In the previous article of this 2-part blog, I outlined how Row-Level security can be implemented using Amazon Spectrum and Redshift.
This post deals with how tables and schemas can be created manually as part of row-level security.
Cloudy, with a chance of Downtime
Stephen McMaster's Personal Cloud and Technology Blog
In the previous article of this 2-part blog, I outlined how Row-Level security can be implemented using Amazon Spectrum and Redshift.
This post deals with how tables and schemas can be created manually as part of row-level security.
Part of the challenge of using some reporting applications on AWS is the limited connectors that are often available.
A recent challenge required reporting on data that was held in S3 and also to apply row-level security to that data. The reporting application in question did not have connectors for S3 but could connect to a database.
This article describes how I achieved this using AWS services.
This article is in two parts – Part I (this part) describes the configuration of the components at a high level. The next article will discuss how the objective can be automated.