Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange for Amazon Redshift
  3. PowerExchange for Amazon Redshift Configuration
  4. Amazon Redshift Sources and Targets
  5. Amazon Redshift Mappings
  6. Amazon Redshift Pushdown Optimization
  7. Amazon Redshift Sessions
  8. Appendix A: Amazon Redshift Data Type Reference
  9. Appendix B: Troubleshooting

PowerExchange for Amazon Redshift User Guide for PowerCenter

PowerExchange for Amazon Redshift User Guide for PowerCenter

Prerequisites

Prerequisites

Before you can use PowerExchange for Amazon Redshift, perform the following tasks:
  1. Install or upgrade to PowerCenter 10.2.
  2. Verify that you can connect to Amazon Redshift with an SQL client that uses the PostgreSQL driver.
    For example, you can use SQL Workbench/J to connect to Amazon Redshift.
  3. Verify that you have read, write, and execute permissions on the following directories:
    <PowerCenter Installation Directory>/server/bin
  4. Verify that you have read and write permissions on the following directories:
    <PowerCenter Client Installation Directory>/Clients/PowerCenterClient/client/bin
The organization administrator must also perform the following tasks:
  • Mandatory. Get the Amazon Redshift JDBC URL.
  • Mandatory. Manage Authentication. Use either of the following two methods:
    • Create an Access Key ID and Secret Access Key. Applicable when the PowerCenter client is not installed on Amazon Elastic Compute Cloud (EC2) system. Provide the values for Access Key ID and Secret Access Key when you configure the Amazon Redshift connection.
    • Configure AWS Identity and Access Management (IAM) Authentication. For enhanced security. Applicable when you install the PowerCenter client on Amazon EC2 system and you want to run
      sessions
      on the EC2 system. If you use IAM authentication, do not provide Access Key ID and Secret Access Key explicitly in the Amazon Redshift connection. Instead, you must create an Redshift Role Amazon Resource Name (ARN), add the minimal Amazon S3 bucket policy to the Redshift Role ARN, and add the Redshift Role ARN to the Redshift cluster. For more information, see
      IAM Authentication
      section.
      Provide the Redshift Role ARN in the AWS_IAM_ROLE option in the UNLOAD and COPY commands when you create a session.
      If you specify both, Access Key ID and Secret Access Key in the connection properties and AWS_IAM_ROLE in the UNLOAD and COPY commands, AWS_IAM_ROLE takes the precedence.
      You must add IAM EC2 role and IAM Redshift role to the customer master key when you use IAM authentication and server-side encryption using customer master key.
  • Optional. Create an Amazon Redshift master symmetric key to enable client-side encryption.
  • Optional. Create an AWS Key Management Service (AWS KMS)-managed customer master key to enable server-side encryption.

0 COMMENTS

We’d like to hear from you!