Documentation Index
Fetch the complete documentation index at: https://backstage.spotify.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
IAM Policy Requirements
Authentication with Redshift is handled with IAM User credentials. You can configure these credentials to allow access to all of your Redshift clusters or a subset of clusters.- Allow access to all clusters
- Limit access to specific clusters
To ingest all of your AWS account’s Redshift clusters and databases into the data registry, the following IAM Policy can be used which grants the required actions on all resources.Taking advantage of this option simplifies configuration as you will only need to configure the AWS Account ID and the regions your clusters are in, and the integration will discover the rest. Use the ‘option 1’ array under sources:

Privileges for IAM user
By default in redshift, information_schema (and other cluster-generated tables and views the integration reads from) only shows objects/rows that the connected user has privileges to see. Additionally, only superusers and the creators of objects can query objects. Because of this, if there are tables or views created by a user other than the IAM service account that you want ingested, you can grant permissions to ensure their metadata will be pulled in. The following commands can be executed programmatically, or in the redshift query editor as a superuser. Ensure you use double quotes around the verbatim username associated with the IAM account you configured for data registry.Configuration
Each source in the Redshift integration requires an accountId; make sure to set up authentication for each account. Each region in the associated config must be enabled for the account. While Redshift doesn’t natively support table or column descriptions, some organizations use the COMMENT sql operation to store relevant information. The Redshift module can optionally be configured to ingest these comments as descriptions, by setting thepullRedshiftComments config value to true. The setting is optional, and defaults to false.
Authentication
The Redshift integration uses the@backstage/integration-aws-node package to create a credential provider which is then passed into
the AWS client SDKs. Since it is handled by a separate plugin, the set up for the authentication for it is found under the App
config as seen below:

Every accountID included in the data registry config must have an associated
auth config like above.
Naming
The naming structure for Datasets created from Redshift is as follows:[database].[schema].[table].
Tags & Labels
Tags for redshift resources are not currently supported for the Redshift connector since they cannot be applied to resources at the database granularity or below.Troubleshooting
- The redshift ingestion is failing to ingest anything? Double check the IAM user has the correct permissions, the client secret and token placed in the aws config belong to the IAM user, and the account ID used in the data registry config matches the one in the aws config.
- Some redshift tables are missing from data registry? Verify the IAM user has privileges on all the schemas and tables/views you want represented in data registry. Use sql statements here to check.
