Ockam Node for Amazon Redshift
Create an Ockam Redshift outlet node using Cloudformation template
This guide contains instructions to launch within AWS environment, an
An Ockam Redshift Outlet Node within an AWS environment
An Ockam Redshift Inlet Node:
Within an AWS environment, or
Using Docker in any environment
The walkthrough demonstrates:
Running an Ockam Redshift Outlet node in your AWS environment that contains a private Amazon Redshift Serverless or Amazon Redshift Provisioned Cluster
Setting up Ockam Redshift inlet nodes using either AWS or Docker from any location.
Verifying secure communication between Redshift clients and Amazon Redshift Database.
Read: “How does Ockam work?” to learn about end-to-end trust establishment.

PreRequisite
A private Amazon Redshift Database (Serverless or Provisioned) is created and accessible from the VPC and Subnet where the Ockam Node will be launched.
Security Group associated with the Amazon Redshift Database allows inbound traffic on the required default port (5439) from the subnet where the Ockam Outlet Node will reside.
You have permission to subscribe and launch Cloudformation stack from AWS Marketplace on the AWS Account running Amazon Redshift.
Create an Orchestrator Project
Sign up for Ockam and pick a subscription plan through the guided workflow on Ockam.io.
Run the following commands to install Ockam Command and enroll with the Ockam Orchestrator.
Control which identities are allowed to enroll themselves into your project by issuing unique one-time use enrollment tickets. Generate two enrollment tickets, one for the Outlet and one for the Inlet.
Setup Ockam Redshift Outlet Node
Login to AWS Account you would like to use
Subscribe to "Ockam - Node for Amazon Redshift" in AWS Marketplace
Navigate to
AWS Marketplace -> Manage subscriptions. SelectOckam - Node for Amazon Redshiftfrom the list of subscriptions. SelectActions-> Launch Cloudformation stackSelect the Region you want to deploy and click
Continue to Launch. Under Actions, selectLaunch CloudformationCreate stack with the following details
Stack name:
redshift-ockam-outletor any name you preferNetwork Configuration
VPC ID: Choose a VPC ID where the EC2 instance will be deployed.
Subnet ID: Select a suitable Subnet ID within the chosen VPC that has access to Amazon Redshift. Note: Security Group associated with Amazon Redshift should allow inbound traffic on the required default port (5439) from the IP address of the Subnet or VPC.
EC2 Instance Type: Default instance type is
m6a.large. If you would like predictable network bandwidth of 12.5 Gbps please usem6a.8xlargeor a small instance type liket3.mediumdepending on your use case
Ockam Node Configuration
Enrollment ticket: Copy and paste the content of the
outlet.ticketgenerated aboveRedshift Database Endpoint: To configure the Ockam Redshift Outlet Node, you'll need to specify the Amazon Redshift Endpoint. This configuration allows the Ockam Redshift Outlet Node to connect to the database.
Example:
cluster-name.xxxx.region.redshift.amazonaws.com:5439orworkgroup.account.region.redshift-serverless.amazonaws.com:5439Note: If you are copy pasting the Redshift Endpoint value from the AWS Console, please make sure to remove the /DATABASE_NAME at the end as it is not needed
JSON Node Configuration: Copy and paste the below configuration. Note that the configuration values match with the enrollment tickets created in the previous step.
$REDSHIFT_ENDPOINTwill be replaced during runtime.
Click Next to launch the CloudFormation run.
A successful CloudFormation stack run configures the Ockam Redshift Outlet node on an EC2 machine.
EC2 machine mounts an EFS volume created in the same subnet. Ockam state is stored in the EFS volume.
A security group with egress access to the internet will be attached to the EC2 machine.
Connect to the EC2 machine via AWS Session Manager.
To view the log file, run
sudo cat /var/log/cloud-init-output.log.Note: DNS Resolution for the EFS drive may take upto 10 minutes, you will see the script retrying every 30 seconds to resolve
Successful run will show
Ockam node setup completed successfullyin the logsTo view the status of Ockam node run
curl http://localhost:23345/show | jq
View the Ockam node status in CloudWatch.
Navigate to
Cloudwatch -> Log Groupand selectredshift-ockam-outlet-status-logs. Select the Logstream for the EC2 instance.The Cloudformation template creates a subscription filter that sends data to a Cloudwatch alarm
redshift-ockam-outlet-OckamNodeDownAlarm.Alarm will turn green upon ockam node successfully running.
An Autoscaling group ensures atleast one EC2 instance is running at all times.
Ockam redshift outlet node setup is complete. You can now create Ockam redshisft inlet nodes in any network to establish secure communication.
Setup Ockam Inlet Node
You can set up an Ockam Redshift Inlet Node either in AWS or locally using Docker. Here are both options:
Option 1: Setup Inlet Node in AWS
Login to AWS Account you would like to use
Subscribe to "Ockam - Node" in AWS Marketplace
Navigate to
AWS Marketplace -> Manage subscriptions. SelectOckam - Nodefrom the list of subscriptions. SelectActions-> Launch Cloudformation stackSelect the Region you want to deploy and click
Continue to Launch. Under Actions, selectLaunch CloudformationCreate stack with below details
Stack name:
redshift-ockam-inletor any name you preferNetwork Configuration
Select suitable values for
VPC IDandSubnet IDEC2 Instance Type: Default instance type is
m6a.large. If you would like predictable network bandwidth of 12.5 Gbps please usem6a.8xlargeor a small instance type liket3.mediumdepending on your use case
Ockam Configuration
Enrollment ticket: Copy and paste the content of the
inlet.ticketgenerated aboveJSON Node Configuration: Copy and paste the below configuration.
Click Next to launch the CloudFormation run.
A successful CloudFormation stack run configures the Ockam inlet node on an EC2 machine.
EC2 machine mounts an EFS volume created in the same subnet. Ockam state is stored in the EFS volume.
Connect to the EC2 machine via AWS Session Manager.
To view the log file, run
sudo cat /var/log/cloud-init-output.log.Successful run will show
Ockam node setup completed successfullyin the logs
To view the status of Ockam node run
curl http://localhost:23345/show | jq
View the Ockam node status in CloudWatch.
Navigate to
Cloudwatch -> Log Groupand selectredshift-ockam-inlet-status-logs. Select the Logstream for the EC2 instance.Cloudformation template creates a subscription filter that sends data to a Cloudwatch alarm
redshift-ockam-inlet-OckamNodeDownAlarm.Alarm will turn green upon ockam node successfully running.
An Autoscaling group ensures atleast one EC2 instance is running at all times.
Use any postgresqlclient and connect to localhost:15432 (PGHOST=localhost, PGPORT=15439) from the machine running the Ockam redshift Inlet node.
Option 2: Setup Inlet Node Locally with Docker Compose
To set up an Inlet Node locally and interact with it outside of AWS, use Docker Compose.
Create a file named
docker-compose.ymlwith the following content:
Run the following command from the same location as the
docker-compose.ymland theinlet.ticketto create an Ockam postgres inlet that can connect to the outlet running in AWS , along with psql client container.
Check status of Ockam inlet node. You will see
The node is UPwhen ockam is configured successfully and ready to accept connection
Connect to psql-client container and run commands
This setup allows you to run an Ockam Redshift Inlet Node locally and communicate securely with a private Amazon Redshift database running in AWS
Cleanup
Last updated
Was this helpful?
