Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.iru.com/llms.txt

Use this file to discover all available pages before exploring further.

About Amazon Redshift Serverless

Redshift Serverless APIs use the redshift-serverless: prefix, distinct from redshift: for provisioned clusters. There is no dedicated AWS managed read-only policy; attach an inline policy covering List* and Get* for namespaces, workgroups, snapshots, and usage limits.

How it works

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "redshift-serverless:ListNamespaces",
        "redshift-serverless:ListWorkgroups",
        "redshift-serverless:ListSnapshots",
        "redshift-serverless:ListUsageLimits",
        "redshift-serverless:GetNamespace",
        "redshift-serverless:GetWorkgroup",
        "redshift-serverless:GetSnapshot",
        "redshift-serverless:GetUsageLimit"
      ],
      "Resource": "*"
    }
  ]
}
DetailValue
CategoryDatabases
AuthenticationCross-account IAM role

Prerequisites

  • IAM rights to create roles in the account hosting Serverless workgroups.

Connect Amazon Redshift Serverless to Iru

Copy the trust policy from Iru

1

Open Sources

In Iru Compliance, on the left navigation bar, expand Compliance and select Sources.
Left navigation: Compliance expanded, Sources selected
2

Turn on Amazon Redshift Serverless

Find Amazon Redshift Serverless (use Category or Search by name or description). On that card, turn on the toggle. Leave the wizard tab open.
3

Copy the trust policy JSON

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::753695775620:role/IruConnect"
      },
      "Condition": {
        "StringEquals": {
          "sts:ExternalId": "YOUR_EXTERNAL_ID"
        }
      },
      "Action": "sts:AssumeRole"
    }
  ]
}

Create the IAM role in AWS

1

Start Create role

Open IAMRolesCreate role.
2

Configure trusted entity

Choose AWS accountAnother AWS account. Enter 753695775620 (or the ID Iru shows). Enable Require external ID and paste the external ID from Iru.
3

Attach the Serverless inline policy

Create an inline policy using the JSON under How it works above (or save it as a customer-managed policy and attach it to the role).
4

Name the role and copy the ARN

Name the role, create it, and copy the Role ARN.

Submit the role ARN in Iru

1

Paste the IAM Role ARN

Paste the Role ARN into the connector where the wizard prompts for it.
2

Confirm the source is Active

Submit until Amazon Redshift Serverless shows Active.

Troubleshooting

Check pop-up blocker settings for the Iru site and try again.
Serverless requires redshift-serverless:.
Resource: "*" is typical; scoped ARNs need explicit enumeration.
External ID mismatch.

See also