.databricks.com/t5/administration-architecture/aws-custom-role-for-databricks-clusters-no-instance-profile-arn/m-p/110982#M3042</link>
      <description>&lt;P&gt;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/50560"&gt;@Wayne&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to understand more about what you’re trying to achieve,&lt;/P&gt;&lt;P&gt;but if you’re looking to grant permissions to the EC2 instances running behind a Databricks cluster using an instance profile, the following documentation provides a detailed explanation.&lt;/P&gt;&lt;P&gt;It includes an example of granting access to S3&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/connect/storage/tutorial-s3-instance-profile" target="_new" rel="noopener"&gt;Use Instance Profiles to Access S3 from Databricks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 05:43:27 GMT</pubDate>
      <guid>https://community.databricks.com/t5/administration-architecture/aws-custom-role-for-databricks-clusters-no-instance-profile-arn/m-p/110982#M3042</guid>
      <dc:creator>Takuya-Omi</dc:creator>
      <dc:date>2025-02-23T05:43:27Z</dc:date>
    </item>
  </channel>
</rss>

