Configuring an Apache Airflow connection using a Amazon Secrets Manager secret - Amazon Managed Workflows for Apache Airflow
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Configuring an Apache Airflow connection using a Amazon Secrets Manager secret

Amazon Secrets Manager is a supported alternative Apache Airflow backend on an Amazon Managed Workflows for Apache Airflow environment. This guide shows how to use Amazon Secrets Manager to securely store secrets for Apache Airflow variables and an Apache Airflow connection on Amazon Managed Workflows for Apache Airflow.

Note
  • You will be charged for the secrets you create. For more information on Secrets Manager pricing, see Amazon Pricing.

Step one: Provide Amazon MWAA with permission to access Secrets Manager secret keys

The execution role for your Amazon MWAA environment needs read access to the secret key in Amazon Secrets Manager. The following IAM policy allows read-write access using the Amazon managed SecretsManagerReadWrite policy.

To attach the policy to your execution role
  1. Open the Environments page on the Amazon MWAA console.

  2. Choose an environment.

  3. Choose your execution role on the Permissions pane.

  4. Choose Attach policies.

  5. Type SecretsManagerReadWrite in the Filter policies text field.

  6. Choose Attach policy.

If you do not want to use an Amazon managed permission policy, you can directly update your environment's execution role to allow any level of access to your Secrets Manager resources. For example, the following policy statement grants read access to all secrets you create in a specific Amazon Region in Secrets Manager.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "secretsmanager:GetResourcePolicy", "secretsmanager:GetSecretValue", "secretsmanager:DescribeSecret", "secretsmanager:ListSecretVersionIds" ], "Resource": "arn:aws:secretsmanager:us-west-2:012345678910:secret:*" }, { "Effect": "Allow", "Action": "secretsmanager:ListSecrets", "Resource": "*" } ] }

Step two: Create the Secrets Manager backend as an Apache Airflow configuration option

The following section describes how to create an Apache Airflow configuration option on the Amazon MWAA console for the Amazon Secrets Manager backend. If you're using a configuration setting of the same name in airflow.cfg, the configuration you create in the following steps will take precedence and override the configuration settings.

  1. Open the Environments page on the Amazon MWAA console.

  2. Choose an environment.

  3. Choose Edit.

  4. Choose Next.

  5. Choose Add custom configuration in the Airflow configuration options pane. Add the following key-value pairs:

    1. secrets.backend: airflow.providers.amazon.aws.secrets.secrets_manager.SecretsManagerBackend

    2. secrets.backend_kwargs: {"connections_prefix" : "airflow/connections", "variables_prefix" : "airflow/variables"} This configures Apache Airflow to look for connection strings and variables at airflow/connections/* and airflow/variables/* paths.

      You can use a lookup pattern to reduces the number of API calls Amazon MWAA makes to Secrets Manager on your behalf. If you do not specify a lookup pattern, Apache Airflow searches for all connections and variables in the configured backend. By specifying a pattern, you narrow the possible paths that Apache Airflow looks. This lowers your costs when using Secrets Manager with Amazon MWAA.

      To specify a lookup pattern, specify the connections_lookup_pattern and variables_lookup_pattern parameters. These parameters accept a RegEx string as input. For example, to look for secrets that start with test, enter the following for secrets.backend_kwargs:

      { "connections_prefix": "airflow/connections", "connections_lookup_pattern": "^test", "variables_prefix" : "airflow/variables", "variables_lookup_pattern": "^test" }
      Note

      To use connections_lookup_pattern and variables_lookup_pattern, you must install apache-airflow-providers-amazon version 7.3.0 or higher. For more information on updating provder pacakges for to newer versions, see Specifying newer provider packages.

  6. Choose Save.

Step three: Generate an Apache Airflow Amazon connection URI string

TTo create a connection string, use the "tab" key on your keyboard to indent the key-value pairs in the Connection object. We also recommend creating a variable for the extra object in your shell session. The following section walks you through the steps to generate an Apache Airflow connection URI string for an Amazon MWAA environment using Apache Airflow or a Python script.

Apache Airflow CLI

The following shell session uses your local Airflow CLI to generate a connection string. If you don't have the CLI installed, we recommend using the Python script.

  1. Open a Python shell session:

    python3
  2. Enter the following command:

    >>> import json
  3. Enter the following command:

    >>> from airflow.models.connection import Connection
  4. Create a variable in your shell session for the extra object. Substitute the sample values in YOUR_EXECUTION_ROLE_ARN with the execution role ARN, and the region in YOUR_REGION (such as us-east-1).

    >>> extra=json.dumps({'role_arn': 'YOUR_EXECUTION_ROLE_ARN', 'region_name': 'YOUR_REGION'})
  5. Create the connection object. Substitute the sample value in myconn with the name of the Apache Airflow connection.

    >>> myconn = Connection(
  6. Use the "tab" key on your keyboard to indent each of the following key-value pairs in your connection object. Substitute the sample values in red.

    1. Specify the Amazon connection type:

      ... conn_id='aws',
    2. Specify the Apache Airflow database option:

      ... conn_type='mysql',
    3. Specify the Apache Airflow UI URL on Amazon MWAA:

      ... host='288888a0-50a0-888-9a88-1a111aaa0000.a1.us-east-1.airflow.amazonaws.com/home',
    4. Specify the Amazon access key ID (username) to login to Amazon MWAA:

      ... login='YOUR_AWS_ACCESS_KEY_ID',
    5. Specify the Amazon secret access key (password) to login to Amazon MWAA:

      ... password='YOUR_AWS_SECRET_ACCESS_KEY',
    6. Specify the extra shell session variable:

      ... extra=extra
    7. Close the connection object.

      ... )
  7. Print the connection URI string:

    >>> myconn.get_uri()

    You should see the connection URI string in the response:

    'mysql://288888a0-50a0-888-9a88-1a111aaa0000.a1.us-east-1.airflow.amazonaws.com%2Fhome?role_arn=arn%3Aaws%3Aiam%3A%3A001122332255%3Arole%2Fservice-role%2FAmazonMWAA-MyAirflowEnvironment-iAaaaA&region_name=us-east-1'
Python script

The following Python script does not require the Apache Airflow CLI.

  1. Copy the contents of the following code sample and save locally as mwaa_connection.py.

    import urllib.parse conn_type = 'YOUR_DB_OPTION' host = 'YOUR_MWAA_AIRFLOW_UI_URL' port = 'YOUR_PORT' login = 'YOUR_AWS_ACCESS_KEY_ID' password = 'YOUR_AWS_SECRET_ACCESS_KEY' role_arn = urllib.parse.quote_plus('YOUR_EXECUTION_ROLE_ARN') region_name = 'YOUR_REGION' conn_string = '{0}://{1}:{2}@{3}:{4}?role_arn={5}&region_name={6}'.format(conn_type, login, password, host, port, role_arn, region_name) print(conn_string)
  2. Substitute the placeholders in red.

  3. Run the following script to generate a connection string.

    python3 mwaa_connection.py

Step four: Add the variables in Secrets Manager

The following section describes how to create the secret for a variable in Secrets Manager.

To create the secret
  1. Open the Amazon Secrets Manager console.

  2. Choose Store a new secret.

  3. Choose Other type of secret.

  4. On the Specify the key/value pairs to be stored in this secret pane, choose Plaintext.

  5. Add the variable value as Plaintext in the following format.

    "YOUR_VARIABLE_VALUE"

    For example, to specify an integer:

    14

    For example, to specify a string:

    "mystring"
  6. For Encryption key, choose an Amazon KMS key option from the dropdown list.

  7. Enter a name in the text field for Secret name in the following format.

    airflow/variables/YOUR_VARIABLE_NAME

    For example:

    airflow/variables/test-variable
  8. Choose Next.

  9. On the Configure secret page, on the Secret name and description pane, do the following.

    1. For Secret name, provide a name for your secret.

    2. (Optional) For Description, provide a description for your secret.

    Choose Next.

  10. On the Configure rotation - optional leave the default options and choose Next.

  11. Repeat these steps in Secrets Manager for any additional variables you want to add.

  12. On the Review page, review your secret, then choose Store.

Step five: Add the connection in Secrets Manager

The following section describes how to create the secret for your connection string URI in Secrets Manager.

To create the secret
  1. Open the Amazon Secrets Manager console.

  2. Choose Store a new secret.

  3. Choose Other type of secret.

  4. On the Specify the key/value pairs to be stored in this secret pane, choose Plaintext.

  5. Add the connection URI string as Plaintext in the following format.

    YOUR_CONNECTION_URI_STRING

    For example:

    mysql://288888a0-50a0-888-9a88-1a111aaa0000.a1.us-east-1.airflow.amazonaws.com%2Fhome?role_arn=arn%3Aaws%3Aiam%3A%3A001122332255%3Arole%2Fservice-role%2FAmazonMWAA-MyAirflowEnvironment-iAaaaA&region_name=us-east-1
    Warning

    Apache Airflow parses each of the values in the connection string. You must not use single nor double quotes, or it will parse the connection as a single string.

  6. For Encryption key, choose an Amazon KMS key option from the dropdown list.

  7. Enter a name in the text field for Secret name in the following format.

    airflow/connections/YOUR_CONNECTION_NAME

    For example:

    airflow/connections/myconn
  8. Choose Next.

  9. On the Configure secret page, on the Secret name and description pane, do the following.

    1. For Secret name, provide a name for your secret.

    2. (Optional) For Description, provide a description for your secret.

    Choose Next.

  10. On the Configure rotation - optional leave the default options and choose Next.

  11. Repeat these steps in Secrets Manager for any additional variables you want to add.

  12. On the Review page, review your secret, then choose Store.

Sample code

Resources

What's next?