Replies: 2 comments 2 replies
-
@Fleid when IAM authentication is involved, so are AWS API calls. Can any of this be discerned from the redshift describeclusters API response? I'm not sure that it would fully solve this, but it'd be nice to not need to configure something that dbt can discover. |
Beta Was this translation helpful? Give feedback.
-
I think that the
It would of course be possible to determine whether the given cluster is serverless or not by attempting the |
Beta Was this translation helpful? Give feedback.
-
Hey all,
I'm looking at #171 and #138 and even #94, and I'm left wondering what we should do with cluster type in terms of config.
Currently there are mostly 3 cluster types available as a Redshift user, independently of dbt:
The current default behaviour in dbt is to assume DC2/DS2, and enable "RA3 mode" by using
ra3_node
in the profile. See #171 for why we may actually not really need it anymore.Now when trying to enable IAM authentication on Serverless, in #138, we're realizing that we may need a flag to differentiate the authentication logic for Serverless. In #139 we see a
serverless
profile config appearing.Now I'm not a big fan of having multiple parameters to describe a single property (
is_ra3:true|false
+is_serverless:true|false
) when what we need to know is actuallycluster_type: ra3|serverless|dc2...
. Refactoring toward a single config is a first option here.Another option would be to try to abstract that away, and build logic to handle the authentication across cluster types, transparently to the user. One way could be to parse the hostname and check if
serverless
's in there - but it's not perfect. And what about other features, specific to a cluster type, that we may need to surface anyway?There doesn't seem to be an obvious answer here, so I was wondering if anyone had strong feelings / opinions on the topic.
Thanks :)
Beta Was this translation helpful? Give feedback.
All reactions