Skip to main content

endpoint_authorizations

Creates, updates, deletes or gets an endpoint_authorization resource or lists endpoint_authorizations in a region

Overview

Nameendpoint_authorizations
TypeResource
DescriptionDescribes an endpoint authorization for authorizing Redshift-managed VPC endpoint access to a cluster across AWS accounts.
Idawscc.redshift.endpoint_authorizations

Fields

NameDatatypeDescription
statusstringThe status of the authorization action.
granteestringThe AWS account ID of the grantee of the cluster.
endpoint_countintegerThe number of Redshift-managed VPC endpoints created for the authorization.
authorize_timestringThe time (UTC) when the authorization was created.
allowed_vpcsarrayThe VPCs allowed access to the cluster.
forcebooleanIndicates whether to force the revoke action. If true, the Redshift-managed VPC endpoints associated with the endpoint authorization are also deleted.
allowed_all_vpcsbooleanIndicates whether all VPCs in the grantee account are allowed access to the cluster.
vpc_idsarrayThe virtual private cloud (VPC) identifiers to grant or revoke access to.
cluster_identifierstringThe cluster identifier.
cluster_statusstringThe status of the cluster.
regionstringAWS region.

For more information, see AWS::Redshift::EndpointAuthorization.

Methods

NameResourceAccessible byRequired Params
create_resourceendpoint_authorizationsINSERTClusterIdentifier, Account, region
delete_resourceendpoint_authorizationsDELETEIdentifier, region
update_resourceendpoint_authorizationsUPDATEIdentifier, PatchDocument, region
list_resourcesendpoint_authorizations_list_onlySELECTregion
get_resourceendpoint_authorizationsSELECTIdentifier, region

SELECT examples

Gets all properties from an individual endpoint_authorization.

SELECT
region,
status,
grantee,
account,
grantor,
endpoint_count,
authorize_time,
allowed_vpcs,
force,
allowed_all_vpcs,
vpc_ids,
cluster_identifier,
cluster_status
FROM awscc.redshift.endpoint_authorizations
WHERE
region = '{{ region }}' AND
Identifier = '{{ cluster_identifier }}|{{ account }}';

INSERT example

Use the following StackQL query and manifest file to create a new endpoint_authorization resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.redshift.endpoint_authorizations (
Account,
ClusterIdentifier,
region
)
SELECT
'{{ account }}',
'{{ cluster_identifier }}',
'{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

UPDATE example

Use the following StackQL query and manifest file to update a endpoint_authorization resource, using stack-deploy.

/*+ update */
UPDATE awscc.redshift.endpoint_authorizations
SET PatchDocument = string('{{ {
"Force": force,
"VpcIds": vpc_ids
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ cluster_identifier }}|{{ account }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

DELETE example

/*+ delete */
DELETE FROM awscc.redshift.endpoint_authorizations
WHERE
Identifier = '{{ cluster_identifier }}|{{ account }}' AND
region = '{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

Additional Parameters

Mutable resources in the Cloud Control provider support additional optional parameters which can be supplied with INSERT, UPDATE, or DELETE operations. These include:

ParameterDescription
ClientToken
A unique identifier to ensure the idempotency of the resource request.This allows the provider to accurately distinguish between retries and new requests.
A client token is valid for 36 hours once used.
After that, a resource request with the same client token is treated as a new request.
If you do not specify a client token, one is generated for inclusion in the request.
RoleArn
The ARN of the IAM role used to perform this resource operation.The role specified must have the permissions required for this operation.
If you do not specify a role, a temporary session is created using your AWS user credentials.
TypeVersionId
For private resource types, the type version to use in this resource operation.If you do not specify a resource version, the default version is used.

Permissions

To operate on the endpoint_authorizations resource, the following permissions are required:

redshift:DescribeEndpointAuthorization