The CDK Construct Library for AWS::Redshift
Project description
Amazon Redshift Construct Library
---All classes with the
Cfn
prefix in this module (CFN Resources) are always stable and safe to use.
The APIs of higher level constructs in this module are experimental and under active development. They are subject to non-backward compatible changes or removal in any future version. These are not subject to the Semantic Versioning model and breaking changes will be announced in the release notes. This means that while you may use them, you may need to update your source code when upgrading to a newer version of this package.
Starting a Redshift Cluster Database
To set up a Redshift cluster, define a Cluster
. It will be launched in a VPC.
You can specify a VPC, otherwise one will be created. The nodes are always launched in private subnets and are encrypted by default.
# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
import aws_cdk.aws_redshift as redshift
cluster = redshift.Cluster(self, "Redshift",
master_user=Login(
master_username="admin"
),
vpc=vpc
)
By default, the master password will be generated and stored in AWS Secrets Manager.
A default database named default_db
will be created in the cluster. To change the name of this database set the defaultDatabaseName
attribute in the constructor properties.
By default, the cluster will not be publicly accessible.
Depending on your use case, you can make the cluster publicly accessible with the publiclyAccessible
property.
Connecting
To control who can access the cluster, use the .connections
attribute. Redshift Clusters have
a default port, so you don't need to specify the port:
# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
cluster.connections.allow_from_any_ipv4("Open to the world")
The endpoint to access your database cluster will be available as the .clusterEndpoint
attribute:
# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
cluster.cluster_endpoint.socket_address
Rotating credentials
When the master password is generated and stored in AWS Secrets Manager, it can be rotated automatically:
# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
cluster.add_rotation_single_user()
The multi user rotation scheme is also available:
# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
cluster.add_rotation_multi_user("MyUser",
secret=my_imported_secret
)
This module is part of the AWS Cloud Development Kit project.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for aws-cdk.aws-redshift-1.115.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 758e6e940e7a432d46d144ebf8002af51fbe98d452221725510f01488847f9a3 |
|
MD5 | 23798d20e0508de05bc3e3b79194ca8c |
|
BLAKE2b-256 | 9ee4ced6b20d6a6d0ef4d6ff89bc41671a9ff3ec4d2a58469cfccef6f34261f4 |
Hashes for aws_cdk.aws_redshift-1.115.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 311dcb36814434214917ad707689a210016ce1d6286c69d44ec01f5df27a3c7d |
|
MD5 | b9c3a7210ecea7ec1774d81dd639d4be |
|
BLAKE2b-256 | 9b697bb3ccda2c197a2eebcf3896ff087520927b7e9d9db25b0b222353763a74 |