
1. Redshift Credential Setup
It’s recommended to create a dedicated Redshift user with:- broad read access to the source schemas you want Margin to model
- permission to create/manage schemas inside your designated Redshift database
Create a Redshift User and Permissions
Below is a step-by-step guide to set up a Redshift user with the necessary permissions:1. Create Margin User and Group
1. Create Margin User and Group
2. Grant Workspace Permissions
2. Grant Workspace Permissions
3. Grant Source Data Access
3. Grant Source Data Access
4. Create Secure Views (Optional)
4. Create Secure Views (Optional)
5. Validate Schema Creation Privileges
5. Validate Schema Creation Privileges
If you need to connect to multiple databases, reach out to [email protected], we can enable this for you.
2. Redshift Connection Configuration
A. Add a Redshift Source in Margin
Go to your Integrations page in the Margin dashboard & click Add Source and select Amazon Redshift.B. Enter Redshift Credentials
Enter the following required fields into Margin:| Field | Description |
|---|---|
| Host | The hostname or IP address of your Redshift cluster. You can find this in the AWS Redshift console by selecting your cluster and looking at the Endpoint string (exclude the port and database name). |
| Port | The port number for your Redshift cluster. The default is 5439, but yours may be different. |
| Database | The name of the database in your Redshift cluster that contains your data. |
| Username & Password | For the margin_user you created (or an existing user with the necessary privileges). |
| Schema | Default schema for initial queries. Margin can create and manage additional schemas in the same database as needed. |
3. Testing the Connection
When you set up Redshift, Margin verifies:- Basic connectivity check: Network connection & credential validation
- Verify user can manage objects in Margin-managed schemas:
- Table lifecycle (CREATE, INSERT, SELECT, UPDATE, DELETE)
- View creation and access
- Ability to execute queries on the source tables
4. Advanced Connection Options
Using an SSH Tunnel
If your Redshift cluster is in a private VPC without public access, you can connect via an SSH tunnel:- Select SSH Tunnel as the connection type
- Provide the SSH host, port, username, and authentication method (password or key)
- The SSH server must have network access to your Redshift cluster
AWS PrivateLink (Enterprise Feature)
For enterprise customers, you can securely connect to your Redshift cluster using AWS PrivateLink:- Contact [email protected] to enable this feature
- Our team will provide guidance for setting up the PrivateLink connection
Next Steps
Once the connection is established, you can connect your finance sources to model over your event data.Sources: Finance Data
Connect your finance data sources

