Connecting to Redshift
- Open the connections page in preferences, see managing connections for more information.
- Click the
Add new Connection
button at the top of the connections page.
- Select
Redshift
from the list.
- Give a
Connection name
for your own internal reference. - For
Hostname
, enter the hostname of your database server. - For
Port
, use the default5439
, or enter the port used by your server. - For
Database
, enter the name of your database. - Select how to connect to database. See below for details on using AWS IAM.
- If using Username/Password, for
Username
andPassword
, enter the username and password for PostgreSQL. These are optional. - Toggle connection type for direct or cloud.
- Share the connection with your team.
- Configure
SSH
andSSL
settings. These are optional. - Hit
Connect
and you're all set!
Happy querying! 🍭
AWS IAM and Okta
For enterprise users, we support the ability to login with IAM credentials, an IAM profile, or Okta. If you are interested in these features, reach out to us at [email protected] to learn more.
Once enabled, you will be able to select one of the "Amazon RDS IAM" authentication methods for the connection. When using the credentials method, you will be asked for the Region
, AWS Access Key ID
, AWS Secret Access Key
, and optionally the AWS Session Token
, which can be acquired by going through the My Security Credentials page on AWS or provided by your administrator. For the profile method, you will be asked for Profile
which corresponds to the named profile you have configured within the AWS CLI. When authenticating, PopSQL will then open that file to read the stored credential information.
For the "Okta" method, it will utilize the AWS Account Federation integration through Okta to authenticate. You will need to provide your Okta organization (e.g. acme.okta.com
), the "App Embed Url" for the integration, the region you wish to use, the role to authenticate with, and your okta username / password.
For all methods, you will also be asked for a Username
corresponds to the DB user you wish to use to connect to the database. Your administrator should have created the GetClusterCredentials IAM role for the user, as well as created the Database User Account for you to use. You can prefix the username with IAM:
or IAMA:
to disable or enable the AutoCreate
parameter for the connection. If the Username
field is left blank, then it will default to your OS' username with the AutoCreate
flag enabled.
This authentication mechanism only works with direct connections, so please make sure your computer can reach RDS (i.e. you may need to configure the RedShift VPC to allow your IP address).
Updated about 1 year ago