
1. Redshift Credential Setup
It’s recommended to create a dedicated Redshift user with the permissions needed to query and write to your data warehouse. If you’d prefer to use an existing user, ensure it has the appropriate privileges for both reading from your source schemas and writing to the Margin schema.Create a Redshift User and Schema
Below is a step-by-step guide to set up a Redshift user with the necessary permissions:1. Create Margin User and Group
1. Create Margin User and Group
2. Create Margin Schema
2. Create Margin Schema
3. Grant Source Data Access
3. Grant Source Data Access
4. Create Secure Views (Optional)
4. Create Secure Views (Optional)
If you need to connect to multiple databases, reach out to [email protected], we can enable this for you.
2. Redshift Connection Configuration
A. Add a Redshift Source in Margin
Go to your Integrations page in the Margin dashboard & click Add Source and select Amazon Redshift.B. Enter Redshift Credentials
Enter the following required fields into Margin:| Field | Description |
|---|---|
| Host | The hostname or IP address of your Redshift cluster. You can find this in the AWS Redshift console by selecting your cluster and looking at the Endpoint string (exclude the port and database name). |
| Port | The port number for your Redshift cluster. The default is 5439, but yours may be different. |
| Database | The name of the database in your Redshift cluster that contains your data. |
| Username & Password | For the margin_user you created (or an existing user with the necessary privileges). |
| Schema | The default schema for Margin queries (typically ‘margin’). |
3. Testing the Connection
When you set up Redshift, Margin verifies:- Basic connectivity check: Network connection & credential validation
- Verify user can fully manage the margin schema:
- Table lifecycle (CREATE, INSERT, SELECT, UPDATE, DELETE)
- View creation and access
- Ability to execute queries on the source tables
4. Advanced Connection Options
Using an SSH Tunnel
If your Redshift cluster is in a private VPC without public access, you can connect via an SSH tunnel:- Select SSH Tunnel as the connection type
- Provide the SSH host, port, username, and authentication method (password or key)
- The SSH server must have network access to your Redshift cluster
AWS PrivateLink (Enterprise Feature)
For enterprise customers, you can securely connect to your Redshift cluster using AWS PrivateLink:- Contact [email protected] to enable this feature
- Our team will provide guidance for setting up the PrivateLink connection
Next Steps
Once the connection is established, you can connect your finance sources to model over your event data.Sources: Finance Data
Connect your finance data sources

