Index
A
Access control
Access model
assign roles to user
create task
database
discretionary access control
end user/service user
object creation
overview
owner schema build
RBAC
remove all objects
role grants
roles
sample automation
sample object/role layout
schema
search path
SET declarations
staging data load
test stored procedure
troubleshooting
warehouse
Account management
Account Usage store
access
best practices
database/warehouse/schema
declarations
definition
enabling
functional requirements
role grants
roles
streams/tasks
Active Directory (AD)
Active Directory Federated Services (ADFS)
API Gateway
API integration
Application programming interfaces (APIs)
Assumptions
Asynchronous monitoring
account parameters
network parameters
SCIM
Attack vectors
Authentication
AUTO_INGEST Snowpipe
configure AWS SQS
notification channel
set up snowflake objects
SQS integration
test
Automatic clustering
AWS Management Console
AWS PrivateLink
AWS storage integration
Azure Private Link
B
Backup strategy
Bring your own key (BYOK)
Built-in reporting screens
Bulk load approach
Business continuity
Business key collision code (BKCC)
Business model
C
Centralized cost monitoring
conceptual model
cost monitoring setup
replication
reporting database setup
Change bundles
Change data capture (CDC)
Classless Inter-Domain Routing (CIDR)
Client redirect
Cloning
Cloud service providers (CSPs)
Cloud services layer
access control
authentication
infrastructure management
metadata management
query optimizer
result cache
Clustering
automatic
identify keys
JSON
key operations
materialized views
optimizing compression
query
setup test data
Snowflake
warehouses
concurrency
query runtime/memory spills
scaling options
workload segregation
Compound annual growth rate (CAGR)
Conditional masking
Connectors
Contractual negotiations
Customer error
Customer managed key (CMK)
Custom roles
Cybersecurity
D
Database replication
Database schema
Database storage
Database views
Data breaches
Data capture
bulk load
CDC
pipeline/content
strategic approach
tactical approach
trickle feed
Data classification
convert to JSON
definition
deploy selected tags
flattening
identify data
semantic
semi-automation
Snowflake database
Data encryption
Data enrichment
Data Exchange
accessing data
accessing data exchange
listing
Manage Shared Data
managing data exchange
request
Snowsight
unpublish a listing
Data, information, knowledge, wisdom (DIKW) pyramid
Data lineage
Data management
automated tag deployment
data consumption
data custodians
data privacy
definition
metadata
Data manipulation language (DML) operations
Data modeling
advantages
approaches
Data pipelines
batch files
cleanup
conceptual data flow
conceptual end-to-end data flow
description
ELT/ETL tool
external stage approach
external tables
options
partner connect
real-time stream
Snowpipe
SeeSnowpipe
temporal data load
SeeTemporal data load
Data presentation
cleanup
conceptual data flow
data quality exceptions
dynamic data masking
SeeDynamic data masking
enrichment
object tagging
SeeObject tagging
reference data
SeeReference data
RLS
tag-based query
Data protection
backup strategy
Fail-safe
Time Travel
Data quality exceptions
Data security
Data silos
Data usage
Data Vault 2.0
business keys, not surrogate keys
business ontology
data representation
“direct to Kimball” approach
disadvantage
elements
expect change
experience counts
factors
hash clash
hashing
rehashing
SCD2 pattern
Data vaultDV core components
data vault table
hub
link
sample data vault pattern
satellites
usage
Dimensional modeling
assumption
business-friendly data model
data model
date
sample query
summary
Direct entitlement grants
Direct UI load
Disaster recovery (DR)
business continuity
client redirect
failover/failback
service status
Discretionary access control
Dynamic data masking
conditional masking
considerations
external tables
external tokenization
masked stream output
masked user_email
real-world data masking
and RLS
simple
unmasked raw data
E
End-to-end connectivity
Essential maintenance
External stage
External tokenization
Extract, load and transform (ELT)
Extract, transform and load (ETL)
F
Fail-safe
FILE FORMAT
Finer-grained approach
G
GCP Private Service Connect
Global services layer
Grants to role
H
Handling data files
Hash collision
High availability (HA)
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol Secure (HTTPS)
I
IAM policy
Identity and access management (IAM)
Immutable history
Immutable micro-partitions
Infrastructure management
Ingesting data
AWS storage integration
external storage
definition
IAM role and policy creation
S3 buckets
storage integration definition
test
troubleshooting
trust relationship
unload file
writing to S3
file format details
file format output
handling data files
loading and unloading data
SeeLoading and unloading data
secure connectivity
Snowflake and CSP interconnect
AWS PrivateLink
Azure Private Link
GCP Private Service Connect
types of stages
cleanup
named stage
Snowflake
table stage
user stages
INNER JOINs
Internal stage
International Data Corporation (IDC)
International Data Group (IDG)
Internet of Things (IoT)
Internet Protocol (IP) address
J, K
JavaScript Object Notation (JSON)
L
Lambda function
Large-scale vendor application
Line of business (LoB)
Live production systems
Loading and unloading data
AWS Management Console
direct UI load
ELT/ETL
MFT
SFTP
SnowSQL
London Stock Exchange Group’s (LSEG)
M
Managed File Transfer (MFT)
Materialized views
automation
direct query
Firefox JSON sample display
JSON content
JSON structure
LATERAL and FLATTEN
limitations
Metadata
Micro-partitions
Migration
Multi-cluster compute
Multi-factor authentication (MFA)
Multi-region failure
Multi-tenant model
N
National Institute of Standards and Technology (NIST)
Network-attached storage (NAS)
Network policies
O
Object entitlement grants
Object tagging
multiple tag value implementation
single tag value implementation
tag cleanup
tag identification
tag taxonomy
tag uniqueness
Object tagging automation
apply tags
automating monitor/suspect task
automating tag deployment
checking tag usage
setup test data
Okta
Online transaction processing (OLTP)
Organizational estate
Organizations feature
OUTER JOINs
P
Parameter mismatch test
Penetration testing
Periodic rekeying
PrivateLink
Proof of concept (POC)
Python
Python Lambda Function
Q
Query profiling
R
Reader accounts
Real-time stream
Reference data
completing
externally sourced reference data
internal business-focused reference data
monitor output
schema objects
secure view
testing
upload test files into S3
validation
Region failure
Relational database management system (RDBMS)
Replication
cloud provider and region
cloud provider/different region
cloud provider/same region
different cloud provider/different region
limitations
Reporting as a service (RaaS)
REST API
Role-based access control (RBAC)
Row-level security (RLS)
S
Salesforce integration
SAML-tracer messages
Sample scripts
S3 buckets
S3 bucket security
Scaling
Secure connectivity
Secure Direct Data Share
ACCOUNTADMIN role
applications
conceptual model
data interchange
micro-partitions
reader accounts
replicate before share
TEST database
Secure File Transfer Protocol (SFTP)
Security framework
Security posture
alerting
attack vectors
first control
monitoring
NIST
prevention
protection
Semi-structured data
automation
AWS Management Console
DIRECTORY
ENCRYPTION addresses
FILE FORMAT
handling large files
JSON
materialized views
direct query
JSON content
limitations
setting event notification
setting SQS queue
variant data type
Serverless compute
Shared data conceptual model
Simple masking
Single availability zone failure
Single sign-on (SSO)
ADFS
enable
IdP
troubleshooting
users
Single tenant model
Slowly Changing Dimension (SCD) modeling
Snowflake and CSP interconnect
AWS PrivateLink
Azure Private Link
GCP Private Service Connect
Snowflake API integration
API integration creation
API key creation
Snowflake architecture
Snowflake capabilities
Snowflake data cloud
benefits
compliance
control
data security
data volumes
hardware/software
performance
staffing
CSP
data exchange
data interchange options
engagement criteria
features
business lifecycle
first-mover advantage
future state
innovations
functions
global data mesh
global perspective
locations
options
platform
published research
re-platforming
Secure Direct Data Share
Snowflake Data Exchange
Snowflake Marketplace
Snowflake deliver data
Snowflake documentation
Snowflake Marketplace
accessing data
content
Data Exchange
managing
provider
select provider
Snowflake Inc. financial data
Snowflake Partner Network
standard data listing
Snowflake Pipe object
Snowflake provisioning
Snowflake role hierarchy
Snowflake security options
network policies
restrict data unloads
unauthorized data unload
Snowflake services
accounts
cloud services layer
database storage
editions
global services layer
HA
organizations
patching/maintenance
provisioning
trial account
Snowflake-specific security features
Snowflake supplied roles
Snowflake VPC information
Snowgrid
Snowhouse
Snowpipe
ALTER PIPE response
AUTO_INGEST
configure AWS SQS
notification channel
set up snowflake objects
SQS integration
test
check pipe status
cleanup
considerations
copy history
overview
REST API
Snowflake Pipe object
Snowpipe automated ingestion
SnowSQL
Software development lifecycle (SDLC)
Storage
cloning
cluster keys
constraints
indexes
materialized views
micro-partitions
options
platforms/approach
shares
stages
Storage area network (SAN)
Streams
Stress testing
Structured Query Language (SQL)
API Gateway endpoint creation
API gateway proxy security
API integration
automation
AWS IAM role creation
cleanup
deploy lambda image
external function
IAM policy assign
invoke Lambda image
Lambda invocation
monitoring
Python Lambda function creation
remote service
Snowflake API integration
API integration creation
API key creation
Snowflake external function creation
Snowflake VPC information
tracking template
troubleshooting
trust relationship
Subject matter experts (SMEs)
Supre user entitlement
Synchronous monitoring
events
history retention
remove all objects
time-travel
System for cross-domain identity management (SCIM)
System migration
T
Table of contents (TOC)
Tag-based query
Tag taxonomy
Temporal data load
AUTO_REFRESH option
cleanup
core objects
directory refresh
set up test cases
Snowpipe
streams
temporal pipeline
automation
test
test file
actions
loads
outcomes
Temporal pipeline
application objects
application results
automation
objectives
Snowflake scheduling component
SQL statements
test
Tenancy model
account management
default roles
multi-tenant
single tenant
Third normal form (3NF)
assumption
core database design
database structures
denormalization
natural keys
sample physical data model
Snowflake
summary
surrogate keys
Third-party tools
Time Travel feature
Tracking usage
access history
data sharing usage
Trickle feed approach
U
Uniform Resource Locators (URLs)
Unstructured data
AWS Lambda
AWS Lambda basic information
CloudWatch
error example
sample output
file content extracting
file preparation
integrated approach
JSON file
Lambda function
mapping to JSON
troubleshooting
Unstructured documents
User-defined functions (UDTFs)
V
Validation
Virtual machine failure
Virtual Private Client (VPC)
Virtual warehouses
caching
monitoring
query processing
query profiling
scaling
server configuration
single warehouse concurrency
utilization
W, X, Y, Z
Warehouse scaling
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.136.22.179