Perform the following tasks before you can create a mapping:
General prerequisites
Ensure that you have access to the Secure Agent directory that contains the success and error files. The directory path must be the same on each Secure Agent machine in the runtime environment.
IAM authentication
If you use IAM authentication, you must create an Redshift Role Amazon Resource Name (ARN), add the minimal Amazon IAM policy to the Redshift Role ARN, and add the Redshift Role ARN to the Redshift cluster. Provide the Redshift Role ARN in the AWS_IAM_ROLE option in the UNLOAD and COPY commands when you create a task.
If you specify both, the access key ID and secret access key in the connection properties and AWS_IAM_ROLE in the UNLOAD and COPY commands, AWS_IAM_ROLE takes the precedence.
Temporary security credentials
Consider the following guidelines when you use the temporary security credentials:
Before you run a task, ensure that you have enough time to use the temporary security credentials for running the task. You cannot extend the time duration of the temporary security credentials for an ongoing task. For example, when you read from and write to Amazon Redshift and if the temporary security credentials expire, you cannot extend the time duration of the temporary security credentials that causes the task to fail.
After the temporary security credentials expire, AWS does not authorize the IAM users or IAM roles to access the resources using the credentials. You must request for new temporary security credentials before the previous temporary security credentials expire in a mapping.
For mappings in advanced mode, the temporary security credentials do not expire even after the configured time in the
Temporary Credential Duration
advanced source and target property elapses.
When you create an Amazon Redshift V2 connection with the IAM Role ARN and use the SSE-KMS encryption, you must specify AWS_IAM_ROLE as the unload option in the Amazon Redshift V2 advanced source properties.
If both the source and target in a mapping point to the same Amazon S3 bucket, use the same Amazon S3 connection in the Source and Target transformations. If you use two different Amazon S3 connections, configure the same values in the connection properties for both the connections.
If the source and target in a mapping point to different Amazon S3 buckets, you can use two different Amazon S3 connections.
You can configure different values in the connection properties for both the connections. However, you must select the
Use EC2 Role to Assume Role
check box in the connection property. You must also specify the same value for the
Temporary Credential Duration
field in the source and target properties.
CDC sources
To create a mapping with a CDC source, ensure that you have the PowerExchangeClient and CDC licenses. Configure a CDC source if you want to create a mapping to capture changed data from the CDC source, and then run the associated mapping tasks to write the changed data to an Amazon Redshift target.
Mappings in advanced mode
If you configure a mapping to run in advanced mode, ensure that the Redshift cluster and the