Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
MODIFYSELECTMODIFYMODIFYMODIFYSELECTMANAGEUseProxy=1;ProxyHost=my.host.com;ProxyPort=6789
```json
"options": {
"disableSensitiveDataDiscovery": true,
"tableTags": [
"Skip Stats Job"
]
}
```curl \
--request POST \
--header "Content-Type: application/json" \
--header "Authorization: Bearer dea464c07bd07300095caa8" \
--data @example_payload.json
https://your-immuta-url.com/jobs?bulkId=<your-bulkId> {
"total":"99893",
"completed":"99892",
"failed":"0",
"pending":"1",
"errors":null
}# Fill these out
# Please use .json extension for key
export SERVICE_ACCOUNT=datasource-account
export PROJECT_ID=project123
export IMMUTA_GCP_KEY_FILE=~/GCP_${SERVICE_ACCOUNT}_key.json
# Create service account for creating data sources
gcloud iam service-accounts create ${SERVICE_ACCOUNT} --project ${PROJECT_ID}
# Generate keyfile
gcloud iam service-accounts keys create ${IMMUTA_GCP_KEY_FILE} --iam-account=${SERVICE_ACCOUNT}@${PROJECT_ID}.iam.gserviceaccount.com
# Allow account to execute queries
#gcloud projects add-iam-policy-binding ${PROJECT_ID} \
#--member="serviceAccount:${SERVICE_ACCOUNT}@${PROJECT_ID}.iam.gserviceaccount.com" --role=projects/${PROJECT_ID}/roles/bigquery.user
gcloud projects add-iam-policy-binding ${PROJECT_ID} \
--member="serviceAccount:${SERVICE_ACCOUNT}@${PROJECT_ID}.iam.gserviceaccount.com" --role=roles/bigquery.user
# Allow account to view data
gcloud projects add-iam-policy-binding ${PROJECT_ID} \
--member="serviceAccount:${SERVICE_ACCOUNT}@${PROJECT_ID}.iam.gserviceaccount.com" --role=roles/bigquery.dataViewer
echo if something went wrong and you want to delete the service account, run:
echo gcloud iam service-accounts delete ${SERVICE_ACCOUNT}@${PROJECT_ID}.iam.gserviceaccount.com --project ${PROJECT_ID}connectionKey: redshift
connection:
hostname: your-redshift-cluster.djie25k.us-east-1.redshift.amazonaws.com
port: 5439
ssl: true
database: your_database_with_external_schema
username: awsuser
password: your_password
handler: Redshift
schema: external_schema
nameTemplate:
dataSourceFormat: <Tablename>
schemaFormat: <schema>
tableFormat: <tablename>
schemaProjectNameFormat: <Schema>
nativeSchemaFormat: <schema>_immuta
nativeViewFormat: <tablename>
sources:
- all: truecurl -X 'POST' \
'https://www.organization.immuta.com/api/v2/data' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'Authorization: Bearer b64dbdcd29e24ae88a5b3ce0507df019' \
-d '{
"connectionKey": "redshift",
"connection": {
"hostname": "your-redshift-cluster.djie25k.us-east-1.redshift.amazonaws.com",
"port": "5439",
"ssl": true,
"database": "your_database_with_external_schema",
"username": "awsuser",
"password": "your_password",
"handler": "Redshift",
"schema": "external_schema"
},
"nameTemplate": {
"dataSourceFormat": "<Tablename>",
"schemaFormat": "<schema>",
"tableFormat": "<tablename>",
"schemaProjectNameFormat": "<Schema>",
"nativeSchemaFormat": "<schema>_immuta",
"nativeViewFormat": "<tablename>"
},
"sources": [
{
"all": true
}
]
}'NewNewNew.UseProxy=1;ProxyHost=my.host.com;ProxyUID=your-username;ProxyPort=6789;ProxyPwd=your-password