AWS Glue Studio - working with AWS RDS

   Go back to the Task List

  « 2. Create IAM Role    4. Launch RDS Instance »

3. Create Security Group and S3 Bucket

Let’s create a Security Group which is used by the MySQL Database Instance and AWS Glue Connection. You also create S3 bucket which is used as the destination location for the Glue job.

  1. Goto VPC Management Console. Click on the Security Groups menu in the left and then click on the Create security group button.

    AWS Glue DataBrew

  2. On the next screen, type in dojo-mysql-sg for the security group name and the description fields. Select the default VPC for the VPC field. Create inbound rule for MYSQL/Aurora for Source = 0.0.0.0/0. Keep rest of the configuration to the default. Click on the Create security group button.

    AWS Glue DataBrew

  3. The security group is created in no time. Once the security group is created, update the inbound rule to allow All TCP type communication from the security group itself (self-referencing) as shown below.

    AWS Glue DataBrew

  4. You then create a S3 bucket with the name dojo-target-bucket which will work as the destination for the Glue Job. If the bucket name is not available, create with a name which is available.

    AWS Glue DataBrew

  5. The Next step is to launch Aurora / MySQL database instance.