Amazon S3 for Redshift
Last updated
Was this helpful?
Last updated
Was this helpful?
As discussed in , Amazon S3 is required for several data-related use cases in Sortment.
In AWS, accessing S3 via Redshift requires IAM Role ARN to prevent exposing user or access key details via SQL query.
For APIs, access is managed via Access Keys.
Following details are requied on Sortment for S3 connection for Redshift:
AWS Region: The geographical region where your AWS services, including S3 and Redshift, are deployed. Examples include us-east-1 (N. Virginia) or ap-south-1 (Mumbai). In your → Click on your profile (top-right) → See the selected region.
AWS S3 Bucket Name: A globally unique name assigned to an S3 bucket where you store and retrieve data. On → Go to S3 → Locate your bucket under “Buckets” list.
Access Key ID: A unique identifier for an AWS IAM user or service that allows programmatic access to AWS services. On → IAM → Users → Select your user → Security Credentials tab → Generate Access Key.
Secret Access Key: A secret key paired with the Access Key ID, used for signing API requests securely. Generated alongside the Access Key ID in IAM (only shown once). If lost, you must generate a new pair.
IAM Role ARN: A unique identifier for an IAM Role that allows Redshift to interact with S3. On → IAM → Roles → Find your role → Copy the Role ARN.
This region for S3 Bucket should be same as your Redshift region for lower data egress costs.
Follow these steps to setup an S3 bucket for Sortment:
Click on "Create bucket."
Enter a unique bucket name (globally unique across AWS).
Select an AWS region for the bucket. This should be same as your Redshift cluster region.
Create the bucket.
From your AWS console navigate to Identity and Access Management (IAM) > Access Management > Policies
In the JSON policy editor, use the following policy. Update {$bucket-name}
to the bucket created above. Give your policy a name and create the policy.
Now, navigate to Identity and Access Management (IAM) > Access Management > Roles and click Create Role.
Give access to the policy created for Sortment.
Next, setup the name and description and create the role.
Copy the role ARN. This will be used in S3 setup form on Sortment.
In Amazon Redshift console, choose Clusters, then choose the name of the cluster that you want to update.
In Actions dropdown, choose Manage IAM roles to display the current list IAM roles associated with the cluster.
On the Manage IAM roles page, choose the IAM role created earlier and then choose Add IAM role.
Save your changes to modify the cluster and allow Redshift access to the S3 bucket.
The Access Key access type allows you to configure Sortment to use an IAM user by providing the user's Access Key ID and Secret Access Key.
Once you have an Access Key ID and Secret Access Key, paste those values into the form and click Create.
Sign in to the AWS Management Console and .
If you need help generating these keys, consult the on this topic.