The Redshift integration with Indicative is available for Enterprise customers only. If interested, please contact us. You are required to grant Redshift access to Indicative by creating a standalone VPC Security Group, attaching the Security Group to your Redshift Cluster, and creating a read-only Redshift account for Indicative to use.
If there are additional enrichments required, such as joining with user property tables or deriving custom user_ids, please contact us.
In order to perform the following steps you must have administrative access to the AWS Console as well as your Redshift database.
Start In Indicative
Click on Settings and select Data Sources.
- Click on New Data Source
- Select Amazon Redshift and click Connect
- The following fields can be found by accessing your AWS Console.
*Note: The Auto-Generated password is a password that Indicative has randomly generated. If you prefer to use your own password value, please replace the value in that field to your preferred password.
- Enter the Full JDBC URL by accessing your AWS console and selecting Clusters on the left side navigation. Click on the name of your Redshift Cluster to get this detailed view.
- Enter the Schema. Click here for addition information about schemas
- Enter the Table Name that contains your event data.
- You can use the default indicative Username, or choose to modify that to whatever fits your naming convention.
- Copy the Auto-Generated Password or create your own. This will be the Indicative user password that you will use later on.
- Click Next.
Create the VPC Security Group
The next step is to grant access to your Redshift cluster when accessed from Indicative's IP addresses. This involves creating a new Security Group in your VPC.
2. Click Security Groups on the left side
3. Click Create Security Group
4. Fill out Name tag and copy the Group name and Description from Indicative. Make sure you choose the VPC that also includes your Redshift cluster. Click “Yes, Create” to continue. We recommend using the values below.
5. Add Indicative's IP addresses to the newly created Security Group
a. Select your newly created Security Group
b. Click the Inbound Rules tab
c. Click the Edit button
d. Add the following three rules to allow access to your Redshift cluster to Indicative's IPs:
- Type: Redshift; Source: 184.108.40.206/32
- Type: Redshift; Source: 220.127.116.11/32
- Type: Redshift; Source: 18.104.22.168/32
Attach the Security Group to Your Redshift cluster
2. Click the name of your Redshift cluster
3. Go to Cluster > Modify
4. Select the Indicative security group, in addition to your existing security groups. Also, set "Publicly accessible" to "Yes".
5. When complete, your cluster status should look like this:
Create a Redshift User for Indicative
1. Connect to your Redshift cluster using your existing administrator username and password
2. Create a new user for Indicative
a. In the following SQL statement, replace ‘INSERT_PASSWORD_HERE’ with the password from Auto-Generated Password and execute the SQL command.
CREATE USER indicative WITH PASSWORD 'INSERT_PASSWORD_HERE';
3. Grant access to the Indicative user. Replace placeholder values as necessary
a. For your Redshift schema, run:
GRANT USAGE ON SCHEMA YOUR_SCHEMA_NAME TO indicative;
b. For the tables in your schema you'd like Indicative to access run:
GRANT select ON TABLE YOUR_SCHEMA_NAME.YOUR_TABLE_NAME TO indicative;
c. Alternatively to grant access to all tables in a schema, run:
GRANT select ON ALL TABLES IN SCHEMA YOUR_SCHEMA_NAME TO indicative;
4. Navigate back to the Indicative Integration UI. Click Validate Integration.
For additional advanced settings such as excluding certain events and properties, please refer to this page
If you have any questions or concerns about the above Integration, please contact your Customer Support Manager, or email email@example.com.