Skip to content

Commit 9377773

Browse files
author
AWS
committed
Amazon Redshift Update: Introduces new field 'LoadSampleData' in CreateCluster operation. Customers can now specify 'LoadSampleData' option during creation of a cluster, which results in loading of sample data in the cluster that is created.
1 parent 2b28b94 commit 9377773

File tree

2 files changed

+17
-7
lines changed

2 files changed

+17
-7
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon Redshift",
4+
"contributor": "",
5+
"description": "Introduces new field 'LoadSampleData' in CreateCluster operation. Customers can now specify 'LoadSampleData' option during creation of a cluster, which results in loading of sample data in the cluster that is created."
6+
}

services/redshift/src/main/resources/codegen-resources/service-2.json

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@
101101
"errors":[
102102
{"shape":"InvalidDataShareFault"}
103103
],
104-
"documentation":"<p>From a data producer account, authorizes the sharing of a datashare with one or more consumer accounts or managing entities. To authorize a datashare for a data consumer, the producer account must have the correct access privileges.</p>"
104+
"documentation":"<p>From a data producer account, authorizes the sharing of a datashare with one or more consumer accounts or managing entities. To authorize a datashare for a data consumer, the producer account must have the correct access permissions.</p>"
105105
},
106106
"AuthorizeEndpointAccess":{
107107
"name":"AuthorizeEndpointAccess",
@@ -558,7 +558,7 @@
558558
"errors":[
559559
{"shape":"InvalidDataShareFault"}
560560
],
561-
"documentation":"<p>From the producer account, removes authorization from the specified datashare. </p>"
561+
"documentation":"<p>From a datashare producer account, removes authorization from the specified datashare. </p>"
562562
},
563563
"DeleteAuthenticationProfile":{
564564
"name":"DeleteAuthenticationProfile",
@@ -1444,7 +1444,7 @@
14441444
{"shape":"InvalidDataShareFault"},
14451445
{"shape":"InvalidNamespaceFault"}
14461446
],
1447-
"documentation":"<p>From a consumer account, remove association for the specified datashare. </p>"
1447+
"documentation":"<p>From a datashare consumer account, remove association for the specified datashare. </p>"
14481448
},
14491449
"EnableLogging":{
14501450
"name":"EnableLogging",
@@ -1508,7 +1508,7 @@
15081508
{"shape":"ClusterNotFoundFault"},
15091509
{"shape":"UnsupportedOperationFault"}
15101510
],
1511-
"documentation":"<p>Returns a database user name and temporary password with temporary authorization to log on to an Amazon Redshift database. The action returns the database user name prefixed with <code>IAM:</code> if <code>AutoCreate</code> is <code>False</code> or <code>IAMA:</code> if <code>AutoCreate</code> is <code>True</code>. You can optionally specify one or more database user groups that the user will join at log on. By default, the temporary credentials expire in 900 seconds. You can optionally specify a duration between 900 seconds (15 minutes) and 3600 seconds (60 minutes). For more information, see <a href=\"https://docs.aws.amazon.com/redshift/latest/mgmt/generating-user-credentials.html\">Using IAM Authentication to Generate Database User Credentials</a> in the Amazon Redshift Cluster Management Guide.</p> <p>The Identity and Access Management (IAM) user or role that runs GetClusterCredentials must have an IAM policy attached that allows access to all necessary actions and resources. For more information about permissions, see <a href=\"https://docs.aws.amazon.com/redshift/latest/mgmt/redshift-iam-access-control-identity-based.html#redshift-policy-resources.getclustercredentials-resources\">Resource Policies for GetClusterCredentials</a> in the Amazon Redshift Cluster Management Guide.</p> <p>If the <code>DbGroups</code> parameter is specified, the IAM policy must allow the <code>redshift:JoinGroup</code> action with access to the listed <code>dbgroups</code>. </p> <p>In addition, if the <code>AutoCreate</code> parameter is set to <code>True</code>, then the policy must include the <code>redshift:CreateClusterUser</code> privilege.</p> <p>If the <code>DbName</code> parameter is specified, the IAM policy must allow access to the resource <code>dbname</code> for the specified database name. </p>"
1511+
"documentation":"<p>Returns a database user name and temporary password with temporary authorization to log on to an Amazon Redshift database. The action returns the database user name prefixed with <code>IAM:</code> if <code>AutoCreate</code> is <code>False</code> or <code>IAMA:</code> if <code>AutoCreate</code> is <code>True</code>. You can optionally specify one or more database user groups that the user will join at log on. By default, the temporary credentials expire in 900 seconds. You can optionally specify a duration between 900 seconds (15 minutes) and 3600 seconds (60 minutes). For more information, see <a href=\"https://docs.aws.amazon.com/redshift/latest/mgmt/generating-user-credentials.html\">Using IAM Authentication to Generate Database User Credentials</a> in the Amazon Redshift Cluster Management Guide.</p> <p>The Identity and Access Management (IAM) user or role that runs GetClusterCredentials must have an IAM policy attached that allows access to all necessary actions and resources. For more information about permissions, see <a href=\"https://docs.aws.amazon.com/redshift/latest/mgmt/redshift-iam-access-control-identity-based.html#redshift-policy-resources.getclustercredentials-resources\">Resource Policies for GetClusterCredentials</a> in the Amazon Redshift Cluster Management Guide.</p> <p>If the <code>DbGroups</code> parameter is specified, the IAM policy must allow the <code>redshift:JoinGroup</code> action with access to the listed <code>dbgroups</code>. </p> <p>In addition, if the <code>AutoCreate</code> parameter is set to <code>True</code>, then the policy must include the <code>redshift:CreateClusterUser</code> permission.</p> <p>If the <code>DbName</code> parameter is specified, the IAM policy must allow access to the resource <code>dbname</code> for the specified database name. </p>"
15121512
},
15131513
"GetReservedNodeExchangeConfigurationOptions":{
15141514
"name":"GetReservedNodeExchangeConfigurationOptions",
@@ -1934,7 +1934,7 @@
19341934
"errors":[
19351935
{"shape":"InvalidDataShareFault"}
19361936
],
1937-
"documentation":"<p>From the consumer account, rejects the specified datashare.</p>"
1937+
"documentation":"<p>From a datashare consumer account, rejects the specified datashare.</p>"
19381938
},
19391939
"ResetClusterParameterGroup":{
19401940
"name":"ResetClusterParameterGroup",
@@ -2936,7 +2936,7 @@
29362936
"members":{
29372937
"DbUser":{
29382938
"shape":"String",
2939-
"documentation":"<p>A database user name that is authorized to log on to the database <code>DbName</code> using the password <code>DbPassword</code>. If the specified DbUser exists in the database, the new user name has the same database privileges as the the user named in DbUser. By default, the user is added to PUBLIC. If the <code>DbGroups</code> parameter is specifed, <code>DbUser</code> is added to the listed groups for any sessions created using these credentials.</p>"
2939+
"documentation":"<p>A database user name that is authorized to log on to the database <code>DbName</code> using the password <code>DbPassword</code>. If the specified DbUser exists in the database, the new user name has the same database permissions as the the user named in DbUser. By default, the user is added to PUBLIC. If the <code>DbGroups</code> parameter is specifed, <code>DbUser</code> is added to the listed groups for any sessions created using these credentials.</p>"
29402940
},
29412941
"DbPassword":{
29422942
"shape":"SensitiveString",
@@ -3762,6 +3762,10 @@
37623762
"DefaultIamRoleArn":{
37633763
"shape":"String",
37643764
"documentation":"<p>The Amazon Resource Name (ARN) for the IAM role that was set as default for the cluster when the cluster was created. </p>"
3765+
},
3766+
"LoadSampleData":{
3767+
"shape":"String",
3768+
"documentation":"<p>A flag that specifies whether to load sample data once the cluster is created.</p>"
37653769
}
37663770
},
37673771
"documentation":"<p/>"
@@ -4228,7 +4232,7 @@
42284232
},
42294233
"DataShareAssociations":{
42304234
"shape":"DataShareAssociationList",
4231-
"documentation":"<p>A value that specifies when the datashare has an association between a producer and data consumers.</p>"
4235+
"documentation":"<p>A value that specifies when the datashare has an association between producer and data consumers.</p>"
42324236
},
42334237
"ManagedBy":{
42344238
"shape":"String",

0 commit comments

Comments
 (0)