- Newest
- Most votes
- Most comments
Yes, a BI tool like Qlik can access a private Amazon Redshift cluster using a Redshift-managed VPC endpoint. Redshift-managed VPC endpoints (powered by AWS PrivateLink) provide a private connection between a VPC containing your Redshift cluster and a VPC where your client tool is running, without requiring public IP addresses or routing traffic through the internet.
To set this up:
-
Create a Redshift-managed VPC endpoint in the VPC where your Qlik tool is running, pointing to your private Redshift cluster.
-
Ensure the security groups associated with your Redshift cluster allow inbound traffic from the security group associated with the VPC endpoint.
-
After creating the endpoint, you can access your Redshift cluster through the Endpoint URL provided in the configuration settings.
This approach is more secure than allowing specific IP addresses through security group rules, as it keeps all traffic within the AWS network and doesn't require exposing your Redshift cluster to the internet.
Note that if your Qlik Cloud instance is running outside of AWS (as a SaaS offering), you would need to establish connectivity between Qlik Cloud and your AWS environment, potentially using other solutions like AWS Direct Connect or a VPN connection, as Redshift-managed VPC endpoints are designed for connections between VPCs within AWS.
Sources
Redshift-managed VPC endpoints - Amazon Redshift
Creating a Redshift-managed VPC endpoint - Amazon Redshift
Infrastructure security in Amazon Redshift - Amazon Redshift
Yes, Qlik Cloud can access your private Redshift cluster using a Redshift-managed VPC endpoint with your current setup. Your configuration (Internet Gateway attached but no routes from private subnets, security group rules allowing Qlik Cloud IPs) is valid and secure.
Redshift-managed VPC endpoints use AWS PrivateLink to create a private connection between Qlik Cloud and your Redshift cluster
- Your Redshift cluster remains in private subnets with no internet exposure
- Security group rules control access, allowing only specific Qlik Cloud IPs
Redshift Cluster Requirements:
- RA3 node types (required for managed VPC endpoints)
- Security group rules allowing Qlik Cloud IPs on port 5439
- Cluster in a private subnet
Access Configuration:
- Redshift-managed VPC endpoint service must be enabled
- You must grant permissions to the Qlik Cloud AWS account
- Qlik needs your cluster identifier, database name, and credentials
Implementation Overview
- Grant Qlik access to your Redshift cluster using the authorize-endpoint-access command
- Verify security group rules allow traffic from Qlik Cloud IPs to port 5439
This approach gives you the security benefits of keeping your Redshift cluster private while still allowing your BI tools to access it through a secure, managed connection.
Relevant content
- asked 2 years ago
- asked 9 months ago
- AWS OFFICIALUpdated 3 years ago
