Redshift Connector User Guide¶
Preventing Revocation of Externally Applied Permissions¶
To prevent revoking externally applied permissions, perform the following steps:
-
SSH to the instance where Privacera Manager is installed.
-
Run the following command to open the
.yml
file to be edited.If you have multiple connectors, then replace
instance1
with the appropriate connector instance name.Bash -
Update the following property to disable grant and revoke updates for user, group, and role on Redshift.
YAML -
After configuring the property, update the connector with:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on. -
Manually create the necessary policies in Privacera to ensure that permissions remain intact and revocations do not occur.
-
Update the following property to
true
inprivacera/privacera-manager/config/custom-vars/connectors/redshift/instance1/vars.connector.redshift.yml
file:YAML -
Re-run the following commands to update the connector with new configuration:
Step 1 - Setup which generates the helm charts. This step usually takes few minutes.
Step 2 - Apply the Privacera Manager helm charts. Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.