<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring airflow in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/configuring-airflow/m-p/26535#M18568</link>
    <description>&lt;P&gt;I would recommend having the 'user' the Databricks Jobs are triggered by as a dedicated user. This is what I would consider a 'Service Account' and I'll drop a definition for that type of user below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seeing that you have SSO enabled, I might create this user in the IDP system in gsuite, and propagate this newly created user into the Databricks workspace. I would ensure this user has the appropriate Job Create permissions, and then generate a PAT for integration with Airflow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having a dedicated account will help with monitoring its usage, and also ensure CI/CD best practices are observed for code promotion. This also ensures that the 'normal user' PAT is not in the loop, because if that 'normal user' were to leave the company, they could be de-provisioned from the Databricks workspace, which invalidates the PAT, which then breaks your Airflow integration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Service accounts are a special type of non-human &lt;A href="https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam" alt="https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam" target="_blank"&gt;privileged account&lt;/A&gt; used to execute applications and run automated services, virtual machine instances, and other processes.&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jun 2021 15:25:00 GMT</pubDate>
    <dc:creator>User16783855117</dc:creator>
    <dc:date>2021-06-07T15:25:00Z</dc:date>
    <item>
      <title>Configuring airflow</title>
      <link>https://community.databricks.com/t5/data-engineering/configuring-airflow/m-p/26534#M18567</link>
      <description>&lt;P&gt;Should we create a Databricks user for airflow and generate a personal access token for it? We also have gsuite SSO enabled, does that mean I need to create a gsuite account for the user as well?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 23:57:55 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/configuring-airflow/m-p/26534#M18567</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-06-02T23:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring airflow</title>
      <link>https://community.databricks.com/t5/data-engineering/configuring-airflow/m-p/26535#M18568</link>
      <description>&lt;P&gt;I would recommend having the 'user' the Databricks Jobs are triggered by as a dedicated user. This is what I would consider a 'Service Account' and I'll drop a definition for that type of user below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seeing that you have SSO enabled, I might create this user in the IDP system in gsuite, and propagate this newly created user into the Databricks workspace. I would ensure this user has the appropriate Job Create permissions, and then generate a PAT for integration with Airflow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having a dedicated account will help with monitoring its usage, and also ensure CI/CD best practices are observed for code promotion. This also ensures that the 'normal user' PAT is not in the loop, because if that 'normal user' were to leave the company, they could be de-provisioned from the Databricks workspace, which invalidates the PAT, which then breaks your Airflow integration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Service accounts are a special type of non-human &lt;A href="https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam" alt="https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam" target="_blank"&gt;privileged account&lt;/A&gt; used to execute applications and run automated services, virtual machine instances, and other processes.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 15:25:00 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/configuring-airflow/m-p/26535#M18568</guid>
      <dc:creator>User16783855117</dc:creator>
      <dc:date>2021-06-07T15:25:00Z</dc:date>
    </item>
  </channel>
</rss>

