The Redshift integration with Indicative is available for Enterprise customers only. If interested, please contact us. You are required to grant Redshift access to Indicative by creating a standalone VPC Security Group, attaching the Security Group to your Redshift Cluster, and creating a read-only Redshift account for Indicative to use.
In order to perform the following steps you must have administrative access to the AWS Console as well as your Redshift database.
Start In Indicative
Click on Settings and select Data Sources.
- Click on New Data Source
- Select Amazon Redshift and click Next
- The following fields can be found by accessing your AWS Console.
*Note: The Auto-Generated password is a password that Indicative has randomly generated. If you prefer to use your own password value, please replace the value in that field to your preferred password.
- Enter the Full JDBC URL by accessing your AWS console and selecting Clusters on the left side navigation. Click on the name of your Redshift Cluster to get this detailed view.
- Enter the Schema. Click here for addition information about schemas
- Copy the Auto-Generated Password or create your own. This will be the Indicative user password that you will use later on.
- Click Next.
Create the VPC Security Group
The next step is to grant access to your Redshift cluster when accessed from Indicative's IP addresses. This involves creating a new Security Group in your VPC.
2. Click Security Groups on the left side
3. Click Create Security Group
4. Fill out Name tag and copy the Group name and Description from Indicative. Make sure you choose the VPC that also includes your Redshift cluster. Click “Yes, Create” to continue. We recommend using the values below.
5. Add Indicative's IP addresses to the newly created Security Group
a. Select your newly created Security Group
b. Click the Inbound Rules tab
c. Click the Edit button
d. Add the following two rules to allow access to your Redshift cluster to Indicative's IPs:
- Type: Redshift; Source: 184.108.40.206/32
- Type: Redshift; Source: 220.127.116.11/32
Attach the Security Group to Your Redshift cluster
2. Click the name of your Redshift cluster
3. Go to Cluster > Modify
4. Select the Indicative security group, in addition to your existing security groups. Also, set "Publicly accessible" to "Yes".
5. When complete, your cluster status should look like this:
Create a Redshift User for Indicative
1. Connect to your Redshift cluster using your existing administrator username and password
2. Create a new user for Indicative
a. In the following SQL statement, replace ‘INSERT_PASSWORD_HERE’ with the password from Auto-Generated Password and execute the SQL command.
CREATE USER indicative WITH PASSWORD 'INSERT_PASSWORD_HERE';
3. Grant access to the Indicative user. Replace placeholder values as necessary
a. For your Redshift schema, run:
GRANT USAGE ON SCHEMA YOUR_SCHEMA_NAME TO indicative;
b. For the tables in your schema you'd like Indicative to access run:
GRANT select ON TABLE YOUR_SCHEMA_NAME.YOUR_TABLE_NAME TO indicative;
c. Alternatively to grant access to all tables in a schema, run:
GRANT select ON ALL TABLES IN SCHEMA YOUR_SCHEMA_NAME TO indicative;
4. Navigate back to the Indicative Integration UI. Click Validate Integration.
5. If the validation is successful, you will see a screen to schedule a call with an Indicative specialist. Please select a date and time and enter in your contact info.
6. Grant Indicative the necessary information to move forward with your integration by completing this Data Integration Questionnaire.
If you have any questions or concerns about the above Integration, please contact your Customer Support Manager, or email email@example.com.