Skip to main content

AWS account requirements

First, make sure you have the prerequisites.

Then before you install AI Unlimited, address these AWS items.

Prepare your AWS account

Allow AI Unlimited to create roles

The manager needs a role that allows it to deploy the engine. The engine needs a role that allows the engine nodes to communicate. You can let AI Unlimited create both of these roles.

Note

If your security does not allow AI Unlimited to create roles, create the roles yourself or with the help of your cloud admin.

Role for the manager

To let AI Unlimited create this role for you, when you specify the stack details, provide these values for these parameters:

  • IamRole: New
  • IamRoleName: leave blank

Role for the engine

AI Unlimited can create a new role for the engine each time the engine is deployed.

The engine-specific policies AI Unlimited creates are restricted this way:

To allow AI Unlimited to create a new role for each engine deployment, when you configure the cloud integration in the AI Unlimited setup, leave the Default IAM role field blank.

Provide roles created by your organization

If your security does not allow AI Unlimited to create roles, provide roles created by your organization.

The deployments folder in the AI Unlimited GitHub repository provided by Teradata includes policy samples for the manager and engine roles.

Open a terminal window, and clone the repository.

Or use the links provided in sections that follow to download what you need.

Role for the manager

  • If you have permissions to create IAM resources, create the role:
    • Attach a policy that includes the JSON that meets your needs. See the JSON samples that follow.
    • When you specify the stack details, use these parameter values:
      • IamRole: New
      • IamRoleName: the new role's name
  • If you don't have permissions to create IAM resources, work with your cloud admin to use an existing role:
    • Attach a policy that includes the JSON that meets your needs. See the JSON samples that follow.
    • When you specify the stack details, use these parameter values:
    • IamRole: Existing
    • IamRoleName: the existing role's name

JSON samples

Use these samples, as needed, in a policy attached to the manager's role:

Role for the engine

  • To the role you provide for the engine, attach a policy that includes ai-unlimited-engine.json. This allows AI Unlimited to pass the role to the cluster each time the engine is deployed.

  • Add your account details to the policy. You can't predict the cluster name, so use a wildcard.

Note

If you use ai-unlimited-engine.json for the engine's role, use ai-unlimited-without-iam-role-permissions.json for the manager's role.

  • When you configure the cloud integration in the AI Unlimited setup, put the role name in the Default IAM role field.
Also of interest