- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Confirm Redshift clusters are not using default port 5439 to protect against non-targeted attacks.
Using a custom port can protect your publicly accessible AWS Redshift clusters against potential brute-force and dictionary attacks. Although setting a custom port can help fend off these attacks, it is also recommended to restrict public access, use SSL to encrypt client connections to database clusters, and control cluster access through security groups and Network Access Control Lists (NACLs) to add an additional layer of security for your account.
Follow the [Getting information about cluster configuration][7] docs to access your cluster configuration information. If the cluster has a port 5439, it is the default port. Modify the port number in the console.
Run describe-clusters
with a cluster-identifier
to retrieve cluster metadata.
describe-clusters.sh
aws redshift describe-clusters
--cluster-identifier cluster-name
Run create-cluster-snapshot
with create a snapshot of your database cluster.
create-cluster-snapshot.sh
aws redshift create-cluster-snapshot
--cluster-identifier cluster-name
--snapshot-identifier snapshot-identifier
Run restore-from-cluster-snapshot
to create a new cluster from the snapshot created above. Use the retrieved metadata in step one to configure a new port number.
restore-from-cluster-snapshot.sh
aws redshift restore-from-cluster-snapshot
...
--cluster-identifier cluster-name
--snapshot-identifier snapshot-identifier
--port 2000