Integrating with Redshift
Last updated
Was this helpful?
Last updated
Was this helpful?
To connect Redshift to Drivetrain, you need the following:
Access to the AWS console
A Redshift cluster
SELECT
access granted for the following tables:
PG_CLASS
PG_NAMESPACE
PG_DATABASE
STV_TBL_PERM
Connect directly
Connect using private networking
In Drivetrain, go to Data > New Data Source > Redshift > Connect and:
Enter the Redshift cluster Host name.
In the Port field, enter the port number for the corresponding host name.
Enter the corresponding Database name.
Enter the User name for the Redshift cluster.
Enter the Password.
Choose a Connection method: DIRECTLY or PRIVATE NETWORKING.
Click Save and Test. Your Redshift connector is now connected!
Drivetrain uses Fivetran for the Redshift connection. Please configure your firewall and/or other access control systems to allow incoming connections to your host and port from these IPs for your region:
US
us-east-1 (N. Virginia)
Default region
3.239.194.48/29
3.239.194.48 - 3.239.194.55
US
us-east-2 (Ohio)
3.145.219.16/29
3.145.219.16 - 3.145.219.23
US
us-west-2 (Oregon)
35.80.36.104/29
35.80.36.104 - 35.80.36.111
US
us-gov-west-1 (GovCloud US West)
3.30.186.152/29
3.30.186.152 - 3.30.186.159
Canada
ca-central-1 (Montréal)
Default region
3.99.193.224/29
3.99.193.224 - 3.99.193.231
EU
eu-west-1 (Dublin)
3.251.214.192/29
3.251.214.192 - 3.251.214.199
EU
eu-central-1 (Frankfurt)
Default region
3.67.81.32/29
3.67.81.32 - 3.67.81.39
Australia
ap-southeast-2 (Sydney)
Default region
3.26.88.224/29
3.26.88.224 - 3.26.88.231
UK
eu-west-2 (London)
Default region
18.168.224.40/29
18.168.224.40 - 18.168.224.47
India
ap-south-1 (Mumbai)
Default region
3.111.138.160/29
3.111.138.160 - 3.111.138.167
Singapore
ap-southeast-1 (Singapore)
Default region
18.143.203.104/29
18.143.203.104 - 18.143.203.111
Japan
ap-northeast-1 (Tokyo)
Default region
43.207.101.168/29
43.207.101.168 - 43.207.101.175
If you connect directly, create a rule in a security group that allows access to your Redshift instance and port from the IPs listed in the .
AWS PrivateLink allows VPCs and AWS-hosted or on-premises services to communicate with one another without exposing traffic to the public internet. PrivateLink is the most secure connection method. Learn more in .
Configure your firewall and/or other access control systems to allow incoming connections to your host and port from IPs for your region ().