Table of Contents

Search

  1. Preface
  2. Part 1: Introduction to Amazon Redshift connectors
  3. Part 2: Data Integration with Amazon Redshift V2 Connector
  4. Part 3: Data Integration with Amazon Redshift Connector

Amazon Redshift Connectors

Amazon Redshift Connectors

Create minimal Amazon S3 bucket policy

Create minimal Amazon S3 bucket policy

The minimal Amazon S3 bucket policy restricts user operations and user access to particular Amazon S3 buckets by assigning an AWS IAM policy to users. You can configure the AWS IAM policy through the AWS console.
In
elastic mappings
, you can use different AWS accounts within the same AWS region. Make sure that the Amazon S3 bucket policy confirms access to the AWS accounts used in
elastic mappings
.
You can use the following minimum required permissions to successfully read data from and write data to Amazon Redshift resources:
  • PutObject
  • GetObject
  • DeleteObject
  • ListBucket
Sample Policy
:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": "*", "Action": [ "s3:PutObject", "s3:GetObject", "s3:DeleteObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::<bucket_name>/*", "arn:aws:s3:::<bucket_name>" ] } ] }
The
Test Connection
does not validate the IAM policy assigned to users. The Amazon S3 bucket name is available in the advanced properties for source and target.