AWS Redshift Integration


The Redshift integration with Indicative is available for Enterprise customers only. If interested, please contact us. You are required to grant Redshift access to Indicative by creating a standalone VPC Security Group, attaching the Security Group to your Redshift Cluster, and creating a read-only Redshift account for Indicative to use.

If there are additional enrichments required, such as joining with user property tables or deriving custom user_ids, please contact us.


In order to perform the following steps you must have administrative access to the AWS Console as well as your Redshift database.

Start In Indicative

  1. Click on Settings and select Data Sources.


  2. Click on New Data Sourcedatasources.png
  3. Select Amazon Redshift and click Connect

Connection Informationmceclip0.png

  1. The following fields can be found by accessing your AWS Console.
    *Note: The Auto-Generated password is a password that Indicative has randomly generated. If you prefer to use your own password value, please replace the value in that field to your preferred password.
  2. Enter the Full JDBC URL by accessing your AWS console and selecting Clusters on the left side navigation. Click on the name of your Redshift Cluster to get this detailed view.
  3. Enter the Schema. Click here for addition information about schemas
  4. Enter the Table Name that contains your event data.
  5. You can use the default indicative Username, or choose to modify that to whatever fits your naming convention.
  6. Copy the Auto-Generated Password or create your own. This will be the Indicative user password that you will use later on.
  7. Click Next. 

Create Security Group

The next step is to grant access to your Redshift cluster when accessed from Indicative's IP addresses. This involves creating a new Security Group in your VPC.


1. Go to

2. Click Security Groups on the left side

3. Click Create Security Group

4. Fill out Name tag and copy the Group name and Description from Indicative.  Make sure you choose the VPC that also includes your Redshift cluster. Click “Yes, Create” to continue.  We recommend using the values below.


5. Add Indicative's IP addresses to the newly created Security Group

a. Select your newly created Security Group


b. Click the Inbound Rules tab

c. Click the Edit button

d. Add the following three rules to allow access to your Redshift cluster to Indicative's IPs:

  • Type: Redshift; Source:
  • Type: Redshift; Source:
  • Type: Redshift; Source:
  • Type: Redshift; Source:

Prepare Redshift Cluster

1. Go to

2. Click the name of your Redshift cluster


3. Go to Cluster > Modify


4. Select the Indicative security group, in addition to your existing security groups.

5. Set "Publicly accessible" to "Yes".


6. Select an Elastic IP from the list.

7. When complete, your cluster status should look like this:


Grant Permissions


1. Connect to your Redshift cluster using your existing administrator username and password


2. Create a new user for Indicative

a. Copy the Create a new user for Indicative command from the Indicative screen and execute the SQL command.

3. Grant access to the Indicative user. 

a. For your Redshift schema, copy the For your Redshift Schema command from Indicative and execute the SQL command.

b. For the tables in your schema you'd like Indicative to access copy the Grant Specific Tables command from Indicative and execute the SQL command.

c. Alternatively to grant access to all tables in a schema, copy the Grant All Tables command from Indicative and execute the SQL command.


Event Modeling



  1. Events Field - enter the name of the field that should be used to derive your Indicative event names
  2. Timestamp - enter the name of the field that should be used for querying in Indicative.
  3. Click Next

User Modeling

For more information on User Identification (Aliasing), please refer to this article.

  1. If you choose to enable Aliasing:
    1. Unauthenticated ID - Input the field used to identify anonymous users.
    2. Authenticated ID - Input the field used to identify known users.
  2. I you choose to disable Aliasing, press Disabled:
    1. Unauthenticated ID - Enter the field used to identify your users. All users must have a value for this field.
  3.  Press Next


  1. Select the Schedule Interval to adjust the frequency at which new data is available in Indicative.
  2. Set the Schedule Time for when the data should be extracted from your BigQuery environment. It is critical that 100% of the data is available by this time to avoid loading partial data.
  3. Select Save

Waiting for Data

Once you see this screen, you're all set! A Solutions Engineer will begin preparing your data, and you should be notified via email when ready.

Advanced Settings

For additional advanced settings such as excluding certain events and properties, please refer to this page


If you have any questions or concerns about the above Integration, please contact your Customer Support Manager, or email



3 users found this helpful