AWS Databricks Setup
Last updated
Was this helpful?
Last updated
Was this helpful?
Cloud Provider - Select AWS as your cloud provider
AWS Region - This is necessary only if you specify AWS as your cloud provider.
Logs and Data Collection - Choose how you want to provide logs to Gradient. We recommend Sync-Hosted collection which manages collecting logs with just a few configurations on your end. Self-Hosted requires additional set up on your end.
Monitoring Type - Choose how you want Gradient to monitor your Databricks clusters.
We recommend EventBridge Rule monitoring which sets up your AWS environment to send EC2 related events to Gradient. Only available if you pick Sync-Hosted for Logs and Data Collection. More information on this .
Another Monitoring Type is Webhook which is covered on this .
For the recommended Sync-Hosted collection method, AWS IAM roles and permissions are required to be set up to complete the rest of the workspace integration, as seen in the screen shot below.
Monitoring Type EventBridge Rule is currently available under Private Preview.
We recommend using EventBridge Rule monitoring for monitoring your Databricks clusters. Only available if you also pick Sync-Hosted collection.
In the next step of the AWS IAM role creation, add the permission created previously to the new AWS IAM role (in the example above it is named sync-external-access
). Example screen shot below:
Give the new IAM role a name, such as sync-external-user-role
, and create the new role.
Go back to the AWS IAM role just created (in the previous example with the name sync-external-user-role
), and copy the ARN link and paste it in the last field in the Gradient dialogue box.
Once entered, click on "Save & Test Access" to proceed in the Gradient UI.
If you picked EventBridge Rule monitoring continue with the setup on this page:
If you picked Webhook monitoring continue with the setup on this page:
Copy and paste the json in a new permission, as see in the example screen shot below. Give the policy a name, such as sync-external-access
Create a new with the "" trust entity and paste the JSON in the policy field, as seen in the example screenshot below. Give the role a name, such as sync-external-user-role
Access check test - A series of access checks will occur to verify the permissions have been properly set up. If all checks are passed with green checks, you may proceed to the next section. If there are any red checks, please verify the installation is correct. Please email if there are any issues or questions.
sync-external-access
sync-external-user-role