Amazon Redshift Connectors > Part III: Data Integration with Amazon Redshift Connector > Introduction to Amazon Redshift Connector > Administration of Amazon Redshift Connector
  

Administration of Amazon Redshift Connector

As a user, you can use Amazon Redshift Connector after the organization administrator ensures that users have access to the Secure Agent directory that contains the success and error files. This directory path must be the same on each Secure Agent machine in the runtime environment. The organization administrator must also perform the following tasks:

Configure Amazon Redshift Connector for SSL

You can configure the Secure Agent to support an SSL connection to Amazon Redshift.
    1Download the Amazon Redshift certificate from the following location: https://s3.amazonaws.com/redshift-downloads/redshift-ssl-ca-cert.pem.
    2Run the following command to add the certificate file to the key store: ${JAVA_HOME}/bin/keytool –keystore {JAVA_HOME}/lib/security/cacerts -import -alias <string_value> -file <certificate_filepath>.
    3In Administrator, select Runtime Environments.
    4Select the Secure Agent for which you want to increase memory from the list of available Secure Agents.
    5In the upper-right corner, click Edit.
    6In the System Configuration Details section, change the Type to DTM.
    7Click the Edit Agent Configuration icon next to JVMOption1 and add the following command: - Djavax.net.ssl.trustStore=<keystore_name>.
    8Click the Edit Agent Configuration icon next to JVMOption2 and add the following command:- Djavax.net.ssl.trustStorePassword=<password>.
    9Add the following parameter to the JDBC URL you specified in your Amazon Redshift connection properties: ssl=true. For example, jdbc:redshift://mycluster.xyz789.us-west- 2.redshift.amazonaws.com:5439/dev?ssl=true.
    10Click OK to save your changes.

Create a minimal Amazon IAM policy

Create an Amazon IAM policy and define the required permissions to stage the data in Amazon S3 when you want to read data from and write data to Amazon Redshift.
Use the following minimum required permissions to stage the data in Amazon S3:
You can use the following sample Amazon IAM policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObject",
"s3:ListBucket",
"s3:GetBucketPolicy"
],
"Resource": [
"arn:aws:s3:::<bucket_name>/*",
"arn:aws:s3:::<bucket_name>"
]
}
]
}
You must make sure that the Amazon S3 bucket and Amazon Redshift cluster reside in the same region to run a session successfully.
The supported regions are:

IAM authentication

Optional. You can configure IAM authentication when on an Amazon Elastic Compute Cloud (EC2) system. Use IAM authentication for secure and controlled access to Amazon Redshift resources when you run
Use IAM authentication when you want to run a on an EC2 system. Perform the following steps to configure IAM authentication:
  1. 1Create a minimal Amazon IAM policy. For more information, see Create a minimal Amazon IAM policy.
  2. 2Create the Amazon EC2 role. Associate the minimal Amazon IAM policy while creating the EC2 role. The Amazon EC2 role is used when you create an EC2 system in the Redshift cluster. For more information about creating the Amazon EC2 role, see the AWS documentation.
  3. 3Create an EC2 instance. Assign the Amazon EC2 role that you created in step #2 to the EC2 instance.
  4. 4Create the Amazon Redshift Role ARN for secure access to Amazon Redshift resources. Associate the minimal Amazon IAM policy while creating the Amazon Redshift role. You can use the Amazon Redshift Role ARN in the UNLOAD and COPY commands. For more information about creating the Amazon Redshift Role ARN, see the AWS documentation.
  5. 5Add the Amazon Redshift Role ARN to the Amazon Redshift cluster to successfully perform the read and write operations. For more information about adding the Amazon Redshift Role ARN to the Amazon Redshift cluster, see the AWS documentation.
  6. 6Install the on the EC2 system.