Skip to main content

endpoint_authorizations

Creates, updates, deletes or gets an endpoint_authorization resource or lists endpoint_authorizations in a region

Overview

Nameendpoint_authorizations
TypeResource
DescriptionDescribes an endpoint authorization for authorizing Redshift-managed VPC endpoint access to a cluster across AWS accounts.
Idawscc.redshift.endpoint_authorizations

Fields

NameDatatypeDescription
statusstringThe status of the authorization action.
granteestringThe AWS account ID of the grantee of the cluster.
endpoint_countintegerThe number of Redshift-managed VPC endpoints created for the authorization.
authorize_timestringThe time (UTC) when the authorization was created.
allowed_vpcsarrayThe VPCs allowed access to the cluster.
forcebooleanIndicates whether to force the revoke action. If true, the Redshift-managed VPC endpoints associated with the endpoint authorization are also deleted.
allowed_all_vpcsbooleanIndicates whether all VPCs in the grantee account are allowed access to the cluster.
vpc_idsarrayThe virtual private cloud (VPC) identifiers to grant or revoke access to.
cluster_identifierstringThe cluster identifier.
cluster_statusstringThe status of the cluster.
regionstringAWS region.

For more information, see AWS::Redshift::EndpointAuthorization.

Methods

NameAccessible byRequired Params
create_resourceINSERTClusterIdentifier, Account, region
delete_resourceDELETEdata__Identifier, region
update_resourceUPDATEdata__Identifier, data__PatchDocument, region
list_resourcesSELECTregion
get_resourceSELECTdata__Identifier, region

SELECT examples

Gets all properties from an individual endpoint_authorization.

SELECT
region,
status,
grantee,
account,
grantor,
endpoint_count,
authorize_time,
allowed_vpcs,
force,
allowed_all_vpcs,
vpc_ids,
cluster_identifier,
cluster_status
FROM awscc.redshift.endpoint_authorizations
WHERE region = 'us-east-1' AND data__Identifier = '<ClusterIdentifier>|<Account>';

INSERT example

Use the following StackQL query and manifest file to create a new endpoint_authorization resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.redshift.endpoint_authorizations (
Account,
ClusterIdentifier,
region
)
SELECT
'{{ Account }}',
'{{ ClusterIdentifier }}',
'{{ region }}';

DELETE example

/*+ delete */
DELETE FROM awscc.redshift.endpoint_authorizations
WHERE data__Identifier = '<ClusterIdentifier|Account>'
AND region = 'us-east-1';

Permissions

To operate on the endpoint_authorizations resource, the following permissions are required:

Read

redshift:DescribeEndpointAuthorization

Create

redshift:AuthorizeEndpointAccess,
redshift:DescribeEndpointAuthorization

Update

redshift:AuthorizeEndpointAccess,
redshift:DescribeEndpointAuthorization,
redshift:RevokeEndpointAccess

List

redshift:DescribeEndpointAuthorization

Delete

redshift:RevokeEndpointAccess,
redshift:DeleteEndpointAccess,
redshift:DescribeEndpointAuthorization,
ec2:DeleteClientVpnEndpoint,
ec2:DescribeVpcAttribute,
ec2:DescribeSecurityGroups,
ec2:DescribeAddresses,
ec2:DescribeInternetGateways,
ec2:DescribeSubnets