SQL Runner 0.3.0 released
We are pleased to announce version 0.3.0 of SQL Runner. SQL Runner is an open source app, written in Go, that makes it easy to execute SQL statements programmatically as part of a Snowplow data pipeline.
This release adds some powerful new features to SQL Runner – many thanks to community member Alessandro Andrioni for his huge contributions towards this release!
For the first time, we are also publishing SQL Runner binaries for Windows and OS X to make it easier to test your SQL Runner playbooks locally.
- Command-line variables
- Resuming a playbook from partway thru
- AWS credentials template functions
- Upgrading
- Getting help
1. Command-line variables
With SQL Runner 0.3.0, you can now add extra variables to a playbook run dynamically, using the -var
CLI argument. This allows you to pass in a series of key-pair values which will be used for templating purposes.
This can be useful in a few ways:
- To define a variable dynamically rather than statically (e.g. pass in an important timestamp)
- To avoid storing sensitive variables in playbooks
- To override existing variables set in the playbook for testing or debugging purposes
Many thanks to Alessandro Andrioni for this great new feature!
2. Resuming a playbook from partway thru
Running SQL against a database is an inherently brittle process, and as a result playbooks can occasionally fail part way through. Once the underlying issue has been fixed, you typically want to restart the playbook, either from the step that failed or from step immediately after.
In this release you can now restart a playbook run from partway thru the playbook:
Some notes on this:
- When passing the step name ensure that you wrap it in double quote marks
- The step name must be present in the supplied playbook, or the SQL Runner will fail-fast
- All targets will be started from the same step
3. AWS credentials template functions
The COPY
and UNLOAD
Redshift SQL statements are powerful tools for loading and extracting data, but unfortunately they require the embedding of AWS credentials to operate. To make this more secure, in this release we have introduced four new template functions:
awsEnvCredentials
: retrieves your AWS credentials from the environment variablesAWS_ACCESS_KEY_ID
andAWS_SECRET_ACCESS_KEY
awsProfileCredentials
: supports getting credentials from a regular AWS credentials fileawsEC2RoleCredentials
: supports getting role-based AWS credentialsawsChainCredentials
: tries to get credentials from each of the three methods above, in the order given
Each of these will output the string in the Redshift credentials format; CREDENTIALS 'aws_access_key_id=%s;aws_secret_access_key=%s'
.
If AWS credentials cannot be found in the searched locations, then each target will fail.
Again, many thanks to Alessandro Andrioni for contributing this powerful new functionality.
4. Upgrading
SQL Runner 0.3.0 is available as a standalone binary for 64-bit Linux, Windows and OS X on Bintray. Download them like so:
Once downloaded, unzip it (Linux for example):
Run it like so:
5. Getting help
For more details on this release, please check out the SQL Runner 0.3.0 release notes on GitHub.
If you have any questions or run into any problems, please raise an issue or get in touch with us through the usual channels.