Setting Up Data Sources
Register the data sources that you want to harvest, in Data Catalog. You register the data sources as data assets.
You create a data asset from a wide range of supported data sources. To set up and manage your data assets, see:
Required IAM Policies for Data Integration Data Asset
Before creating an OCI Data Integration data asset, set the following policies to create, harvest DI data asset and view the lineage for it:
-
Creating OCI Data Integration data asset requires
CATALOG_DATA_ASSET_CREATE
permission.Allow <any-user> to manage data-catalog-data-assets in compartment <compartment name> where target.catalog.id='<Data Catalog OCID>'
-
Harvesting DI data asset requires
DIS_WORKSPACE_LINEAGE_INSPECT
andDIS_WORKSPACE_OBJECT_INSPECT
permissions.Allow <any-user> to use dis-workspaces in compartment <DIS Workspace Compartment> where ALL {request.principal.id = '<Data Catalog OCID>'}
Allow service datacatalog to {DIS_WORKSPACE_LINEAGE_INSPECT, DIS_WORKSPACE_OBJECT_INSPECT} in compartment <DIS workspace compartment name>
-
Viewing lineage requires
CATALOG_DATA_ASSET_READ
permission.Allow <any-user> to read data-catalog-data-assets in compartment <compartment name> where target.catalog.id='<Data Catalog OCID>'
Required IAM Policies for Metastore
Before you create Metastore data assets, you create policies to enable access to the required data objects.
Any {resource.id = ‘<catalog_ocid>’ }
Create this policy to allow access to any metastore instance, in any compartment within the tenancy where the policy is created.
allow DYNAMIC-GROUP <group_name> to USE data-catalog-metastores in tenancy
allow DYNAMIC-GROUP <group_name> to USE data-catalog-metastores in compartment <compartment name>
allow DYNAMIC-GROUP <group_name> to USE data-catalog-metastores in tenancy where target.metastore.id='<metastore ocid>'
Required IAM Policies for MySQL Data Asset
You can use the OCI MySQL Database service as a data source to create a MySQL data asset. In this section, learn about the policies that you need to for a group named Administrators, to work with the MySQL Database service.
Allow group Administrators to {COMPARTMENT_INSPECT} in tenancy
Allow group Administrators to {VCN_READ, SUBNET_READ, SUBNET_ATTACH, SUBNET_DETACH} in tenancy
You need access to these resource types to attach a DB System to a VCN.
Allow group Administrators to manage mysql-family in tenancy
allow group <your-group-name> to use mysql-instances in tenancy
Required IAM Policies for Oracle Object Storage Data Asset
Before you create Oracle Object Storage data assets, you create policies to enable access to the required data objects. After creating these policies, when you harvest the Object Storage data asset, only those data entities that your data catalog instance has access to are listed. You can select the data objects you want to harvest from the displayed list.
At the least, you must have READ
permission for all the individual resource types objectstorage-namespaces
, buckets
, and objects
, or for the Object Storage aggregate resource type object-family
. For step-by-step instructions, see tutorial Harvesting from Oracle Object Storage.
Create Resource Principal policies to allow Data Catalog access objects in Object Storage. As a prerequisite, create a dynamic group that includes the specific data catalog OCID as a resource in the group.
Example:
Any {resource.id = 'ocid.datacatalog.oc1..<unique_ID>'}
Use the following policy if your Data Catalog instance and Object Storage are in the same tenancy:
- Create this policy only for the
root_compartment
to allow access to any object, in any bucket, in any compartment within the tenancy. Since the scope of this policy is the whole tenancy, a child compartment will not have access to the root or the parent compartments.allow dynamic-group <dynamic-group-name> to read object-family in tenancy
To access specific buckets and compartments within the same tenancy, see Policy Examples.
Create the following policies as a prerequisite if your Data Catalog instance and Object Storage are in different tenancies.
In catalog tenancy:
- Define a tenancy
tenancy-name1
to identify the Object Storage OCID, and then endorse the dynamic groupdynamic-group-name1
to manageobject-family
in<tenancy-name1>
.Define tenancy <tenancy-name1> as <object-storage-tenancy-OCID> Endorse dynamic-group <dynamic-group-name1> to manage object-family in tenancy <tenancy-name1>
In Object Storage tenancy:
- Define a tenancy
tenancy-name2
with catalog tenancy OCID. Definedynamic-group-name2
with the OCID ofdynamic-group-name1
created in the catalog tenancy, and then admit thedynamic-group-name2
to manageobject-family
in the Object Storage tenancy.Define tenancy <tenancy-name2> as <catalog-tenancy-OCID> Define dynamic-group <dynamic-group-name2> as <dynamic-group-name1-OCID> Admit dynamic-group <dynamic-group-name2> of tenancy <tenancy-name2> to manage object-family in tenancy
To access specific buckets and compartments for different tenancies, see Policy Examples.
Required IAM Policies for using OCI Vault
To use Oracle Cloud Infrastructure Vault, you create a dynamic group that includes the data catalog service as a resource in the group.
Any {resource.type='datacatalog' }
Allow dynamic-group <dynamic group name> to read secret-family in tenancy
- Provide a wallet password when you download the wallet.
- Remove the
.p12
file from the downloaded wallet zip. - Use any base64 encoder to encode the modified wallet zip to base64.
- Copy the base64-encoded data to a secret in a vault.
- Create a secret for the database password.