The aws-redshift mod contains resource, control and policy definitions for AWS Redshift service.

Resource Types

Resource types covered by this mod:

Permissions

Taking a look at permissions and associated grant levels for each permission for Redshift:

PermissionGrant LevelHelp
cloudwatch:DescribeAlarmHistoryMetadata"For console access
cloudwatch:DescribeAlarmsMetadata"For console access
cloudwatch:DescribeAlarmsForMetricMetadata"For console access
cloudwatch:GetMetricStatisticsMetadata"For console access
cloudwatch:ListMetricsMetadata"For console access
ec2:DescribeAccountAttributesMetadataMetadata for console access
ec2:DescribeAddressesMetadataMetadata for console access
ec2:DescribeAvailabilityZonesMetadataMetadata for console access
ec2:DescribeInternetGatewaysMetadataMetadata for console access
ec2:DescribeSecurityGroupsMetadataMetadata for console access
ec2:DescribeSubnetsMetadataMetadata for console access
ec2:DescribeVpcsMetadataMetadata for console access
redshift-data:BatchExecuteStatementAdminGrants permission to execute multiple queries under a single connection.
redshift-data:CancelStatementAdminGrants permission to cancel a running query
redshift-data:DescribeStatementMetadataGrants permission to retrieve detailed information about a statement execution
redshift-data:DescribeTableMetadataGrants permission to retrieve metadata about a particular table
redshift-data:ExecuteStatementAdminGrants permission to execute a query
redshift-data:GetStatementResultMetadataGrants permission to fetch the result of a query
redshift-data:ListDatabasesMetadataGrants permission to list databases for a given cluster
redshift-data:ListSchemasMetadataGrants permission to list schemas for a given cluster
redshift-data:ListStatementsMetadataGrants permission to list queries for a given principal
redshift-data:ListTablesMetadataGrants permission to list tables for a given cluster
redshift:AcceptReservedNodeExchangeOperator
redshift:AddPartnerAdmin
redshift:AssociateDataShareConsumerAdmin
redshift:AuthorizeClusterSecurityGroupIngressAdminAdds an inbound (ingress) rule to an Amazon Redshift security group. Only used for non-VPC clusters
redshift:AuthorizeDataShareAdmin
redshift:AuthorizeEndpointAccessAdmin
redshift:AuthorizeSnapshotAccessAdminAllows cross-account snapshot sharing
redshift:BatchDeleteClusterSnapshotsAdmin"Admins can delete a set of cluster snapshots. High risk
redshift:BatchModifyClusterSnapshotsAdminAdmins can modify the settings for a list of snapshots.
redshift:CancelQueryAdmin
redshift:CancelQuerySessionOperator"Low risk
redshift:CancelResizeAdmin
redshift:CopyClusterSnapshotOperator"Low risk
redshift:CreateAuthenticationProfileAdmin
redshift:CreateEndpointAccessAdmin
redshift:CreateClusterOperator"Low risk
redshift:CreateClusterParameterGroupAdmin"Turbot manages low skill parameters
redshift:CreateClusterSecurityGroupAdminAdministrators can manageto create Amazon Redshift security group. Only used for non-VPC clusters
redshift:CreateClusterSnapshotOperator"Low risk
redshift:CreateClusterSubnetGroupAdmin"Administrators can manage custom subnet groups
redshift:CreateClusterUserAdminAdmins can auto create the specified redshift user if it does not exist.
redshift:CreateEventSubscriptionOperator"Low risk
redshift:CreateHsmClientCertificateAdmin
redshift:CreateHsmConfigurationAdmin
redshift:CreateSavedQueryAdmin
redshift:CreateScheduledActionAdmin
redshift:CreateSnapshotCopyGrantAdminCreates a snapshot copy grant that permits Amazon Redshift to use a customer master key (CMK) from AWS Key Management Service (AWS KMS) to encrypt copied snapshots in a destination region.
redshift:CreateSnapshotScheduleOperator
redshift:CreateTagsOperator
redshift:CreateUsageLimitAdmin
redshift:DeauthorizeDataShareAdmin
redshift:DeleteAuthenticationProfileAdmin
redshift:DeleteClusterAdmin"High risk
redshift:DeleteClusterParameterGroupAdmin"Turbot manages low skill parameters
redshift:DeleteClusterSecurityGroupAdminOnly used for non-VPC clusters
redshift:DeleteClusterSnapshotAdmin"High risk
redshift:DeleteClusterSubnetGroupAdmin"Administrators can manage custom subnet groups
redshift:DeleteEndpointAccessAdmin
redshift:DeleteEventSubscriptionOperator"Low risk
redshift:DeleteHsmClientCertificateAdminHSM not yet supported by Turbot
redshift:DeleteHsmConfigurationAdminHSM not yet supported by Turbot
redshift:DeletePartnerAdmin
redshift:DeleteSavedQueriesAdmin
redshift:DeleteScheduledActionAdmin
redshift:DeleteSnapshotCopyGrantAdminNot supported by Turbot until the use case is better understood.
redshift:DeleteSnapshotScheduleOperator
redshift:DeleteTagsOperator
redshift:DeleteUsageLimitAdmin
redshift:DescribeAccountAttributesMetadata
redshift:DescribeAuthenticationProfilesMetadata
redshift:DescribeClusterDbRevisionsMetadata
redshift:DescribeClusterParameterGroupsMetadata
redshift:DescribeClusterParametersMetadata
redshift:DescribeClusterSecurityGroupsMetadata
redshift:DescribeClusterSnapshotsMetadata
redshift:DescribeClusterSubnetGroupsMetadata
redshift:DescribeClusterTracksMetadataReturns a list of all the available maintenance tracks.
redshift:DescribeClusterVersionsMetadata
redshift:DescribeClustersMetadata
redshift:DescribeDataSharesMetadata
redshift:DescribeDataSharesForConsumerMetadata
redshift:DescribeDataSharesForProducerMetadata
redshift:DescribeDefaultClusterParametersMetadata
redshift:DescribeEndpointAccessMetadata
redshift:DescribeEndpointAuthorizationMetadata
redshift:DescribeEventCategoriesMetadata
redshift:DescribeEventSubscriptionsMetadata
redshift:DescribeEventsMetadata
redshift:DescribeHsmClientCertificatesMetadata
redshift:DescribeHsmConfigurationsMetadata
redshift:DescribeLoggingStatusMetadata
redshift:DescribeNodeConfigurationOptionsMetadata
redshift:DescribePartnersMetadata
redshift:DescribeOrderableClusterOptionsMetadata
redshift:DescribeQueryAdmin
redshift:DescribeReservedNodeOfferingsMetadata
redshift:DescribeReservedNodesMetadata
redshift:DescribeResizeMetadata
redshift:DescribeSavedQueriesAdmin
redshift:DescribeScheduledActionsMetadata
redshift:DescribeSnapshotCopyGrantsMetadata
redshift:DescribeSnapshotSchedulesMetadata
redshift:DescribeStorageMetadata
redshift:DescribeTableAdmin
redshift:DescribeTableRestoreStatusMetadata
redshift:DescribeTagsMetadata
redshift:DescribeUsageLimitsMetadata
redshift:DisableLoggingAdmin
redshift:DisableSnapshotCopyOperator"Low risk since old snapshots are not deleted
redshift:DisassociateDataShareConsumerAdmin
redshift:EnableLoggingAdmin
redshift:EnableSnapshotCopyOperator"Low risk
redshift:ExecuteQueryAdminAdmins can use query editor for creating and listing tables and other info.
redshift:FetchResultsAdmin
redshift:GetClusterCredentialsAdmin
redshift:GetReservedNodeExchangeOfferingsMetadata
redshift:JoinGroupAdmin
redshift:ListDatabasesAdmin
redshift:ListSavedQueriesMetadata
redshift:ListSchemasAdmin
redshift:ListTablesAdmin
redshift:ModifyAquaConfigurationAdmin
redshift:ModifyAuthenticationProfileAdmin
redshift:ModifyClusterAdmin"Turbot manages low skill parameters
redshift:ModifyClusterDbRevisionAdmin
redshift:ModifyClusterIamRolesAdmin"Administrators can assign roles to Redshift
redshift:ModifyClusterMaintenanceOperatorOperators can modify the maintenance settings of a cluster.
redshift:ModifyClusterParameterGroupAdmin"Turbot manages low skill parameters
redshift:ModifyClusterSnapshotOperator
redshift:ModifyClusterSnapshotScheduleOperator
redshift:ModifyClusterSubnetGroupAdmin"Administrators can manage custom subnet groups
redshift:ModifyEndpointAccessAdmin
redshift:ModifyEventSubscriptionOperator"Low risk
redshift:ModifySavedQueryAdmin
redshift:ModifyScheduledActionAdmin
redshift:ModifySnapshotCopyRetentionPeriodAdmin"Can be decreased
redshift:ModifySnapshotScheduleOperator
redshift:ModifyUsageLimitAdmin
redshift:PauseClusterOperator
redshift:PurchaseReservedNodeOfferingOwnerOwners are responsible for cost commitments.
redshift:RebootClusterOperatorMedium risk. Impacts availability.
redshift:RejectDataShareOperator
redshift:ResetClusterParameterGroupAdmin"Turbot manages low skill parameters
redshift:ResizeClusterAdmin"Admin can change the size of the cluster. Cluster type
redshift:RestoreFromClusterSnapshotOperator"Low risk
redshift:RestoreTableFromClusterSnapshotOperator"Low risk
redshift:ResumeClusterOperator
redshift:RevokeClusterSecurityGroupIngressAdminOnly used for non-VPC clusters
redshift:RevokeEndpointAccessAdmin
redshift:RevokeSnapshotAccessAdminAllows cross-account snapshot sharing
redshift:RotateEncryptionKeyOperator"Medium risk. No impact on data since keys managed by Redshift
redshift:UpdatePartnerStatusAdmin
redshift:ViewQueriesFromConsoleMetadata
redshift:ViewQueriesInConsoleMetadata"No data
sns:GetEndpointAttributesMetadata"For console access
sns:GetPlatformApplicationAttributesMetadata"For console access
sns:GetSubscriptionAttributesMetadata"For console access
sns:GetTopicAttributesMetadata"For console access
sns:ListEndpointsByPlatformApplicationMetadata"For console access
sns:ListPlatformApplicationsMetadata"For console access
sns:ListSubscriptionsByTopicMetadata"For console access
sqlworkbench:AssociateConnectionWithChartAdmin
sqlworkbench:AssociateConnectionWithTabAdmin
sqlworkbench:AssociateNotebookWithTabAdmin
sqlworkbench:AssociateQueryWithTabAdmin
sqlworkbench:BatchDeleteFolderAdmin
sqlworkbench:BatchGetNotebookCellMetadata
sqlworkbench:CreateAccountAdmin
sqlworkbench:CreateChartAdmin
sqlworkbench:CreateConnectionAdmin
sqlworkbench:CreateFolderAdmin
sqlworkbench:CreateNotebookAdmin
sqlworkbench:CreateNotebookCellAdmin
sqlworkbench:CreateNotebookFromVersionAdmin
sqlworkbench:CreateNotebookVersionAdmin
sqlworkbench:CreateSavedQueryAdmin
sqlworkbench:DeleteChartAdmin
sqlworkbench:DeleteConnectionAdmin
sqlworkbench:DeleteNotebookAdmin
sqlworkbench:DeleteNotebookCellAdmin
sqlworkbench:DeleteNotebookVersionAdmin
sqlworkbench:DeleteSavedQueryAdmin
sqlworkbench:DeleteTabAdmin
sqlworkbench:DriverExecuteAdmin
sqlworkbench:DuplicateNotebookAdmin
sqlworkbench:ExportNotebookOperator
sqlworkbench:GenerateSessionAdmin
sqlworkbench:GetAccountInfoMetadata
sqlworkbench:GetAccountSettingsMetadata
sqlworkbench:GetAutocompletionMetadataMetadata
sqlworkbench:GetAutocompletionResourceMetadata
sqlworkbench:GetChartMetadata
sqlworkbench:GetConnectionMetadata
sqlworkbench:GetKMSKeyMetadata
sqlworkbench:GetNotebookMetadata
sqlworkbench:GetNotebookVersionMetadata
sqlworkbench:GetQueryExecutionHistoryMetadata
sqlworkbench:GetSavedQueryMetadata
sqlworkbench:GetSchemaInferenceMetadata
sqlworkbench:GetUserInfoMetadata
sqlworkbench:GetUserWorkspaceSettingsMetadata
sqlworkbench:ImportNotebookOperator
sqlworkbench:ListBucketsMetadata
sqlworkbench:ListConnectionsMetadata
sqlworkbench:ListDatabasesMetadata
sqlworkbench:ListFilesMetadata
sqlworkbench:ListKMSKeyAliasesMetadata
sqlworkbench:ListKMSKeysMetadata
sqlworkbench:ListNotebooksMetadata
sqlworkbench:ListNotebookVersionsMetadata
sqlworkbench:ListQueryExecutionHistoryMetadata
sqlworkbench:ListRedshiftClustersMetadata
sqlworkbench:ListSampleDatabasesMetadata
sqlworkbench:ListSavedQueryVersionsMetadata
sqlworkbench:ListTabsMetadata
sqlworkbench:ListTaggedResourcesMetadata
sqlworkbench:ListTagsForResourceMetadata
sqlworkbench:PutTabAdmin
sqlworkbench:PutUserWorkspaceSettingsAdmin
sqlworkbench:RestoreNotebookVersionOperator
sqlworkbench:TagResourceOperator
sqlworkbench:UntagResourceOperator
sqlworkbench:UpdateAccountConnectionSettingsAdmin
sqlworkbench:UpdateAccountExportSettingsAdmin
sqlworkbench:UpdateAccountGeneralSettingsAdmin
sqlworkbench:UpdateChartAdmin
sqlworkbench:UpdateConnectionAdmin
sqlworkbench:UpdateFileFolderAdmin
sqlworkbench:UpdateFolderAdmin
sqlworkbench:UpdateNotebookAdmin
sqlworkbench:UpdateNotebookCellContentAdmin
sqlworkbench:UpdateNotebookCellLayoutAdmin
sqlworkbench:UpdateSavedQueryAdmin

Learn More About Turbot

Version
5.19.0
Released On
Jul 21, 2023
Depends On

Resource Types

Control Types

Policy Types

Release Notes

5.19.0 (2023-07-21)

What's new?

  • Resource's metadata will now also include createdBy details in Turbot CMDB.
  • AWS/Redshift/Admin, AWS/Redshift/Metadata and AWS/Redshift/Operator now include permissions for SQL Workbench Account Settings and Notebooks.
  • README.md file is now available for users to check details about the resource types and service permissions that the mod covers.

Bug fixes

  • We've updated the runtime of the lambda functions to Node 18. You wouldn't notice any difference and things will continue to work smoothly and consistently as before.

Action Types

Added

  • AWS > Redshift > Cluster > Delete from AWS
  • AWS > Redshift > Cluster > Set Tags
  • AWS > Redshift > Cluster > Skip alarm for Active control
  • AWS > Redshift > Cluster > Skip alarm for Active control [90 days]
  • AWS > Redshift > Cluster > Skip alarm for Approved control
  • AWS > Redshift > Cluster > Skip alarm for Approved control [90 days]
  • AWS > Redshift > Cluster > Skip alarm for Encryption at Rest control
  • AWS > Redshift > Cluster > Skip alarm for Encryption at Rest control [90 days]
  • AWS > Redshift > Cluster > Skip alarm for Tags control
  • AWS > Redshift > Cluster > Skip alarm for Tags control [90 days]
  • AWS > Redshift > Cluster Parameter Group > Delete from AWS
  • AWS > Redshift > Cluster Parameter Group > Set Tags
  • AWS > Redshift > Cluster Parameter Group > Skip alarm for Active control
  • AWS > Redshift > Cluster Parameter Group > Skip alarm for Active control [90 days]
  • AWS > Redshift > Cluster Parameter Group > Skip alarm for Approved control
  • AWS > Redshift > Cluster Parameter Group > Skip alarm for Approved control [90 days]
  • AWS > Redshift > Cluster Parameter Group > Skip alarm for Tags control
  • AWS > Redshift > Cluster Parameter Group > Skip alarm for Tags control [90 days]
  • AWS > Redshift > Cluster Subnet Group > Delete from AWS
  • AWS > Redshift > Cluster Subnet Group > Set Tags
  • AWS > Redshift > Cluster Subnet Group > Skip alarm for Active control
  • AWS > Redshift > Cluster Subnet Group > Skip alarm for Active control [90 days]
  • AWS > Redshift > Cluster Subnet Group > Skip alarm for Approved control
  • AWS > Redshift > Cluster Subnet Group > Skip alarm for Approved control [90 days]
  • AWS > Redshift > Cluster Subnet Group > Skip alarm for Tags control
  • AWS > Redshift > Cluster Subnet Group > Skip alarm for Tags control [90 days]
  • AWS > Redshift > Manual Cluster Snapshot > Delete from AWS
  • AWS > Redshift > Manual Cluster Snapshot > Set Tags
  • AWS > Redshift > Manual Cluster Snapshot > Skip alarm for Active control
  • AWS > Redshift > Manual Cluster Snapshot > Skip alarm for Active control [90 days]
  • AWS > Redshift > Manual Cluster Snapshot > Skip alarm for Approved control
  • AWS > Redshift > Manual Cluster Snapshot > Skip alarm for Approved control [90 days]
  • AWS > Redshift > Manual Cluster Snapshot > Skip alarm for Tags control
  • AWS > Redshift > Manual Cluster Snapshot > Skip alarm for Tags control [90 days]

5.18.0 (2022-02-16)

What's new?

  • Users can now create their own custom checks against resource attributes in the Approved control using the Approved > Custom policy. These custom checks would be a part of the evaluation of the Approved control. Custom messages can also be added which are then displayed in the control details table. See Custom Checks for more information.

Bug fixes

  • We've improved the process of deleting resources from Turbot if their CMDB policy was set to Enforce: Disabled. The CMDB controls will now not look to resolve credentials via Turbot's IAM role while deleting resources from Turbot. This will allow the CMDB controls to process resource deletions from Turbot more reliably than before.

Policy Types

Added

  • AWS > Redshift > Cluster > Approved > Custom
  • AWS > Redshift > Cluster Parameter Group > Approved > Custom
  • AWS > Redshift > Cluster Subnet Group > Approved > Custom
  • AWS > Redshift > Manual Cluster Snapshot > Approved > Custom

5.17.2 (2022-02-01)

Bug fixes

  • We've made a few improvements in the GraphQL query for AWS > Redshift > Cluster > Encryption At Rest control. You won't notice any difference, but things should run lighter and quicker than before.
  • The AWS > Redshift > Cluster > Schedule control would incorrectly go into a skipped state if the AWS > Redshift > Cluster > Schedule policy was set to Skip but the AWS > Redshift > Cluster > Schedule Tag policy was set to Enforce: Schedule per turbot_custom_schedule tag. This is fixed and the control will now work as expected.

5.17.1 (2022-01-20)

Bug fixes

  • The AWS > Redshift > Cluster > Schedule control would incorrectly go into an error state if the corresponding CMDB control was in error and the AWS > Redshift > Cluster > Schedule policy was set to Skip. This is fixed and the control will now work as expected.

5.17.0 (2022-01-04)

What's new?

  • AWS/Redshift/Admin AWS/Redshift/Metadata AWS/Redshift/Operator now include permissions for Partner, Data Share, Endpoint Access and Authentication Profile.

5.16.0 (2021-11-26)

What's new?

  • AWS/Redshift/Admin, AWS/Redshift/Operator and AWS/Redshift/Metadata now includes permissions for SQL Workbench.

5.15.0 (2021-11-11)

What's new?

  • AWS/Redshift/Admin and AWS/Redshift/Metadata now includes permissions for Redshift Data.

5.14.0 (2021-07-14)

What's new?

  • We've improved the details tables in the Tags controls to be more helpful, especially when a resource's tags are not set correctly as expected. Previously, to understand why the Tags controls were in an Alarm state, you would need to find and read the control's process logs. This felt like too much work for a simple task, so now these details are visible directly from the control page.

5.13.0 (2021-06-25)

Control Types

Added

  • AWS > Redshift > Cluster > Backup Retention Period

Policy Types

Added

  • AWS > Redshift > Cluster > Backup Retention Period
  • AWS > Redshift > Cluster > Backup Retention Period > Days

Action Types

Added

  • AWS > Redshift > Cluster > Update Backup Retention Period

5.12.0 (2021-02-24)

What's new?

  • We've improved the state reasons and details tables in various Approved and Active controls to be more helpful, especially when a resource is unapproved or inactive. Previously, to understand why one of these controls is in Alarm state, you would need to find and read the control's process logs. This felt like too much work for a simple task, so now these details are visible directly from the control page.

5.11.3 (2021-02-03)

Bug fixes

  • The policy titles for AWS > Redshift > Cluster > Cluster Publicly Accessible and AWS > Redshift > Cluster > Parameter Group > Parameter Group Name have been updated to AWS > Redshift > Cluster > Publicly Accessible and AWS > Redshift > Cluster > Parameter Group > Name respectively to remove redundant wording. Both policies' URIs are still the same, so no migration action is required.

Policy Types

Renamed

  • AWS > Redshift > Cluster > Parameter Group > Parameter Group Name to AWS > Redshift > Cluster > Parameter Group > Name
  • AWS > Redshift > Cluster > Cluster Publicly Accessible to AWS > Redshift > Cluster > Publicly Accessible

5.11.2 (2021-01-27)

Bug fixes

  • The AWS > Redshift > Cluster > Audit Logging and AWS > Redshift > Cluster > Encryption in Transit controls will now move to invalid instead of tbd if the cluster’s attached parameter group is not in CMDB to provide better awareness around the missing information.

5.11.1 (2021-01-13)

Bug fixes

  • AWS > Redshift > Cluster > Encryption in Transit and AWS > Redshift > Cluster > Audit Logging controls would remain in an error state for a cluster if its attached parameter group is not upserted into Turbot's CMDB. This issue has been fixed and now the control remains in TBD state instead of moving into an error state.

5.11.0 (2020-12-22)

What's new?

  • With the addition of AWS > Redshift > Cluster > Parameter Group control, you can now ensure a specific parameter group is attached to a cluster, or have Turbot create and attach a new parameter group to a cluster with the previously attached parameter group's parameter values copied over. To get started, set the AWS > Redshift > Cluster > Parameter Group and AWS > Redshift > Cluster > Parameter Group > Parameter Group Name policies

Bug fixes

  • Controls run faster now when in the tbd and skipped states thanks to the new Turbot Precheck feature (not to be confused with TSA PreCheck). With Turbot Precheck, controls avoid running GraphQL input queries when in tbd and skipped, resulting in faster and lighter control runs.

Control Types

Added

  • AWS > Redshift > Cluster > Parameter Group

Policy Types

Added

  • AWS > Redshift > Cluster > Parameter Group
  • AWS > Redshift > Cluster > Parameter Group > Parameter Group Name

Action Types

Added

  • AWS > Redshift > Cluster > Create or update parameter group

5.10.0 (2020-11-27)

Control Types

Added

  • AWS > Redshift > Cluster > Audit Logging
  • AWS > Redshift > Cluster > Encryption in Transit

Policy Types

Added

  • AWS > Redshift > Cluster > Audit Logging
  • AWS > Redshift > Cluster > Audit Logging > Bucket
  • AWS > Redshift > Cluster > Audit Logging > Key Prefix
  • AWS > Redshift > Cluster > Audit Logging > User Activity Logging
  • AWS > Redshift > Cluster > Encryption in Transit

Action Types

Added

  • AWS > Redshift > Cluster > Update Audit Logging
  • AWS > Redshift > Cluster > Update Parameter Group

5.9.0 (2020-10-09)

What's new?

  • We've made improvements to how Active controls interact with CMDB policies and controls for more reliable active checks. Now, if a resource's CMDB policy is set to Skip, its Active control will move to invalid to prevent the Active control from making a decision based on outdated information. Also, Active controls will now wait until the resource's CMDB control has run at least once to ensure the required data is available.

5.8.1 (2020-09-17)

Bug fixes

  • We've made some improvements to our real-time event handling that reduces the risk of creating resources in CMDB with malformed AKAs. There's no noticeable difference, but things should run more reliably now.

5.8.0 (2020-09-02)

What's new?

  • Discovery controls now have their own control category, CMDB > Discovery, to allow for easier filtering separately from other CMDB controls.
  • We've renamed the service's default regions policy from Regions [Default] to Regions to be consistent with our other regions policies.

5.7.1 (2020-08-17)

Bug fixes

  • In various Active controls, we were outputting log messages that did not properly show how many days were left until we'd delete the inactive resources (we were still deleting them after the correct number of days). These log messages have been fixed and now contain the correct number of days.

5.7.0 (2020-08-07)

Control Types

Added

  • AWS > Redshift > Cluster > Schedule

Policy Types

Added

  • AWS > Redshift > Cluster > Schedule
  • AWS > Redshift > Cluster > Schedule Tag

Action Types

Added

  • AWS > Redshift > Cluster > Start
  • AWS > Redshift > Cluster > Stop

5.6.0 (2020-07-31)

What's new?

  • Cross-account trust is not only important for complex enterprise and application scenarios, but is also a critical area for security controls. We now support controlling cross-account access for manual cluster snapshots to provide automatic protection against unexpected cross-account access.

    A common set of trusted AWS account IDs can be defined in the AWS > Account > Trusted Accounts [Default] policy. Trusted accounts can also be defined at any level, even down to the specific manual cluster snapshot resource.

    To get started with these new controls, please see the AWS > Redshift > Manual Cluster Snapshot > Trusted Access policies.

Control Types

Added

  • AWS > Redshift > Manual Cluster Snapshot > Trusted Access

Policy Types

Added

  • AWS > Redshift > Manual Cluster Snapshot > Trusted Access
  • AWS > Redshift > Manual Cluster Snapshot > Trusted Access > Accounts
  • AWS > Redshift > Trusted Accounts [Default]

Action Types

Added

  • AWS > Redshift > Manual Cluster Snapshot > Set Trusted Access

5.5.1 (2020-07-02)

Bug fixes

  • Sometimes when updating CMDB for resources with tags that have empty string values, e.g., [{Key: "Empty", Value: ""}, {Key: "Turbot is great", Value: "true"}], we would not store all of the tags correctly. This has been fixed and now all tags are accounted for.

5.5.0 (2020-06-10)

What's new?

  • An additional API call has been added to the CMDB of cluster parameter group which returns a detailed list of parameters contained within the specified Amazon Redshift parameter group.

5.4.0 (2020-05-29)

What's new?

  • Updated AWS > Redshift > Regions policy default value to now include af-south-1, eu-south-1.

Bug fixes

  • Although the data validation errors, which appear in various CMDB and Discovery controls, are not blockers, they look ugly in the UI and should be cleaned up. These errors have now been fixed.
  • Links to documentation in the descriptions for several controls and policies were broken. These links have now been fixed.