- Overview
- Platform setup and administration
- Platform setup and administration
- Platform architecture
- Data Bridge onboarding overview
- Connecting a Peak-managed data lake
- Connecting a customer-managed data lake
- Creating an AWS IAM role for Data Bridge
- Connecting a Snowflake data warehouse
- Connecting a Redshift data warehouse (public connectivity)
- Connecting a Redshift data warehouse (private connectivity)
- Reauthorizing a Snowflake OAuth connection
- Using Snowflake with Peak
- SQL Explorer overview
- Roles and permissions
- User management
- Inventory management solution
- Commercial pricing solution
- Merchandising solution

Supply Chain & Retail Solutions user guide
Connecting a Redshift data warehouse (public connectivity)
Connecting your public Redshift cluster to Peak enables Peak to read and write data directly to your existing analytics infrastructure. This method uses IP whitelisting over the public internet.
Prerequisites
Before connecting a Redshift data warehouse, ensure you meet the following requirements:
- Access to Peak with permissions to configure Data Bridge.
- Your Redshift cluster is publicly accessible.
- You have the Redshift host URL, port, database name, and credentials.
- A data lake is already configured in Peak in the same region as your Redshift cluster.
Steps
-
In Peak, open Manage and select Data Bridge.
-
Select Add data warehouse.
-
Enter a unique name for the connection and select Amazon Redshift.
- The name must be unique to your Peak organization.
- Use only alphanumeric characters and underscores. No spaces or other special characters.
- Minimum 3 characters, maximum 40 characters.
- Must start and end with an alphanumeric character.
- The name cannot be changed after the connection has been set up.
-
Select the region where your Redshift cluster is hosted. Ensure the region complies with your data localization requirements.
Supported regions: Ireland (eu-west-1), London (eu-west-2), Mumbai (ap-south-1), North California (us-west-1), North Virginia (us-east-1).
-
Select Public connectivity.
-
Copy the Peak IP addresses displayed in the configuration step.
-
In AWS, add the Peak IP addresses to your Redshift cluster's security group inbound rules:
- Open the Redshift console and select your cluster.
- On the Properties tab, scroll to Network and security and open the VPC security group.
- On the Inbound tab, select Edit and add a new rule with the following values:
- Type: Custom TCP
- Protocol: TCP
- Port range: the port number of your Redshift cluster (for example, 5439)
- Source: Custom — enter the Peak IP addresses
- Save the rule.
-
In Peak, confirm that IP whitelisting is complete by selecting the confirmation checkbox.
-
Select Next to proceed to the database step.
-
Enter the database credentials. See Credential fields.
-
Select Test to validate the connection.
-
In the Data lake step, select the data lake connection to link.
-
Set up the Redshift IAM role for data lake access. See Configuring the Redshift IAM role.
-
Review the configuration and select Finish.
Credential fields
| Field | Description |
|---|---|
| Database name | Name of the Redshift database. |
| Username | The Snowflake username Peak will use to access the database. |
| Password | The password for the database user. Must be 8–64 characters and include at least one uppercase letter, one lowercase letter, and one number. ASCII characters 33–126 are allowed, except ', ", \, /, and @. |
| Host URL | The endpoint of your Redshift cluster. |
| Port | The port your Redshift cluster is deployed on (typically 5439). |
| Input schema | The schema used to load data into the warehouse via connectors. |
| Default schema | The schema used for Peak write-back operations. |
Configuring the Redshift IAM role
Peak requires an IAM role attached to your Redshift cluster with permission to access the S3 data lake. Peak provides the required policy and trusted entity JSON on the Data lake step of the setup wizard.
To configure the IAM role:
- In Peak, copy the Redshift IAM role policy from the Data lake step.
- In the AWS IAM console, go to Access management > Policies and create a new policy. Paste the copied JSON on the JSON tab, then save the policy.
- In Access management > Roles, select the role attached to your Redshift cluster.
- Select Add permissions > Attach policies and attach the policy you just created.
- Ensure the
AmazonRedshiftAllCommandsFullAccessmanaged policy is also attached to this role. - In Peak, copy the Trusted entity policy from the Data lake step.
- In the same IAM role, select Edit trust relationship, paste the copied JSON, and save.
- Copy the IAM role ARN from the role's Summary section.
- Paste the role ARN into the IAM role ARN field in Peak.
Result
The Redshift data warehouse connection appears as Active in the Data Bridge list.