Connect to Amazon Aurora - AWS App Studio

AWS App Studio is in preview and is subject to change.

Connect to Amazon Aurora

To connect App Studio with Aurora to enable builders to access and use Aurora resources in applications, you must perform the following steps:

Create and configure Aurora resources

To use Aurora databases with App Studio, you must first them and configure them appropriately. There are two Aurora database types supported by App Studio: Aurora PostgreSQL and Aurora MySQL. To compare the types, see What's the difference between MySQL and PostgreSQL?. Choose the appropriate tab and follow the procedure to set up Aurora for use with App Studio apps.

Aurora PostgreSQL

Use the following procedure to create and configure an Aurora PostgreSQL database cluster to be used with App Studio.

To set up Aurora for use with App Studio
  1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/.

  2. Choose Create database.

  3. Choose Aurora (PostgreSQL Compatible).

  4. In Available versions, choose any version greater than or equal to version 13.11, 14.8, and 15.3.

  5. In Settings, enter a DB cluster identifier.

  6. In Instance configuration, choose Serverless v2 and choose an appropriate capacity.

  7. In Connectivity, select Enable the RDS Data API.

  8. In Database authentication, select IAM database authentication.

  9. In Additional configuration, in Initial database name, enter an initial database name for your database.

Aurora MySQL

Use the following procedure to create and configure an Aurora MySQL database cluster to be used with App Studio.

Aurora MySQL doesn’t support creation from the UI for the versions that support Data API or Serverless v1. To create a Aurora MySQL cluster that supports the Data API, you must use the AWS CLI.

Note

To use Aurora MySQL databases with App Studio, they must be in a virtual private cloud (VPC). For more information, see Working with a DB cluster in a VPC in the Amazon Aurora User Guide.

To set up Aurora MySQL for use with App Studio
  1. If necessary, install the AWS CLI by following the instructions in Install or update to the latest version of the AWS CLI in the AWS Command Line Interface User Guide.

  2. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/.

  3. In the left-side navigation, choose Subnet groups.

  4. Choose Create DB subnet group.

  5. Fill out the information and create the sunbnet group. For more information about subnet groups and using VPCs, see Working with a DB cluster in a VPC in the Amazon Aurora User Guide.

  6. Run the following AWS CLI command:

    aws rds create-db-cluster --database-name db_name \ --db-cluster-identifier db_cluster_identifier \ --engine aurora-mysql \ --engine-version 5.7.mysql_aurora.2.08.3 \ --engine-mode serverless \ --scaling-configuration MinCapacity=4,MaxCapacity=32,SecondsUntilAutoPause=1000,AutoPause=true \ --master-username userName \ --master-user-password userPass \ --availability-zones us-west-2b us-west-2c \ --db-subnet-group-name subnet-group-name

    Replace the following fields:

    • Replace db_name with the desired database name.

    • Replace db_cluster_identifier with the desired database cluster identifier.

    • (Optional) Replace the numbers in the scaling-configuration field as desired.

    • Replace userName with a desired username.

    • Replace userPass with a desired password.

    • In availability-zones, add the availability zones from the subnet group you created.

    • Replace subnet-group-name with the name of the subnet group you created.

Create an IAM policy and role to give App Studio access to Aurora resources

To use Aurora resources with App Studio, administrators must create an IAM policy and attach it to an IAM role to give App Studio permissions to access the resources. The IAM policy and role control the scope of data that builders can use and what operations can be called against that data, such as Create, Read, Update, or Delete.

We recommend creating at least one IAM role per service and policy.

To create an IAM policy with appropriate permissions
  1. Sign in to the IAM console with a user that has permissions to create IAM roles. We recommend using the administrative user created in Create an administrative user for managing AWS resources.

  2. In the navigation pane of the console, choose Policies and then choose Create policy.

  3. In the Policy editor, choose JSON.

  4. Replace the existing snippet with the following snippet, replacing 111122223333 with the AWS account number in which the Amazon Redshift and Aurora resources are contained.

    { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "rds-data:ExecuteStatement", "secretsmanager:GetSecretValue" ], "Resource": [ "arn:aws:rds:*:111122223333:cluster:*", "arn:aws:secretsmanager:*:111122223333:secret:rds*" ] } ] }
  5. Choose Next.

  6. Provide a policy name, such as Aurora_AppStudio.

  7. Choose Create policy.

To create an IAM role to give App Studio access to Aurora resources
  1. Sign in to the IAM console with a user that has permissions to create IAM roles. We recommend using the administrative user created in Create an administrative user for managing AWS resources.

  2. In the navigation pane of the console, choose Roles and then choose Create role.

  3. In Trusted entity type, choose Custom trust policy.

  4. Replace the default policy with the following policy to allow App Studio applications to assume this role in your account.

    You must replace 111122223333 with the AWS account number of the account used to set up the App Studio instance.

    { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::111122223333:root" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "aws:PrincipalTag/IsAppStudioAccessRole": "true" } } } ] }

    Choose Next.

  5. In Add permissions, search and select the policy you created earlier (Aurora_AppStudio).

    For more information about using IAM policies with Aurora, including a list of managed policies and their descriptions, see Identity and Access Management for Amazon Aurora in the AWS Lambda Developer Guide.

    Choose Next.

  6. In Role details, provide a name and description.

  7. In Step 3: Add tags, choose Add new tag to add the following tag to provide App Studio access:

    • Key: IsAppStudioDataAccessRole

    • Value: true

  8. Choose Create role and make note of the generated Amazon Resource Name (ARN), you will need it when creating the Aurora connector in App Studio.

Create Aurora connector in App Studio

To create a connector for Aurora
  1. Navigate to App Studio.

  2. In the left-side navigation pane, choose Connectors in the Manage section. You will be taken to a page displaying a list of existing connectors with some details about each.

  3. Choose + Create connector.

  4. Choose the Amazon Aurora connector.

  5. Configure your connector by filling out the following fields:

    • Name: Enter a name for your Aurora connector.

    • Description: Enter a description for your Aurora connector.

    • IAM role: Enter the Amazon Resource Name (ARN) from the IAM role created in Create an IAM policy and role to give App Studio access to Aurora resources. For more information about IAM, see the IAM User Guide.

    • Secret ARN: Enter the secret ARN of the database cluster. For information about where to find the secret ARN, see Viewing the details about a secret for a DB cluser in the Amazon Aurora User Guide.

    • Region: Choose the AWS Region where your Aurora resources are located.

    • Database ARN: Enter the ARN of the database cluster. The ARN can be found in the Configuration tab of the database cluster, similar to the secret ARN.

    • Database type: Choose the database type, MySQL or PostgreSQL, that matches the type of database created in Create and configure Aurora resources.

    • Database name: Enter the name of the database, which can also be found in the Configuration tab of the database cluster.

    • Available tables: Select the tables you want to use with App Studio using this connector.

  6. Choose Next to review or define the entity mappings.

  7. Choose Create to create the Aurora connector. The newly created connector will appear in the Connectors list.

Required IAM permissions for Aurora

The following table contains the minimum permissions that an IAM role must contain to use Aurora resources with App Studio. For more information about creating customer managed policies and attaching them an IAM role, see Create IAM policies (console).

Access type Required permissions

Full access (Create, read, update, delete)

secretsmanager:GetSecretValue rds-data:ExecuteStatement