Index
A
Active Directory Federation Services (ADFS)
Advanced Snowflake security features
future grants
managed access schemas
Aggregate function
Amazon S3 bucket
access keys
database creation
external stage
metadata columns
security and access control
S3 management console
staging table
stream creation
target table
TASK_HISTORY table function
Asynchronous query
Authorization server
AUTOCOMMIT
Availability zones
B
Bulk vs. continuous loading
Business agility
Business-as-usual (BAU) operations
Business continuity
data loss
monitoring replication progress
process flow
reconciling process
Business value
C
Caching
local disk cache
result cache
Change data capture(CDC)
Client application
Client redirect
Client-side encryption
Cloning
development database
discovery analytics
metadata-only operation
objects
permissions
production environment
Sales_Dev and Sales_Prod databases
sample database, creation
schema
table creation
tasks
test environments
Cloud computing
Cloud service provider’s (CSP)
Cloud services
access control
authentication
infrastructure management
metadata management
query parsing and execution
Clustering depth
Clustering key
Conceptual data lake pattern
Connectors
Kafka
querying data
asynchronous and synchronous queries
query ID
Snowflake connector for Python
Continuous data loading, Snowpipe
Continuous data protection (CDP) lifecycle
Continuous loading
COPY GRANTS command
COPY INTO command
parameters
syntax
transformations
CREATE TABLE AS SELECT command
CREATE TABLE CLONE command
CREATE TABLE LIKE command
CURRENT_ROLE function
Customer managed keys
Custom roles
D
Database storage
Data cache
Data clean rooms
Data Cloud
Data clustering
clustering depth
clustering key
pruning efficiency
reclustering
Data consumer
Data encryption
Data engineering, Java user-defined functions
Data frames
Data loading
COPY INTO command
dedicated virtual warehouses
file preparation
partitioning staged data
semistructured data
Web UI
Data marketplace
Data masking
DataOps
Data provider
Data replication
Data sharing
data marketplace
data exchange
monetization
dedicated database
providers and consumers
reader accounts
Data visualization tools
Dedicated virtual warehouses
Discretionary access control (DAC)
Dynamic masking policy
E
Encryption key management
Event-based serverless architecture
External named stages
External stage
External tables
Extract transform load (ETL) tool
F, G
Failback
Failover
Fail-safe
File formats
Future grants
H
Hardware security module (HSM)
HASH_AGG function
I
Inheritance
Internal stages
J
Java user-defined functions (UDFs)
Java virtual machine (JVM)
K
Kafka
Key management service (KMS)
Key pair authentication
L
Lambda function
Leveraging caching
Local disk cache
LOCK_TIMEOUT
M
Machine learning (ML) model
MANAGE GRANTS privilege
Materialized view
Micro-partitions
Multi-cluster warehouse
Multi-factor authentication (MFA)
authentication prompt screen
caching
device options
login flow
QR code, registration
Snowflake UI
N
Named internal stage
Native network security
Netflix
Network policies
O
OAuth
Object hierarchy
On-premise scaled down performance testing
Optimizing queries
aggregate node
cardinality
profile overview window
query profile
tutorials opening
web UI
P
Partitioning staged data
Partitioning strategy
Performance testing
Personally identifiable information (PII)
PII data handling
access controlling
auditing
removing data in bulk
separately storing data
Predefined system roles
Primary database
Privacy first principal
Promoting databases
Pruning efficiency
Q
Query history
Querying table data
Query processing
Queuing queries
R
Reclustering
Recovery point objective (RPO)
Recovery time objective (RTO)
Replication
Resource monitors
Resource server
Result cache
Retention Periods
Role-based access control model
Role hierarchy
Role inheritance
Row access policies
S
Scalar function
Scaling policy
Schedule Refresh dialog box
Search optimization service
Secondary database
Secure views
Security assertion markup language (SAML)
Semistructured data
Sensitive data
Service provider (SP)
Share
SHOW command
SHOW VARIABLES command
Single sign-on (SSO)
Snowflake’s architecture
Cloud services
SeeCloud services
database storage
data clustering
micro partitions
query processing
Snowpark API
Snowpipe
SnowSQL
authentication
config file
connecting to snowflake
copying files
database creation
table creation
versions and updates
viewing files
virtual warehouse
Solid state disk (SSD)
SQL variables
Storage
fail-safe
integration
temporary and transient tables
Stored procedure
Stream metadata columns
Stream object
Streams
Synchronous queries
SYSADMIN role
System-defined roles
T
Table functions
Tables creation
clone
copy grants
like
as select
Table stage
Tasks
Temporary tables
Time travel
data retention periods
dropping and undropping historical data
querying historical data
TIME TRAVEL function
Tracking change, stream
Transactions
locking and deadlocks
tips
within stored procedures
Transient tables
U
Underutilized warehouse
UNDROP command
Unloading data
UNSET command
User acceptance testing (UAT)
User and application authentication
key pair authentication
multi-factor authentication
SeeMulti-factor authentication (MFA)
OAuth
SAML
User-defined functions
scalar function
table functions
User stage
V
Virtual warehouses
configuration
auto suspend
number of clusters
scaling policy
Snowflake’s page
sizes
W,X, Y, Z
Warehouse utilization patterns
WHERE clause
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset