Configure secure database connections for AWS RDS, Aurora, and other AWS-managed databases
bytebase-role
bytebase-role
bytebase-role
→ Update IAM roleREGION
, ACCOUNT_ID
, and DB_RESOURCE_ID
with your values. Find DB_RESOURCE_ID in RDS console → Configuration tab. For easier setup, you can use wildcards: arn:aws:rds-db:*:*:dbuser:*/*
Reference: IAM policy examples
bytebase
AWS RDS IAM
REGION
, ACCOUNT_ID
, and SECRET_NAME
with your values. For easier setup, you can use wildcards: arn:aws:secretsmanager:*:*:secret:*
Reference: Secrets Manager IAM permissions
DB_PASSWORD
, Value = your passwordbytebase-db-password
)DB_PASSWORD
rds_superuser
.
cloudsqlsuperuser
.
GRANT role_name TO bytebase;
for all existing roles. Otherwise, Bytebase may not access existing databases or tables.rds-db:connect
permissionssecretsmanager:GetSecretValue
permission