Setup
Step 1: Gather cluster information
- Log into AWS Management Console
- Navigate to Amazon Redshift → Clusters
- Select your cluster
- Note the following:
- Endpoint: e.g.,
mycluster.abc123.us-west-2.redshift.amazonaws.com - Port: Usually
5439 - Database: Your database name
- Endpoint: e.g.,
Step 2: Configure network access
Choose one of the following connection methods:Option 1: Direct IP Access
Allow ClarityQ to connect by configuring your security group:- Navigate to EC2 → Security Groups
- Find the security group attached to your Redshift cluster
- Add an inbound rule:
- Type: Custom TCP
- Port: 5439
- Source: Add these ClarityQ IP addresses:
44.218.213.7554.161.37.10754.208.212.67
Option 2: AWS PrivateLink
Establish a private connection without exposing traffic to the public internet: Step 2a: Create a Network Load Balancer (if you don’t have one) If you don’t already have a Network Load Balancer for your Redshift cluster:-
Navigate to EC2 Load Balancers
- In AWS Console, search for “EC2” and select EC2
- In the left navigation pane, under Load Balancing, click Load Balancers
-
Create Network Load Balancer
- Click Create Load Balancer
- Select Network Load Balancer and click Create
-
Configure Load Balancer
- Load balancer name: Enter a name (e.g.,
redshift-nlb) - Scheme: Select Internal (for private connectivity)
- IP address type: Select IPv4
- VPC: Choose the same VPC as your Redshift cluster
- Availability Zones: Select the subnets where your Redshift cluster is accessible
- Load balancer name: Enter a name (e.g.,
-
Configure Listener
- Protocol: TCP
- Port: 5439 (Redshift default port)
- Target group: Create a new target group with:
- Target type: IP addresses
- Protocol: TCP
- Port: 5439
- VPC: Same as your Redshift cluster
- Add your Redshift cluster’s IP as a target
-
Create the Load Balancer
- Review settings and click Create load balancer
- Wait for it to become Active (takes a few minutes)
-
Open AWS Console and navigate to VPC
- Go to AWS Management Console
- In the search bar, type “VPC” and select VPC
-
Access Endpoint Services
- In the left navigation pane, scroll down to Virtual private cloud
- Click Endpoint services
-
Create the Endpoint Service
- Click Create endpoint service
-
Configure the Endpoint Service
- Service name: Leave this empty (AWS will auto-generate)
- Load balancer type: Select Network
- Available load balancers: Choose your Network Load Balancer from Step 2a
- Require acceptance for endpoint: Check this box (recommended for security)
- Supported IP address types: Select IPv4 (default)
-
Review and Create
- Click Create endpoint service
- AWS will generate a service name in the format:
com.amazonaws.vpce.<region>.vpce-svc-<id> - Important: Copy this service name - you’ll need it for Step 2d
- In your Endpoint Service settings, add ClarityQ’s AWS account as “Allow principals”:
- Service name: Your endpoint service name
- AWS Region: The region where your service is located
- Cluster details: Endpoint, port, database name, and schema
Step 3: Create a dedicated user
Connect to your Redshift cluster and create a service account:Step 4: Grant database permissions
Configure the required permissions for ClarityQ to connect, discover schemas, and query your data:Step 5: Configure connection in ClarityQ
In the ClarityQ interface, fill out the connection form with the following fields:For Option 1 (Direct IP Access):
Basic Fields:- Connection Name: Choose a name for this connection (e.g., “Production Redshift”)
- Host: Your Redshift cluster endpoint (e.g.,
mycluster.abc123.us-west-2.redshift.amazonaws.com) - Port:
5439(default, pre-filled) - Database: Your database name (e.g.,
analytics_db) - User:
clarityq_user(the user you created in Step 3) - DB Schema:
public(default, pre-filled)
For Option 2 (AWS PrivateLink):
Basic Fields:- Connection Name: Choose a name for this connection (e.g., “Production Redshift PrivateLink”)
- Host: The DNS name of your VPC Endpoint Service (e.g.,
com.amazonaws.vpce.us-west-2.vpce-svc-abc123def456.us-west-2.vpce.amazonaws.com) - Port:
5439(default, pre-filled) - Database: Your database name (e.g.,
analytics_db) - User:
clarityq_user(the user you created in Step 3) - DB Schema:
public(default, pre-filled)
Authentication Method (for both options)
Choose one of the following by toggling “Use IAM Authentication”: Password Authentication (default):- Password: Enter the password you set for
clarityq_user
- Cluster Identifier: Your Redshift cluster name (e.g.,
mycluster) - Region: AWS region (e.g.,
us-west-2) - Access Key ID: AWS access key from Step 4 (Method 2)
- Secret Access Key: AWS secret key from Step 4 (Method 2)
IAM authentication setup
For enhanced security, configure IAM-based authentication:Step 1: Create IAM policy
Create a policy for Redshift access:Step 2: Attach policy to IAM user or role
- Create or select an IAM user/role
- Attach the policy created above
- Generate access keys if using IAM user
Step 3: Configure in ClarityQ
Use the IAM configuration with:cluster_identifier: Your cluster nameregion: AWS regionaccess_key_idandsecret_access_key: AWS credentials for the IAM user/role with the policy created above