Table of Contents

Search

  1. Preface
  2. Part 1: Introduction to Amazon Redshift connectors
  3. Part 2: Data Integration with Amazon Redshift V2 Connector
  4. Part 3: Data Integration with Amazon Redshift Connector

Amazon Redshift Connectors

Amazon Redshift Connectors

Configure SSL with the serverless runtime environment

Configure SSL with the serverless runtime environment

You can use the serverless runtime environment in an Amazon Redshift V2 connection to connect to an SSL-enabled Amazon Redshift database.
Before you configure a secure Amazon Redshift V2 connection using the serverless runtime environment, perform the following tasks:
  • Add the SSL certificate in the Amazon S3 bucket or Azure container.
  • Configure the .yml serverless configuration file.
  • Configure the serverless environment.
  • Configure the connection properties to use SSL.
Add the SSL certificate in the Amazon S3 bucket or Azure container
Perform the following steps to configure an SSL connection in a serverless runtime environment:
  1. Create the following structure for the serverless agent configuration in AWS or Azure:
    <Supplementary file location>/serverless_agent_config
  2. Add the certificate name and source path in the Amazon S3 bucket or Azure container in the following location in your AWS or Azure account:
    <Supplementary file location>/serverless_agent_config/SSL
Configure the .yml serverless configuration file
Perform the following steps to configure the .yml serverless configuration file in the serverless runtime environment and add the certificate name and path entries so that Amazon Redshift V2 Connector can use SSL:
  1. Copy the following code snippet to a text editor:
    version: 1 agent: agentAutoApply: general: sslStore: - fileCopy: sourcePath: SSL/<cert_name> - importCerts: certName: <cert_name> alias: <alias name of the certificate>
    where the source path is the directory path of the certificate files in AWS or Azure.
  2. Ensure that the syntax and indentations are valid, and then save the file as
    serverlessUserAgentConfig.yml
    in the following AWS or Azure location:
    <Supplementary file location>/serverless_agent_config
    When the .yml file runs, the SSL certificates are copied from the AWS or Azure location to the serverless agent directory.
Configure the serverless environment
Configure the JVMOption1 and JVMOption2 properties for SSL in the serverless runtime environment:
  1. Navigate to your serverless runtime environment properties, and click
    Edit
    .
  2. On the
    Runtime Configuration Properties
    tab, click
    JVMoption1
    and add the following property:
    -Djavax.net.ssl.trustStore=/home/cldagnt/SystemAgent/jdk/jre/lib/security/cacerts
  3. Click
    JVMoption2
    and add the following property:
    -Djavax.net.ssl.trustStorePassword=changeit
  4. Click
    Save
    .
  5. Redeploy the runtime environment.
Configure the connection properties to use SSL
After you set the runtime properties in the serverless runtime environment, specify
ssl=true
in the
JDBC URL
connection property.
For example,
jdbc:redshift://mycluster.xyz789.us-west-2.redshift.amazonaws.com:5439/dev?ssl=true

0 COMMENTS

We’d like to hear from you!