Redshift, created by AWS, is an ideal database for storing large volumes of data. It was developed using Postgres itself (one of the best-known general-purpose databases), but it has a columnar architecture that offers incredible processing speed.
SSH pipeline differs from traditional pipeline in that it connects to the database through an intermediate server, also called a tunnel or bastion.
In this article, we'll show you how to register a Redshift SSH database as a destination on Kondado's platform.
3) Fill in your database information as shown below:
- Name: This is the internal description of your destination on the Kondado platform
- Server Address: The address of your database's intermediary server
- Server Port: The passthru server port for your database
- Server User: The database passthru server user
- Server PEM Key: The text of the file with the PEM key
- Database address: Your cluster's server address (can be found on your cluster's AWS page under General information > Endpoint)
- Database port: Your cluster's port (can be found on your cluster's AWS page under Properties > Database configurations > Port)
- Database User: the username that Kondado will use to enter data into your cluster. This user must have DROP, INSERT, CREATE, ALTER, SELECT and DELETE permissions on tables and schemas (can be found on your cluster's AWS page under Properties > Database configurations > Admin user name)
- Database Password: The cluster user's password
- Database: the database name (can be found on your cluster's AWS page under Properties > Database configurations > Database name)
- Schema: inform a schema or leave the default “public” [1]
- Click save and your new destination will be created!
[1] Kondado will try to create the schema with the value informed in the “schema” parameter and if this is not possible (for example, due to lack of permission), the public schema will be used. Even if the schema already exists, Kondado must have permission to create schemas (“GRANT CREATE ON DATABASE db TO user”) if you do not want to use the public schema. For existing schemas, it is also important that the user registered at Kondado has permission to use the schema (“GRANT USAGE ON SCHEMA schema_name TO user;”)
Add Redshift SSH as a Destination on Kondado
Register a Redshift database that connects through an SSH tunnel (bastion server) as a destination in Kondado.
Prepare network access and permissions
Before starting, ensure your Redshift cluster and bastion server allow connections from Kondado's IPs. The database user must have DROP, INSERT, CREATE, ALTER, SELECT, and DELETE permissions. Review our security documentation for IP details and best practices.
Log in and start creating the destination
Log in to the Kondado platform, navigate to the destinations page, click 'New Destination', and select 'Redshift SSH' from the available options.
Configure the SSH tunnel (bastion server)
Enter the intermediary server details: Server Address, Server Port, Server User, and paste the Server PEM Key text. This establishes the secure SSH tunnel to reach your private Redshift cluster.
Enter Redshift cluster connection details
Provide your cluster's Database Address (Endpoint from AWS), Database Port, Database User with proper permissions, Database Password, Database Name, and Schema (default is 'public'). Find these values on your cluster's AWS page under Properties > Database configurations.
Save and verify the destination
Click 'Save' to create the destination. Kondado will attempt to create the specified schema if it doesn't exist; if that fails due to permissions, it will fall back to the 'public' schema. Ensure the user has CREATE permission on the database and USAGE permission on existing schemas.
Frequently asked questions
GRANT CREATE ON DATABASE db TO user) and USAGE permission on existing schemas (GRANT USAGE ON SCHEMA schema_name TO user).