Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Redshift Destination implement SSH tunneling #12131

Closed
Tracked by #11287
VitaliiMaltsev opened this issue Apr 19, 2022 · 0 comments · Fixed by #23523
Closed
Tracked by #11287

Redshift Destination implement SSH tunneling #12131

VitaliiMaltsev opened this issue Apr 19, 2022 · 0 comments · Fixed by #23523
Assignees
Labels
team/destinations Destinations team's backlog type/enhancement New feature or request

Comments

@VitaliiMaltsev
Copy link
Contributor

VitaliiMaltsev commented Apr 19, 2022

Add SSH tunneling to Redshift Destination

@grishick grishick added the team/destinations Destinations team's backlog label Sep 27, 2022
@grishick grishick changed the title Redshift Destination implement SSH connection Redshift Destination implement SSH tunneling Feb 6, 2023
jcowanpdx added a commit that referenced this issue Feb 27, 2023
Issue: #12131

User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations.

Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host.

Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file
@jcowanpdx jcowanpdx linked a pull request Feb 28, 2023 that will close this issue
37 tasks
jcowanpdx added a commit that referenced this issue Feb 28, 2023
Issue: #12131

User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations.

Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host.

Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file
jcowanpdx added a commit that referenced this issue Mar 7, 2023
* Redshift Destination: Add SSH Tunnelling Config Option
Issue: #12131

User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations.

Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host.

Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file

* README.md updates
** Move the pem info into the secrets config files
** Update the version id to 0.4.0
** Touch up the docs
** adding a note about S3 staging NOT using the SSH Tunnel configuration, if provided.
** make base class abstract to prevent double running the same tests

Co-authored-by: Octavia Squidington III <[email protected]>
danielduckworth pushed a commit to danielduckworth/airbyte that referenced this issue Mar 13, 2023
* Redshift Destination: Add SSH Tunnelling Config Option
Issue: airbytehq#12131

User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations.

Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host.

Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file

* README.md updates
** Move the pem info into the secrets config files
** Update the version id to 0.4.0
** Touch up the docs
** adding a note about S3 staging NOT using the SSH Tunnel configuration, if provided.
** make base class abstract to prevent double running the same tests

Co-authored-by: Octavia Squidington III <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
team/destinations Destinations team's backlog type/enhancement New feature or request
Projects
No open projects
Status: Backlog (unscoped)
Development

Successfully merging a pull request may close this issue.

4 participants