Create Tencent Cloud Storage Connection
The goal of this step is to allow the Lakehouse cluster to access the object storage COS on Tencent. To achieve this goal, you can use two authentication methods provided by Tencent Cloud Access Management: Access Key and Role Authorization.
Based on Access Key
Parameters:
-
TYPE: This is the object storage type. For Tencent Cloud, fill in
COS
(case insensitive). -
ACCESS_KEY / SECRET_KEY: These are the access keys for Tencent Cloud. Refer to Access Keys for how to obtain them.
-
REGION: This refers to the region where the Tencent Cloud Object Storage (COS) data center is located. When Singdata Lakehouse accesses Tencent Cloud COS within the same region, the COS service will automatically route to internal network access. For specific values, please refer to the Tencent Cloud documentation: Regions and Access Domains.
-
APP_ID: The naming of Tencent Cloud storage buckets consists of the bucket name (BucketName) and APPID, connected by a hyphen "-". For example,
examplebucket-1310000503
, whereexamplebucket
is user-defined, and1310000503
is a system-generated numeric string (APPID).
Role-Based Authorization
STEP1: Create Data Permission Policy (LakehouseAccess):
- Log in to Tencent Cloud and go to the Access Management product console.
- In the Access Management page, navigate to Policies on the left sidebar, then select Create Custom Policy -> Create by Policy Generator -> Visual Policy Generator.
- In the Visual Policy Generator tab: Service: Select Object Storage (cos); Action: Select All Actions (you can make more granular selections based on actual needs); Resource: Select All Resources or Specific Resources as needed. In this example, select specific resources for the Shanghai region
cz-volume-sh-1311343935
- Click Next, fill in the Policy Name as LakehouseAccess and description, then click Finish.
STEP2: Create Role on Client Side (LakehouseRole)
- Go to the Tencent Cloud Access Management product console.
- In the Access Management page, navigate to Roles on the left sidebar -> Create Role -> Tencent Cloud Account, select Other Main Account, and enter
100029595716
(Singdata's Tencent Cloud main account) in the Account ID field. Keep other options as default, then click Next. - In the Configure Role Policy configuration, authorize the newly created LakehouseAccess custom policy to the current role. Click Next, fill in the Role Name as
LakehouseRole
to complete the creation. - After successful creation, go to the details page of the role
LakehouseRole
in the role list to obtain the RoleARN information:qcs::cam::uin/1000*******:roleName/LakehouseRole
.
STEP3: Create Connection on Lakehouse Side
- Execute the following command in Studio or Lakehouse JDBC client:
- During the process of creating a storage connection, Lakehouse will generate this EXTERNAL ID, which can be configured into the role verification of the COS account to achieve access control:
- Client Side: Enter the Tencent Cloud Access Management console, Role -> LakehouseRole -> Role Carrier -> Manage Carrier, select Add Account -> select Current Main Account, and fill in the main account ID:
100029595716
(Singdata's Tencent Cloud main account), and check Enable Verification, enter the EXTERNAL_ID from the previous DESC result, click Confirm -> Update