It is an AWS best practice to keep your Redshift clusters private for security reasons. If your cluster is public, any machine on the internet can establish a connection to it which can lead to SQL injection or DDoS attack.
Use this to initiate a workflow based on time, events or HTTP calls.
Select resources on which you want to work on.
Enter parameters to filter resources in the workflow.
Use this to get approval from stakeholder to continue the workflow.
Select action to be done on resources in the workflow.