Adds an inbound (ingress) rule to an Amazon Redshift security group.
Depending on whether the application accessing your cluster
is running on the Internet or an EC2 instance, you can authorize
inbound access to either a Classless Interdomain Routing (CIDR) IP address range
or an EC2 security group. You can add as many as 20 ingress
rules to an Amazon Redshift security group.
Note: |
---|
The EC2 security group must be defined in the AWS region where the cluster resides. |
For an overview of CIDR blocks, see the Wikipedia article on Classless Inter-Domain Routing.
You must also associate the security group with a cluster so that clients running on these IP addresses or the EC2 instance are authorized to connect to the cluster. For information about managing security groups, go to Working with Security Groups in the Amazon Redshift Management Guide.
Declaration Syntax
C# |
public AuthorizeClusterSecurityGroupIngressResponse AuthorizeClusterSecurityGroupIngress( AuthorizeClusterSecurityGroupIngressRequest request )
Parameters
- request (AuthorizeClusterSecurityGroupIngressRequest)
- Container for the necessary parameters to execute the AuthorizeClusterSecurityGroupIngress service method.
Return Value
The response from the AuthorizeClusterSecurityGroupIngress service method, as returned by Redshift.
Exceptions
Exception | Condition |
---|---|
AuthorizationAlreadyExistsException |
The specified CIDR block or EC2 security group is already authorized for
the specified cluster security group.
|
AuthorizationQuotaExceededException |
The authorization quota for the cluster security group has been reached.
|
ClusterSecurityGroupNotFoundException |
The cluster security group name does not refer to an existing cluster
security group.
|
InvalidClusterSecurityGroupStateException |
The state of the cluster security group is not CopyC# available |