Access to the Data Lake is provided to customers who have purchased the Data lake Bolt-on and to customers on “Advanced” package. Please contact your Customer Success Manager if you are interested in access to the Data Lake.

This guide illustrates the steps needed to provide you with access to the Data Lake.

Preliminary considerations: Security Best Practices

To ensure the security of your Data Lake, we follow the principle of least privilege. This means we only whitelist the necessary IPs to access the Data Lake. Please ensure that:

IP Whitelisting Policy for Datalake Access

To enhance security and ensure efficient access control, we enforce a strict IP whitelisting policy:

  1. Minimal Access Approach

    • Customers must specify only the necessary users or machines requiring access.

    • Instead of large CIDR blocks, only the exact IPs of authorized users/machines should be provided.

    • This minimizes security risks and ensures controlled access.

  2. Maximum 5 IPs Per Customer

    • Each customer can whitelist up to 5 IP addresses for accessing the datalake.

    • Requests exceeding this limit will need to be analysed and approved.

    • Customers should carefully choose the most essential IPs for access.

This policy ensures a secure and efficient way for customers to access the datalake while preventing excessive exposure.

Process to request access

Step 1: Gather the Required Information

Ensure you have the following details prepared:

  1. Your Subdomain: The subdomain associated with your company in our system.

  2. Your IP Address: Access to the Data Lake is restricted to whitelisted IPs. Provide all the IP addresses that will be used to access the Data lake by all users that will be authorized to do so in your organization.

  3. Point of Contact: Identify the primary contact person at your organization for this request. This person will receive secure credentials for access.

Step 2: Submit Your Request

To request access:

  1. Create a Support question in our customer portal.

  2. Include the following in your request:

Step 3: Access Provisioning

Once your request is received:

  1. A read-only user will be created for your subdomain in the Data Lake.

  2. Connection credentials, including the username and connection details, will be securely shared with you via email.

  3. The IP addresses provided will be whitelisted.

Note: The credentials will be stored securely in our system, but ensure you save them securely for your use.

Step 5: Test Access

After receiving your credentials:

  1. Use the provided credentials to verify access to the schema and tables. You can use a psql connection, example below:

# connect using psql client
psql -d prod_eu1 -U datalake_access_<subdomain>_db_user -h bi.la-dl.com -p 5439

# list all of the available tables of your schema
/dt <subdomain>.*

# view data in a table
select * from <subdomain>.tags limit 10;
  1. If you encounter any issues or have any question, please comment on your open ticket or raise a new support ticket.