AWS PrivateLink for Redshift
AWS PrivateLink provides private connectivity from the Immuta SaaS platform to Redshift clusters hosted on AWS. It ensures that all traffic to the configured endpoints only traverses private networks.
This feature is supported in most regions across Immuta's global segments (NA, EU, and AP); contact your Immuta representative if you have questions about availability.

Requirements
You have an Immuta SaaS tenant.
You have set up an AWS PrivateLink Service for your Redshift Cluster endpoints.
When creating the service, make sure that the Require Acceptance option is checked (this does not allow anyone to connect, all connections will be blocked until the Immuta service principal is added).
Configure Redshift with AWS PrivateLink
Open a support ticket with Immuta Support with the following information:
AWS region
AWS subnet availability zones IDs (e.g.
use1-az3
; these are not the account-specific identifiers likeus-east-1a
oreu-west-2c
)VPC endpoint service ID (e.g.,
vpce-0a02f54c1d339e98a
)Ports used
Authorize the service principal provided by your representative so that Immuta can complete the VPC endpoint configuration.
Last updated
Was this helpful?