Access to the Data Lake is provided to customers who have purchased the Data lake Bolt-on and to customers on “Advanced” package. Please contact your Customer Success Manager if you are interested in access to the Data Lake. |
This guide illustrates the steps needed to provide you with access to the Data Lake.
To ensure the security of your Data Lake, we follow the principle of least privilege. This means we only whitelist the necessary IPs to access the Data Lake. Please ensure that:
Only the specific IPs or IP ranges that will need access to the Data Lake are provided. We recommend whitelisting only a small number of IPs for the most secure access.
If you are unsure which IPs to whitelist, please consult with your IT team to verify the minimal set of IPs needed for access.
Avoid providing large IP ranges, unless absolutely necessary. Whitelisting large ranges increases the attack surface and poses unnecessary security risks.
Redshift Endpoint Access: In addition to whitelisting your IPs, ensure your firewall is configured to allow access to the Redshift endpoint.
IP Whitelisting Policy for Datalake AccessTo enhance security and ensure efficient access control, we enforce a strict IP whitelisting policy:
This policy ensures a secure and efficient way for customers to access the datalake while preventing excessive exposure. |
Ensure you have the following details prepared:
Your Subdomain: The subdomain associated with your company in our system.
Your IP Address: Access to the Data Lake is restricted to whitelisted IPs. Provide all the IP addresses that will be used to access the Data lake by all users that will be authorized to do so in your organization.
Point of Contact: Identify the primary contact person at your organization for this request. This person will receive secure credentials for access.
To request access:
Create a Support question in our customer portal.
Include the following in your request:
Your company subdomain.
The IP addresses to whitelist.
The name and email of the primary contact person.
Once your request is received:
A read-only user will be created for your subdomain in the Data Lake.
Connection credentials, including the username and connection details, will be securely shared with you via email.
The IP addresses provided will be whitelisted.
Note: The credentials will be stored securely in our system, but ensure you save them securely for your use. |
After receiving your credentials:
Use the provided credentials to verify access to the schema and tables. You can use a psql connection, example below:
# connect using psql client psql -d prod_eu1 -U datalake_access_<subdomain>_db_user -h bi.la-dl.com -p 5439 # list all of the available tables of your schema /dt <subdomain>.* # view data in a table select * from <subdomain>.tags limit 10; |
If you encounter any issues or have any question, please comment on your open ticket or raise a new support ticket.