Skip to main content

endpoint_accesses

Creates, updates, deletes or gets an endpoint_access resource or lists endpoint_accesses in a region

Overview

Nameendpoint_accesses
TypeResource
DescriptionResource schema for a Redshift-managed VPC endpoint.
Idaws.redshift.endpoint_accesses

Fields

NameDatatypeDescription
endpoint_statusstringThe status of the endpoint.
vpc_endpointobjectThe connection endpoint for connecting to an Amazon Redshift cluster through the proxy.
addressstringThe DNS address of the endpoint.
endpoint_namestringThe name of the endpoint.
vpc_security_group_idsarrayA list of vpc security group ids to apply to the created endpoint access.
resource_ownerstringThe AWS account ID of the owner of the cluster.
subnet_group_namestringThe subnet group name where Amazon Redshift chooses to deploy the endpoint.
portintegerThe port number on which the cluster accepts incoming connections.
endpoint_create_timestringThe time (UTC) that the endpoint was created.
cluster_identifierstringA unique identifier for the cluster. You use this identifier to refer to the cluster for any subsequent cluster operations such as deleting or modifying. All alphabetical characters must be lower case, no hypens at the end, no two consecutive hyphens. Cluster name should be unique for all clusters within an AWS account
vpc_security_groupsarrayA list of Virtual Private Cloud (VPC) security groups to be associated with the endpoint.
regionstringAWS region.

Methods

NameAccessible byRequired Params
create_resourceINSERTClusterIdentifier, SubnetGroupName, EndpointName, VpcSecurityGroupIds, region
delete_resourceDELETEdata__Identifier, region
update_resourceUPDATEdata__Identifier, data__PatchDocument, region
list_resourcesSELECTregion
get_resourceSELECTdata__Identifier, region

SELECT examples

Gets all endpoint_accesses in a region.

SELECT
region,
endpoint_status,
vpc_endpoint,
address,
endpoint_name,
vpc_security_group_ids,
resource_owner,
subnet_group_name,
port,
endpoint_create_time,
cluster_identifier,
vpc_security_groups
FROM aws.redshift.endpoint_accesses
WHERE region = 'us-east-1';

Gets all properties from an individual endpoint_access.

SELECT
region,
endpoint_status,
vpc_endpoint,
address,
endpoint_name,
vpc_security_group_ids,
resource_owner,
subnet_group_name,
port,
endpoint_create_time,
cluster_identifier,
vpc_security_groups
FROM aws.redshift.endpoint_accesses
WHERE region = 'us-east-1' AND data__Identifier = '<EndpointName>';

INSERT example

Use the following StackQL query and manifest file to create a new endpoint_access resource, using stack-deploy.

/*+ create */
INSERT INTO aws.redshift.endpoint_accesses (
EndpointName,
VpcSecurityGroupIds,
SubnetGroupName,
ClusterIdentifier,
region
)
SELECT
'{{ EndpointName }}',
'{{ VpcSecurityGroupIds }}',
'{{ SubnetGroupName }}',
'{{ ClusterIdentifier }}',
'{{ region }}';

DELETE example

/*+ delete */
DELETE FROM aws.redshift.endpoint_accesses
WHERE data__Identifier = '<EndpointName>'
AND region = 'us-east-1';

Permissions

To operate on the endpoint_accesses resource, the following permissions are required:

Read

redshift:DescribeEndpointAccess,
ec2:DescribeClientVpnEndpoints,
ec2:DescribeVpcEndpoint,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets

Create

redshift:CreateEndpointAccess,
redshift:DescribeEndpointAccess,
ec2:CreateClientVpnEndpoint,
ec2:CreateVpcEndpoint,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets

Update

redshift:DescribeEndpointAccess,
redshift:ModifyEndpointAccess,
ec2:ModifyClientVpnEndpoint,
ec2:ModifyVpcEndpoint,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets

List

redshift:DescribeEndpointAccess,
ec2:DescribeClientVpnEndpoints,
ec2:DescribeVpcEndpoints,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets

Delete

redshift:DeleteEndpointAccess,
redshift:DescribeEndpointAccess,
ec2:DeleteClientVpnEndpoint,
ec2:DeleteVpcEndpoint,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets,
ec2:DescribeVpcEndpoint