Amazon Redshift is a fully administered, petabyte-scale cloud-based data warehouse service. Users are able to begin with a minimal amount of gigabytes of data and can easily scale up to a petabyte or more as needed. This will enable them to utilize their own data to develop new intuitions on how to improve business processes and client relations.
Initially, users start to develop a data warehouse by initiating what is called an Amazon Redshift cluster or a set of nodes. Once the cluster has been provisioned, users can seamlessly upload data sets, and then begin to perform data analysis queries. Amazon Redshift delivers super-fast query performance, regardless of size, utilizing the exact SQL-based tools and BI applications that most users are already working with today.
The Amazon Redshift service performs all of the work of setting up, operating, and scaling a data warehouse. These tasks include provisioning capacity, monitoring and backing up the cluster, and applying patches and upgrades to the Amazon Redshift engine.
Amazon Redshift Functionalities
Amazon Redshift has many valuable key functionalities. Some of its most useful functionalities include:
-
Cluster administration: The Amazon Redshift cluster is a group of nodes that contains a leader node and one (or more) compute node(s). The compute nodes needed are dependent on the data size, amount of queries needed, and the query execution functionality desired.
-
Cluster snapshots: Snapshots are backups of a cluster from an exact point in time. Amazon Redshift offers two types of snapshots: manual and automated. Amazon will store these snapshots internally in the Amazon Simple Storage Service (Amazon S3) utilizing an SSL connection. Whenever a Snapshot restore is needed, Amazon Redshift will create a new cluster and will import data from the snapshot as directed.
-
Cluster access: Amazon Redshift provides several intuitive features to help define connectivity rules, encrypt data and connections, and control the overall access of your cluster.
-
IAM credentials and AWS accounts: The Amazon Redshift cluster is only accessible by the AWS account that created the cluster. This automatically secures the cluster and keeps it safe. Inside the AWS account, users access the AWS Identity and IAM protocol to create additional user accounts and manage permissions, granting specified users the desired access needed to control cluster performance.
-
Encryption: Users have the option to choose to encrypt the clusters for additional added security once the cluster is provisioned. When encryption is enabled, Amazon Redshift will store all the data in user-created tables in a secure encrypted format. To manage Amazon Redshift encryption keys, users will access AWS Key Management Service (AWS KMS).
Reviews from Real Users
“Redshift's versioning and data security are the two most critical features. When migrating into the cloud, it's vital to secure the data. The encryption and security are there.” - Kundan A., Senior Consultant at Dynamic Elements AS
“With the cloud version whenever you want to deploy, you can scale up, and down, and it has a data warehousing capability. Redshift has many features. They have enriched and elaborate documentation that is helpful.”- Aishwarya K., Solution Architect at Capgemini