Attach IAM Role to EC2 and Redshift Cluster

Attach IAM Role to EC2 and Redshift Cluster

The recommended way to authorize access to S3, Redshift and SES is to attach an IAM role, with properly granted permissions,  to the CloudBasic EC2 instance (pair of instances if operating a CloudBasic Multi-AZ HA Cluster) and associate the IAM Role with the Redshift cluster. 

1. The IAM Role(s) can be created and attached at the time the CloudBasic instance is launched (in the given example a single role is used to facilitate access to S3, Redshift and SES):



 

2. The IAM Role(s) can be attached to an already running CloudBasic EC2 instance:



 

3. In addition to granting the IAM Role permission to Redshift, it needs to be also associated with the respective Redshift cluster. Note that the IAM role will be available to be associated with the cluster only if it a trust relationship between the IAM Role and Redshift is established (see the three screenshots below). For more information, visit the related AWS documentation section.