쿠키 기본 설정 선택

당사는 사이트와 서비스를 제공하는 데 필요한 필수 쿠키 및 유사한 도구를 사용합니다. 고객이 사이트를 어떻게 사용하는지 파악하고 개선할 수 있도록 성능 쿠키를 사용해 익명의 통계를 수집합니다. 필수 쿠키는 비활성화할 수 없지만 '사용자 지정' 또는 ‘거부’를 클릭하여 성능 쿠키를 거부할 수 있습니다.

사용자가 동의하는 경우 AWS와 승인된 제3자도 쿠키를 사용하여 유용한 사이트 기능을 제공하고, 사용자의 기본 설정을 기억하고, 관련 광고를 비롯한 관련 콘텐츠를 표시합니다. 필수가 아닌 모든 쿠키를 수락하거나 거부하려면 ‘수락’ 또는 ‘거부’를 클릭하세요. 더 자세한 내용을 선택하려면 ‘사용자 정의’를 클릭하세요.

Use AMS SSP to provision Amazon EMR in your AMS account

포커스 모드
Use AMS SSP to provision Amazon EMR in your AMS account - AMS Advanced User Guide
이 페이지는 귀하의 언어로 번역되지 않았습니다. 번역 요청

Use AMS Self-Service Provisioning (SSP) mode to access Amazon EMR capabilities directly in your AMS managed account. Amazon EMR is the industry-leading cloud big data platform for processing vast amounts of data using open source tools such as Apache Spark, Apache Hive, Apache HBase, Apache Flink, Apache Hudi, and Presto. With Amazon EMR you can run Petabyte-scale analysis at less than half of the cost of traditional on-premises solutions and over 3x faster than standard Apache Spark. For short-running jobs, you can spin up and spin down clusters and pay per second for the instances used. For long-running workloads, you can create highly available clusters that automatically scale to meet demand.

You can create one or more instances of the Amazon EMR clusters in either AMS multi-account landing zone or single-account landing zone accounts to support both transient and persistent Amazon EMR clusters. You can also enable Kerberos authentication to enable authenticate users from on-premises Active Directory domain.

You can leverage multiple data stores with the Amazon EMR clusters to support use-case specific Hadoop tools and libraries. The Amazon EMR clusters can be created using OnDemand or Spot instances and configure autoscaling to manage capacity and reduce the cost.

The cluster log files can be archived to an Amazon S3 bucket for logging and debugging. You can also access the web interfaces hosted in the Amazon EMR cluster to support hadoop administration requirements or note book experiences for customers.

To learn more, see Amazon EMR.

Amazon EMR in AWS Managed Services FAQs

Q: How do I request access to Amazon EMR in my AMS account?

Request access by submitting a Management | AWS service | Self-provisioned service | Add (review required) (ct-3qe6io8t6jtny) change type. This RFC provisions the following IAM roles to your account:

  • customer_emr_cluster_instance_profile

  • customer_emr_cluster_autoscaling_role

  • customer_emr_console_role

  • customer_emr_cluster_service_role

After it's provisioned in your account, you must onboard the customer_emr_console_role in your federation solution.

Q: What are the restrictions to using Amazon EMR in my AMS account?

While creating Amazon EMR on an EC2 cluster from the AWS console, we advise you to use the Create Cluster – Advanced option. Amazon EMR clusters must be created by adding the tag with the Key "for-use-with-amazon-emr-managed-policies" with Value "true". Select the following configurations in the Security options:

  • Select custom roles for your cluster:

    • EMR Role : customer_emr_cluster_service_role

    • EC2 Instance Profile : customer_emr_cluster_instance_profile

    • Auto Scaling Role : customer_emr_cluster_autoscaling_role

  • EC2 Security groups:

    • Master : ams-emr-master-security-group

    • Core & Task : ams-emr-worker-security-group

    • Service Access : ams-emr-serviceaccess-security-group

Q: What are the prerequisites or dependencies to using Amazon EMR in my AMS account?

AMS creates default security groups for the Amazon EMR master, worker, and services nodes.

The launch templates and security groups to be used with Amazon EMR clusters must have the tag key "for-use-with-amazon-emr-managed-policies" with value "true".

The default Amazon EMR cluster instance profile enables access to the resources such as s3 buckets and dynamodb tables with their names containing "emr". You can request additional IAM policies to use any additional resources to be used with Amazon EMR. The following resource ARN's can be used with Amazon EMR jobs using the customer_emr_cluster_instance_profile:

  • arn:aws:dynamodb:*:*:table/*emr*

  • arn:aws:kinesis:*:*:stream/*emr*

  • arn:aws:sns:*:*:*emr*arn:aws:sqs:*:*:*emr*

  • arn:aws:sqs:*:*:*emr*

  • arn:aws:sqs:*:*:AWS-ElasticMapReduce-*

  • arn:aws:sdb:*:*:domain:*emr*

  • arn:aws:s3:::*emr*

If kerberos authentication is required for the Amazon EMR cluster:

  • Provide the realm name to be used for each kerberized Amazon EMR cluster and the on-premise Active Directory IP addresses.

  • Infrastructure requirements:

    Multi-Account Landing Zone (MALZ): Submit an RFC to create a new Managed application account or a new VPC in an existing application account.

    Single-Account Landing Zone (SALZ): Submit an RFC to create a new subnet in your VPC.

  • Configure the incoming trust for the cluster’s realm on the on-premise Active Directory.

  • Submit an RFC to configure DNS zones for the realm in the Managed AD.

  • Realm configuration:

    MALZ: Submit a Management | Other | Other | Update (ct-0xdawir96cy7k) RFC to update the VPC DHCP option set to use the realm name for domain name suffix.

    SALZ: Submit a Management | Other | Other | Update (ct-0xdawir96cy7k) RFC to generate a new Amazon EMR AMI to use the specific realm for domain name suffix.

To deploy Amazon EMR studio, the role customer_emr_cluster_service_role has a prerequisite for an Amazon Simple Storage Service bucket. To create the bucket, use the automated CT ct-1a68ck03fn98r (Deployment | Advanced stack components | S3 storage | Create). When you use this automated CT to create an Amazon S3 bucket for Amazon EMR, the bucket name must begin with the prefix customer-emr-*. And, you must create the bucket in the same AWS Region as the Amazon EMR cluster.

이 페이지에서

프라이버시사이트 이용 약관쿠키 기본 설정
© 2025, Amazon Web Services, Inc. 또는 계열사. All rights reserved.