Amazon S3 for Redshift
As discussed in cloud bucket storage setup, Amazon S3 is required for several data-related use cases in Sortment.
In AWS, accessing S3 via Redshift requires IAM Role ARN to prevent exposing user or access key details via SQL query.
For APIs, access is managed via Access Keys.
Connection configuration
Following details are requied on Sortment for S3 connection for Redshift:
AWS Region: The geographical region where your AWS services, including S3 and Redshift, are deployed. Examples include us-east-1 (N. Virginia) or ap-south-1 (Mumbai). In your AWS Console → Click on your profile (top-right) → See the selected region.
AWS S3 Bucket Name: A globally unique name assigned to an S3 bucket where you store and retrieve data. On AWS Console → Go to S3 → Locate your bucket under “Buckets” list.
Access Key ID: A unique identifier for an AWS IAM user or service that allows programmatic access to AWS services. On AWS Console → IAM → Users → Select your user → Security Credentials tab → Generate Access Key.
Secret Access Key: A secret key paired with the Access Key ID, used for signing API requests securely. Generated alongside the Access Key ID in IAM (only shown once). If lost, you must generate a new pair.
IAM Role ARN: A unique identifier for an IAM Role that allows Redshift to interact with S3. On AWS Console → IAM → Roles → Find your role → Copy the Role ARN.
AWS credentials setup
This region for S3 Bucket should be same as your Redshift region for lower data egress costs.
Follow these steps to setup an S3 bucket for Sortment:
Creating a bucket
Sign in to the AWS Management Console and navigate to the S3 service.
Click on "Create bucket."
Enter a unique bucket name (globally unique across AWS).
Select an AWS region for the bucket. This should be same as your Redshift cluster region.
Create the bucket.
Creating a policy
From your AWS console navigate to Identity and Access Management (IAM) > Access Management > Policies
In the JSON policy editor, use the following policy. Update
{$bucket-name}
to the bucket created above. Give your policy a name and create the policy.
Creating a role
Now, navigate to Identity and Access Management (IAM) > Access Management > Roles and click Create Role.
Give access to the policy created for Sortment.
Next, setup the name and description and create the role.
Copy the role ARN. This will be used in S3 setup form on Sortment.
Associating role with your Redshift cluster
In Amazon Redshift console, choose Clusters, then choose the name of the cluster that you want to update.
In Actions dropdown, choose Manage IAM roles to display the current list IAM roles associated with the cluster.
On the Manage IAM roles page, choose the IAM role created earlier and then choose Add IAM role.
Save your changes to modify the cluster and allow Redshift access to the S3 bucket.
Configuring Access Key
The Access Key access type allows you to configure Sortment to use an IAM user by providing the user's Access Key ID and Secret Access Key.
If you need help generating these keys, consult the IAM article on this topic.
Once you have an Access Key ID and Secret Access Key, paste those values into the form and click Create.
Last updated
Was this helpful?