-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(ingestion): add logging, make job more resilient to errors #4331
fix(ingestion): add logging, make job more resilient to errors #4331
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice! :)
url, | ||
connect_args=self.config.get_sql_alchemy_connect_args(), | ||
**self.config.options, | ||
) | ||
|
||
def inspect_version(self) -> Any: | ||
db_engine = self.get_metadata_engine() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it possible this will be null?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think so. Do you see any case?
|
||
def inspect_role_grants(self) -> Any: | ||
db_engine = self.get_metadata_engine() | ||
cur_role = None |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can make this equal to self.config.role
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did not want to edit the existing config so used a different variable. I am putting it in self.report.role
for reporting.
@@ -27,6 +27,9 @@ grant select on all views in database <your-database> to role datahub_role; | |||
grant usage on future schemas in database "<your-database>" to role datahub_role; | |||
grant select on future tables in database "<your-database>" to role datahub_role; | |||
|
|||
// Grant privileges on snowflake default database - needed for lineage | |||
grant imported privileges on DATABASE snowflake to role datahub_role; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is already on line 46
@@ -27,6 +27,9 @@ grant select on all views in database <your-database> to role datahub_role; | |||
grant usage on future schemas in database "<your-database>" to role datahub_role; | |||
grant select on future tables in database "<your-database>" to role datahub_role; | |||
|
|||
// Grant privileges on snowflake default database - needed for lineage | |||
grant imported privileges on DATABASE snowflake to role datahub_role; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is already on line 46
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Handled in #4341. Thanks for catching
Added
Fix
connect_args
for lineage for some cases in snowflake sourcesThe gms version is shown in sink report as follows
The added fields are shown in report for snowflake as follows
Failure report for wrong credentials snowflake
Checklist