Integrating Gumloop with Amazon Athena Data via CData Connect AI
Gumloop is a visual automation platform designed to create AI-powered workflows by combining triggers, AI nodes, APIs, and data connectors. By integrating Gumloop with CData Connect AI through the built-in MCP (Model Context Protocol) Server, workflows can seamlessly access and interact with live Amazon Athena data.
The platform provides a low-code environment, making it easier to orchestrate complex processes without heavy development effort. Its flexibility allows integration across multiple business applications, enabling end-to-end automation with live data.
This article outlines the steps required to configure Amazon Athena connectivity in Connect AI, register the MCP server in Gumloop, and build a workflow that queries Amazon Athena data.
About Amazon Athena Data Integration
CData provides the easiest way to access and integrate live data from Amazon Athena. Customers use CData connectivity to:
- Authenticate securely using a variety of methods, including IAM credentials, access keys, and Instance Profiles, catering to diverse security needs and simplifying the authentication process.
- Streamline their setup and quickly resolve issue with detailed error messaging.
- Enhance performance and minimize strain on client resources with server-side query execution.
Users frequently integrate Athena with analytics tools like Tableau, Power BI, and Excel for in-depth analytics from their preferred tools.
To learn more about unique Amazon Athena use cases with CData, check out our blog post: https://www.cdata.com/blog/amazon-athena-use-cases.
Getting Started
Step 1: Configure Amazon Athena Connectivity for Gumloop
Connectivity to Amazon Athena from Gumloop is made possible through CData Connect AI's Remote MCP Server. To interact with Amazon Athena data from Gumloop, we start by creating and configuring a Amazon Athena connection in CData Connect AI.
- Log into Connect AI, click Sources, and then click Add Connection
- Select "Amazon Athena" from the Add Connection panel
-
Enter the necessary authentication properties to connect to Amazon Athena.
Authenticating to Amazon Athena
To authorize Amazon Athena requests, provide the credentials for an administrator account or for an IAM user with custom permissions: Set AccessKey to the access key Id. Set SecretKey to the secret access key.
Note: Though you can connect as the AWS account administrator, it is recommended to use IAM user credentials to access AWS services.
Obtaining the Access Key
To obtain the credentials for an IAM user, follow the steps below:
- Sign into the IAM console.
- In the navigation pane, select Users.
- To create or manage the access keys for a user, select the user and then select the Security Credentials tab.
To obtain the credentials for your AWS root account, follow the steps below:
- Sign into the AWS Management console with the credentials for your root account.
- Select your account name or number and select My Security Credentials in the menu that is displayed.
- Click Continue to Security Credentials and expand the Access Keys section to manage or create root account access keys.
Authenticating from an EC2 Instance
If you are using the CData Data Provider for Amazon Athena 2018 from an EC2 Instance and have an IAM Role assigned to the instance, you can use the IAM Role to authenticate. To do so, set UseEC2Roles to true and leave AccessKey and SecretKey empty. The CData Data Provider for Amazon Athena 2018 will automatically obtain your IAM Role credentials and authenticate with them.
Authenticating as an AWS Role
In many situations it may be preferable to use an IAM role for authentication instead of the direct security credentials of an AWS root user. An AWS role may be used instead by specifying the RoleARN. This will cause the CData Data Provider for Amazon Athena 2018 to attempt to retrieve credentials for the specified role. If you are connecting to AWS (instead of already being connected such as on an EC2 instance), you must additionally specify the AccessKey and SecretKey of an IAM user to assume the role for. Roles may not be used when specifying the AccessKey and SecretKey of an AWS root user.
Authenticating with MFA
For users and roles that require Multi-factor Authentication, specify the MFASerialNumber and MFAToken connection properties. This will cause the CData Data Provider for Amazon Athena 2018 to submit the MFA credentials in a request to retrieve temporary authentication credentials. Note that the duration of the temporary credentials may be controlled via the TemporaryTokenDuration (default 3600 seconds).
Connecting to Amazon Athena
In addition to the AccessKey and SecretKey properties, specify Database, S3StagingDirectory and Region. Set Region to the region where your Amazon Athena data is hosted. Set S3StagingDirectory to a folder in S3 where you would like to store the results of queries.
If Database is not set in the connection, the data provider connects to the default database set in Amazon Athena.
- Click Save & Test
-
Navigate to the Permissions tab in the Add Amazon Athena Connection page and update the User-based permissions.
Add a Personal Access Token
A Personal Access Token (PAT) is used to authenticate the connection to Connect AI from Gumloop. It is best practice to create a separate PAT for each service to maintain granularity of access.
- Click on the Gear icon () at the top right of the Connect AI app to open the settings page.
- On the Settings page, go to the Access Tokens section and click Create PAT.
-
Give the PAT a name and click Create.
- The personal access token is only visible at creation, so be sure to copy it and store it securely for future use.
With the Amazon Athena connection configured and a PAT generated, Gumloop is prepared to connect to Amazon Athena data through the CData MCP server.
Step 2: Connect to the MCP server in Gumloop
The MCP server endpoint and authentication values from Connect AI must be added to Gumloop credentials.
- Sign in to Gumloop and create an account
- Visit the Gumloop Credentials page to configure MCP server
- Click on Add Credentials and search and select MCP Server
- Provide the following details:
- URL: https://mcp.cloud.cdata.com/mcp
- Label: A descriptive name such as Amazon Athena-mcp-server
- Access Token / API Key: leave blank
- Additional Header: Authorization: Basic YOUR EMAIL:YOUR PAT
- Save the credentials
The MCP server is now available to build workflows in Gumloop.
Step 3: Build a workflow and explore live Amazon Athena data with Gumloop
- Visit Gumloop Personal workspace and click on the Create Flow
- Select the icon or press Ctrl + B to add a node or a subflow
- Search for Ask AI and select it
- Click Show More Options and enable the Connect MCP Server? option
- From the MCP Servers dropdown, choose the saved MCP credential
- Add a Prompt and Choose an AI Model according to your requirements
- After configuring the required details, Click Run to run the pipeline
With the workflow run completed, Gumloop demonstrates successful retrieval of Amazon Athena data through the CData Connect AI MCP server, with the MCP Client node providing the ability to ask questions, retrieve records, and perform actions on the data.
Get CData Connect AI
To get live data access to 300+ SaaS, Big Data, and NoSQL sources directly from your cloud applications, try CData Connect AI today!