Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

View Categories

Configuring the Application

Once you have bound the required references and privileges, you will be able to access the Configuration application. This interface includes five tabs:

  1. Privileges
  2. External Access Hosts
  3. Secrets
  4. Compute
  5. Services

Step 1: Check and Set Privileges #

If required privileges are already configured during the setup, proceed to the Compute tab to create a warehouse and compute pools. If not, set up the privileges by navigating to the Privileges tab.

Step 2: Create External Access Hosts #

In the External Access Hosts tab, set up your external integration hosts related to AWS S3 Buckets, Azure Storage, and /or SFTP Host access settings that will be used by the app. This will be used to bind the privileges of the application with the external access host. 

Fill in the corresponding fields to add the desired External Access Hosts in the External Access Hosts tab.   

Once the privileges are set any addition or deletion to external hosts will require the following steps.   

External Hosts Addition or Deletion  #

1. Go to the installed apps page in Snowflake and  

2. Open options menu by clicking on the three dots (…) at the right corner of app and select ‘View Details’ from the three dots menu   

3. Click on ‘Connections’ tab 

4. Click on the three-dot menu under connections and click on ‘Delete Connection’. 

This is a required step to add or update the connection settings with New external hosts or updated external hosts connection. 

Step 3: Configure AWS Secret Manager #

Once compute pools are configured, go to the Secrets tab and set up AWS Secrets Manager credentials. Provide the following details:

  • AWS Access Key ID
  • AWS Secret Access Key
  • AWS Secret Name
  • AWS Region

Step 4: Create Compute Pools #

In the Compute tab, set up your warehouse and compute pools that will be used by the app.

Step 5: Manage Services and Logs #

After configuring secrets, navigate to the Services tab. You will see two sections:

1- Manage Services Section: #
  • Start: Launches the main application. Once the application starts, other options like Fetch, Stop, and Refresh will be enabled.
  • Fetch URL: Generates the application URL, which users can access to logging in application.
  • Stop: Stops the main application.
  • Refresh: Refreshes the configuration.
2- Logs and Status Actions Section: #
  • Fetch Frontend logs
  • Fetch Backend logs
  • Fetch Worker logs
  • Fetch Frontend status
  • Fetch Backend status
  • Fetch Worker status

These buttons allow you to monitor the logs and status of the frontend, backend, and workers for troubleshooting.