Skip to main content

endpoint_authorizations

Creates, updates, deletes or gets an endpoint_authorization resource or lists endpoint_authorizations in a region

Overview

Nameendpoint_authorizations
TypeResource
DescriptionDescribes an endpoint authorization for authorizing Redshift-managed VPC endpoint access to a cluster across AWS accounts.
Idaws.redshift.endpoint_authorizations

Fields

NameDatatypeDescription
statusstringThe status of the authorization action.
granteestringThe AWS account ID of the grantee of the cluster.
accountstringThe target AWS account ID to grant or revoke access for.
grantorstringThe AWS account ID of the cluster owner.
endpoint_countintegerThe number of Redshift-managed VPC endpoints created for the authorization.
authorize_timestringThe time (UTC) when the authorization was created.
allowed_vpcsarrayThe VPCs allowed access to the cluster.
forcebooleanIndicates whether to force the revoke action. If true, the Redshift-managed VPC endpoints associated with the endpoint authorization are also deleted.
allowed_all_vpcsbooleanIndicates whether all VPCs in the grantee account are allowed access to the cluster.
vpc_idsarrayThe virtual private cloud (VPC) identifiers to grant or revoke access to.
cluster_identifierstringThe cluster identifier.
cluster_statusstringThe status of the cluster.
regionstringAWS region.

Methods

NameAccessible byRequired Params
create_resourceINSERTClusterIdentifier, Account, region
delete_resourceDELETEdata__Identifier, region
update_resourceUPDATEdata__Identifier, data__PatchDocument, region
list_resourcesSELECTregion
get_resourceSELECTdata__Identifier, region

SELECT examples

Gets all endpoint_authorizations in a region.

SELECT
region,
status,
grantee,
account,
grantor,
endpoint_count,
authorize_time,
allowed_vpcs,
force,
allowed_all_vpcs,
vpc_ids,
cluster_identifier,
cluster_status
FROM aws.redshift.endpoint_authorizations
WHERE region = 'us-east-1';

Gets all properties from an individual endpoint_authorization.

SELECT
region,
status,
grantee,
account,
grantor,
endpoint_count,
authorize_time,
allowed_vpcs,
force,
allowed_all_vpcs,
vpc_ids,
cluster_identifier,
cluster_status
FROM aws.redshift.endpoint_authorizations
WHERE region = 'us-east-1' AND data__Identifier = '<ClusterIdentifier>|<Account>';

INSERT example

Use the following StackQL query and manifest file to create a new endpoint_authorization resource, using stack-deploy.

/*+ create */
INSERT INTO aws.redshift.endpoint_authorizations (
Account,
ClusterIdentifier,
region
)
SELECT
'{{ Account }}',
'{{ ClusterIdentifier }}',
'{{ region }}';

DELETE example

/*+ delete */
DELETE FROM aws.redshift.endpoint_authorizations
WHERE data__Identifier = '<ClusterIdentifier|Account>'
AND region = 'us-east-1';

Permissions

To operate on the endpoint_authorizations resource, the following permissions are required:

Read

redshift:DescribeEndpointAuthorization

Create

redshift:AuthorizeEndpointAccess,
redshift:DescribeEndpointAuthorization

Update

redshift:AuthorizeEndpointAccess,
redshift:DescribeEndpointAuthorization,
redshift:RevokeEndpointAccess

List

redshift:DescribeEndpointAuthorization

Delete

redshift:RevokeEndpointAccess,
redshift:DeleteEndpointAccess,
redshift:DescribeEndpointAuthorization,
ec2:DeleteClientVpnEndpoint,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets