<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow read access to S3 buckets from one AWS accounts to other AWS accounts. in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14290#M8810</link>
    <description>&lt;P&gt;Can you please share the IAM role policy in the secondary account (Bucket account) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to know have you tried setting the config in the cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;spark.hadoop.fs.s3a.bucket.&amp;lt;s3-bucket-name&amp;gt;.aws.credentials.provider org.apache.hadoop.fs.s3a.auth.AssumedRoleCredentialProvider&lt;/P&gt;&lt;P&gt;spark.hadoop.fs.s3a.bucket.&amp;lt;s3-bucket-name&amp;gt;.assumed.role.arn arn:aws:iam::&amp;lt;bucket-owner-account-id&amp;gt;:role/Master_Role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Dec 2022 19:09:37 GMT</pubDate>
    <dc:creator>User16255483290</dc:creator>
    <dc:date>2022-12-28T19:09:37Z</dc:date>
    <item>
      <title>Allow read access to S3 buckets from one AWS accounts to other AWS accounts.</title>
      <link>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14289#M8809</link>
      <description>&lt;P&gt;Dear team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have several AWS accounts with S3 buckets, the databricks setup is on our dev AWS account and we would like to allow instance profile to have read permission on all our S3 buckets on the  other AWS accounts ( without using bucket policy which require us to add it on any bucket)&lt;/P&gt;&lt;P&gt;I am trying using the assume role but dosent work, getting access denied.&lt;/P&gt;&lt;P&gt;It is working only if i set S3 bucket permissions on my other/remote AWS account bucket policy.&lt;/P&gt;&lt;P&gt;Please advise&lt;/P&gt;&lt;P&gt;Thansks!&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2022 14:11:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14289#M8809</guid>
      <dc:creator>164079</dc:creator>
      <dc:date>2022-12-28T14:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Allow read access to S3 buckets from one AWS accounts to other AWS accounts.</title>
      <link>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14290#M8810</link>
      <description>&lt;P&gt;Can you please share the IAM role policy in the secondary account (Bucket account) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to know have you tried setting the config in the cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;spark.hadoop.fs.s3a.bucket.&amp;lt;s3-bucket-name&amp;gt;.aws.credentials.provider org.apache.hadoop.fs.s3a.auth.AssumedRoleCredentialProvider&lt;/P&gt;&lt;P&gt;spark.hadoop.fs.s3a.bucket.&amp;lt;s3-bucket-name&amp;gt;.assumed.role.arn arn:aws:iam::&amp;lt;bucket-owner-account-id&amp;gt;:role/Master_Role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2022 19:09:37 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14290#M8810</guid>
      <dc:creator>User16255483290</dc:creator>
      <dc:date>2022-12-28T19:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Allow read access to S3 buckets from one AWS accounts to other AWS accounts.</title>
      <link>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14291#M8811</link>
      <description>&lt;P&gt;Thank you @D Raj Kumar​&amp;nbsp;&lt;/P&gt;&lt;P&gt;Added it and now its works!&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 08:59:48 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/allow-read-access-to-s3-buckets-from-one-aws-accounts-to-other/m-p/14291#M8811</guid>
      <dc:creator>164079</dc:creator>
      <dc:date>2022-12-29T08:59:48Z</dc:date>
    </item>
  </channel>
</rss>

