Can Fivetran Troubleshoot the Issues in the Data Stored in My Destination?
Question
Can Fivetran troubleshoot the issues in the data stored in my AWS data lake?
Environment
Destination: Managed Data Lakes Service (AWS)
Answer
Yes, Fivetran can troubleshoot the issues in the data stored in your AWS data lake. However, to enable us to troubleshoot the issues, you must allow us to access your destination data.
To allow Fivetran to access the data in your destination, do the following:
Open your Amazon IAM console.
Go to Policies, and then click Create Policy.
Go to the JSON tab.
Copy one of the following policies and paste it in the JSON editor:
To resolve the issues with the Iceberg tables, copy the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "athena:*" ], "Resource": [ "*" ] }, { "Effect": "Allow", "Action": [ "s3:GetBucketLocation" ], "Resource": [ "arn:aws:s3:::{your-bucket-name}/{prefix-path}/*", "arn:aws:s3:::{your-bucket-name}" ] }, { "Effect": "Allow", "Action": [ "glue:GetDatabases" ], "Resource": [ "arn:aws:glue:{your-catalog-region}:{your-account-id}:catalog" ] } ] }
NOTE: In the policy, replace the following:
{your-bucket-name}
with the name of your S3 bucket{prefix-path}
with the prefix path of your S3 bucket{your-catalog-region}
with the Region of your S3 bucket{your-account-id}
with your AWS account ID
To resolve the issues with the Delta Lake tables, copy the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "athena:*" ], "Resource": [ "*" ] }, { "Effect": "Allow", "Action": [ "s3:GetBucketLocation" ], "Resource": [ "arn:aws:s3:::{your-bucket-name}/{prefix-path}/*", "arn:aws:s3:::{your-bucket-name}" ] }, ] }
NOTE: In the policy, replace the following:
{your-bucket-name}
with the name of your S3 bucket{prefix-path}
with the prefix path of your S3 bucket
Click Next: Tags.
Click Next: Review.
In the Name field, enter a name for your policy, and then click Create policy.
NOTE: You can delete this policy after we complete the troubleshooting.
Go to Roles.
Open the IAM role you created for your destination.
In the Permissions tab, click Add Permissions, and then select Attach Policies.
Select the IAM policy you created for Athena.
Click Add Permissions.