We’ve added support for using AWS IAM to authenticate connections to Amazon RDS MySQL sources
to our managed cloud. Instead of managing static usernames and passwords, you can now create
a CONNECTION
to AWS that securely assumes a provided role and authenticates to your RDS MySQL
source via short-lived credentials.
CREATE CONNECTION aws_rds_mysql TO AWS (
ASSUME ROLE ARN = 'arn:aws:iam::400121260767:role/MaterializeRDS'
);
CREATE CONNECTION mysql_connection TO MYSQL (
HOST 'instance.foo000.us-west-1.rds.amazonaws.com',
PORT 3306,
USER 'abc',
AWS CONNECTION aws_rds_mysql,
SSL MODE 'verify_identity'
);
See our full documentation for more details.