User guide

To allow network ingress to your cluster, type the following command:
aws redshift authorize-cluster-security-group-ingress --cluster-security-group-
name default --cidrip 192.0.2.0/24
Ingress Rules for EC2 Instances
If you are accessing your cluster from an Amazon EC2 instance, you will need to authorize an Amazon
EC2 security group.To do so, you specify the security group name, along with the 12-digit account number
of the EC2 security group owner.
You can use the Amazon EC2 console to determine the EC2 security group associated with your instance:
To find your AWS account number, go to http://aws.amazon.com and sign in to the My Account page.
Your AWS account number is shown in the upper right-hand corner of that page.
For this example, we will use myec2securitygroup for the Amazon EC2 security group name, and
123456789012 for the account number.You will need to modify these to suit your needs.
To allow network ingress to your cluster, type the following command:
aws redshift authorize-cluster-security-group-ingress --cluster-security-group-
name default --ec2-security-group-name myec2securitygroup --ec2-security-group-
owner 123456789012
Step 4: Connect to Your Cluster
Now that you have added an ingress rule to the default cluster security group, incoming connections from
a specific CIDR/IP or EC2 Security Group to examplecluster are authorized.
You are now ready to connect to the cluster.
For information about connecting to your cluster, go to the Amazon Redshift Getting Started Guide.
API Version 2012-12-01
137
Amazon Redshift Management Guide
Setting Up the Amazon Redshift CLI