Audience: System Administrators, Data Governors, and Data Owners
Content Summary: This page provides an overview of the Redshift integration in Immuta.
For a tutorial detailing how to enable this integration, see the installation guide.
Redshift is a policy push integration that allows Immuta to apply policies directly in Redshift. This allows data analysts to query Redshift views directly instead of going through a proxy and have per-user policies dynamically applied at query time.
The Redshift integration will create views from the tables within the database specified when configured.
Then, the user can choose the name for the schema where all the Immuta generated views will reside.
Immuta will also create the schemas
immuta_procedures to contain
the tables, views, UDFs, and stored procedures that support the integration.
Immuta supports the Redshift integration as both multi-database and single-database integrations.
If using a multi-database integration, you must use a Redshift cluster with an RA3 node because Immuta requires cross-database views.
If using a single-database integration, all Redshift cluster types are supported. However, because cross-database queries are not supported in any types other than RA3, Immuta's views must exist in the same database as the raw tables. Consequently, the steps for configuring the integration for Redshift clusters with external tables differ slightly from those that don't have external tables. Allow Immuta to create secure views of your external tables through one of these methods:
- configure the integration with an existing database that contains the external tables:
Instead of creating an
immutadatabase that manages all schemas and views created when Redshift data is registered in Immuta, the integration adds the Immuta-managed schemas and views to an existing database in Redshift.
- configure the integration by creating a new
immutadatabase and re-create all of your external tables in that database.
SQL statements are used to create all views, including a join to the secure view:
This secure view is a select from the
immuta_system.profile table (which contains all Immuta users and their
current groups, attributes, projects, and a list of valid tables they have access to) with a constraint
immuta__userid = current_user() to ensure it only contains the profile row for the current user. The
immuta_system.user_profile view is readable by all users, but will only display the data that corresponds
to the user executing the query.
The Redshift integration uses webhooks to keep views up-to-date with Immuta data sources.
When a data source or policy is created, updated, or disabled, a webhook will be called that will create,
modify, or delete the dynamic view.
immuta_system.profile table is updated through webhooks when a user's groups or attributes change,
they switch projects, they acknowledge a purpose, or when their data source access is approved or revoked.
The profile table can only be read and updated by the Immuta system account.
- An Immuta Application Administrator configures the Redshift integration and registers Redshift warehouse and databases with Immuta.
- Immuta creates a database inside the configured Redshift ecosystem that contains Immuta policy definitions and user entitlements.
- A Data Owner registers Redshift tables in Immuta as data sources.
- A Data Owner, Data Governor, or Administrator creates or changes a policy or user in Immuta.
- Data source metadata, tags, user metadata, and policy definitions are stored in Immuta's Metadata Database.
- The Immuta Web Service calls a stored procedure that modifies the user entitlements or policies.
- A Redshift user who is subscribed to the data source in Immuta queries the corresponding table directly in Redshift through the immuta database and sees policy-enforced data.