In this section of the walkthrough, we’ll edit the access rules for the security group associated with the cluster we created. To do this, we’ll whitelist the Stitch IP addresses, along with any other appropriate IPs from your company.
- From the Redshift Dashboard, click the Clusters option on the left side of the page.
- In the list of clusters, click the name of the cluster you created.
- The Cluster Details page will display - ensure you’re in the Configuration tab before proceeding.
- In the VPC Security Groups section, click the name of the security group. In our case, it's default.
- After the security group opens, click the Inbound tab located towards the bottom of the page, then the Edit button:
Click for a closer look!
- The Inbound Rules tab is where we’ll add the IP addresses that can access the cluster:
Click the Add Rule button to add another security rule.
Repeat this process until all the Stitch IP addresses (along with any others) are added to the security group.
When finished adding IP addresses, click Save.
- Type - Set this to Redshift.
- Protocol - This will default to TCP - leave it as-is.
- Port Range - Enter the number of port associated with the cluster - this is the same port you used to create the cluster. The default for Redshift is 5439.
- Source - Paste the IP address that requires access to the cluster in this field. Below are Stitch IP addresses that must be added to the security group:
- Here's what the rule should look like:
Click for a closer look.
In addition, if you want to name the group something more specific, click in the Name tag column in the VPC Security Groups table. A window will display where you can rename the group:
What Do I Do Now?
Great! Now that you're done configuring the authorization settings, the next step is to test the connection.
Next: Test the Connection
Previous: Configure the Cluster