<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redshift S3 Staging Credentials in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935049#M2777</link>
    <description>&lt;P&gt;These are two different ways to authenticate.&lt;/P&gt;
&lt;P&gt;IAM Roles for EC2&amp;nbsp;when used&amp;nbsp;&lt;SPAN&gt;generate temporary security credentials (AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY i.e. the key pair) for your session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Key pair is a static&amp;nbsp;&lt;SPAN&gt;AWS_ACCESS_KEY_ID and&amp;nbsp;AWS_SECRET_ACCESS_KEY.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Best practice on AWS would be to use IAM roles. If you are following the AWS well architected framework or have an architecture review through the AWS Partner Network (APN) there is now criteria that says static&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;AWS_ACCESS_KEY_ID and&amp;nbsp;AWS_SECRET_ACCESS_KEY should not be used in this scenario. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It's also easier to manage as normally you have to have a process to rotate the credentials&amp;nbsp;every 30-90 days if you are working in any kind of regulated&amp;nbsp;environment. This&amp;nbsp;management overhead just goes away with IAM Roles as they generate new short lived credentials on the fly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2022 18:14:50 GMT</pubDate>
    <dc:creator>mattdevdba</dc:creator>
    <dc:date>2022-05-24T18:14:50Z</dc:date>
    <item>
      <title>Redshift S3 Staging Credentials</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935042#M2775</link>
      <description>&lt;P&gt;If I choose&amp;nbsp; "IAM Roles for EC2", then I am also asked for "IAM Role ARN"&lt;BR /&gt;I am assuming that Replicate uses the former to write to S3, and the latter as part of Redshift's COPY command ?&lt;BR /&gt;&lt;BR /&gt;However,&amp;nbsp;&lt;BR /&gt;If I choose "Key Pair", then I am not asked for an "IAM Role ARN".&lt;BR /&gt;So does Replicate then use the Key pair for both writing &amp;amp; COPY ?&lt;BR /&gt;&lt;BR /&gt;Any reason for the different approach between the two approaches of single/dual credentials ?&lt;BR /&gt;&lt;BR /&gt;Many Thanks&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 17:39:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935042#M2775</guid>
      <dc:creator>simonB2020</dc:creator>
      <dc:date>2022-05-24T17:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Redshift S3 Staging Credentials</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935045#M2776</link>
      <description>&lt;P&gt;@&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(46,46,46);font-size:13px;"&gt;&lt;STRONG&gt;simonB2020&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. for both S3 staging IAM or Key , Replicate will write to S3 and then copy to Redshift.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. The option was offer because some customer want to use IAM and some want to use key pair, performance is the same.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note from the user guide on IAM :&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;IAM Roles for EC2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Choose this method if the machine on which Qlik Replicate is installed is configured to authenticate itself using an IAM role.&lt;/P&gt;
&lt;P&gt;For more information about this access option, see:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html" target="_blank"&gt;&lt;U&gt;http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html&lt;/U&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;A href="https://help.qlik.com/en-US/replicate/May2022/Content/Replicate/Main/Amazon%20Redshift/set_up_redshift_as_target.htm" target="_blank"&gt;https://help.qlik.com/en-US/replicate/May2022/Content/Replicate/Main/Amazon%20Redshift/set_up_redshift_as_target.htm&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 18:07:51 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935045#M2776</guid>
      <dc:creator>Steve_Nguyen</dc:creator>
      <dc:date>2022-05-24T18:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Redshift S3 Staging Credentials</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935049#M2777</link>
      <description>&lt;P&gt;These are two different ways to authenticate.&lt;/P&gt;
&lt;P&gt;IAM Roles for EC2&amp;nbsp;when used&amp;nbsp;&lt;SPAN&gt;generate temporary security credentials (AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY i.e. the key pair) for your session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Key pair is a static&amp;nbsp;&lt;SPAN&gt;AWS_ACCESS_KEY_ID and&amp;nbsp;AWS_SECRET_ACCESS_KEY.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Best practice on AWS would be to use IAM roles. If you are following the AWS well architected framework or have an architecture review through the AWS Partner Network (APN) there is now criteria that says static&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;AWS_ACCESS_KEY_ID and&amp;nbsp;AWS_SECRET_ACCESS_KEY should not be used in this scenario. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It's also easier to manage as normally you have to have a process to rotate the credentials&amp;nbsp;every 30-90 days if you are working in any kind of regulated&amp;nbsp;environment. This&amp;nbsp;management overhead just goes away with IAM Roles as they generate new short lived credentials on the fly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 18:14:50 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Redshift-S3-Staging-Credentials/m-p/1935049#M2777</guid>
      <dc:creator>mattdevdba</dc:creator>
      <dc:date>2022-05-24T18:14:50Z</dc:date>
    </item>
  </channel>
</rss>

