-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Redshift Destination: Add SSH Tunnelling Config Option #23523
Redshift Destination: Add SSH Tunnelling Config Option #23523
Conversation
Issue: #12131 User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations. Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host. Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file
Affected Connector ReportNOTE
|
Connector | Version | Changelog | Publish |
---|
- See "Actionable Items" below for how to resolve warnings and errors.
✅ Destinations (1)
Connector | Version | Changelog | Publish |
---|---|---|---|
destination-redshift |
0.4.0 |
✅ | ✅ |
- See "Actionable Items" below for how to resolve warnings and errors.
👀 Other Modules (1)
- base-normalization
Actionable Items
(click to expand)
Category | Status | Actionable Item |
---|---|---|
Version | ❌ mismatch |
The version of the connector is different from its normal variant. Please bump the version of the connector. |
⚠ doc not found |
The connector does not seem to have a documentation file. This can be normal (e.g. basic connector like source-jdbc is not published or documented). Please double-check to make sure that it is not a bug. |
|
Changelog | ⚠ doc not found |
The connector does not seem to have a documentation file. This can be normal (e.g. basic connector like source-jdbc is not published or documented). Please double-check to make sure that it is not a bug. |
❌ changelog missing |
There is no chnagelog for the current version of the connector. If you are the author of the current version, please add a changelog. | |
Publish | ⚠ not in seed |
The connector is not in the seed file (e.g. source_definitions.yaml ), so its publication status cannot be checked. This can be normal (e.g. some connectors are cloud-specific, and only listed in the cloud seed file). Please double-check to make sure that it is not a bug. |
❌ diff seed version |
The connector exists in the seed file, but the latest version is not listed there. This usually means that the latest version is not published. Please use the /publish command to publish the latest version. |
Issue: #12131 User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations. Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host. Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file
…com:airbytehq/airbyte into jeff/add-ssh-tunnel-to-redshift-destination
/test connector=connectors/destination-redshift
Build FailedTest summary info:
|
...a/io/airbyte/integrations/destination/redshift/SshRedshiftDestinationBaseAcceptanceTest.java
Outdated
Show resolved
Hide resolved
Update the version id. Touch up the docs.
/test connector=connectors/destination-redshift
Build FailedTest summary info:
|
/test connector=connectors/destination-redshift
Build PassedTest summary info:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Conditionally approved assuming /test
passes
airbyte-integrations/connectors/destination-redshift/Dockerfile
Outdated
Show resolved
Hide resolved
...a/io/airbyte/integrations/destination/redshift/SshRedshiftDestinationBaseAcceptanceTest.java
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
one small question around the top-level destination class, otherwise lgtm
...redshift/src/main/java/io/airbyte/integrations/destination/redshift/RedshiftDestination.java
Show resolved
Hide resolved
Confirmed that normalization will work through the tunnel configuration as well. |
…com:airbytehq/airbyte into jeff/add-ssh-tunnel-to-redshift-destination
/publish connector=connectors/destination-redshift
if you have connectors that successfully published but failed definition generation, follow step 4 here |
Looks like some integration tests are failing to connect to Redshift while executing
|
seems more related to Redshift limits per some docs I'm reading. Raising the limit might not be a great solution as that requires some back and forth with Amazon. I suspect something is either leaking connections or we are running these tests in parallel at too high a rate. Not sure why integration tests are using so many connections per se. |
/publish connector=connectors/destination-redshift
if you have connectors that successfully published but failed definition generation, follow step 4 here |
The change to running integration tests in parallel, combined with a 4 hour idle session timeout in redshift causes an accumulation of idle sessions that cause resource shortages running tests. I have lowered the idle session time to 60 in Redshift and local testing look promising. Running another /publish run to verify |
/publish connector=connectors/destination-redshift
if you have connectors that successfully published but failed definition generation, follow step 4 here |
/test connector=connectors/destination-redshift
Build PassedTest summary info:
|
* Redshift Destination: Add SSH Tunnelling Config Option Issue: airbytehq#12131 User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), just as in Postgres, etc. destinations. Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host. Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file * README.md updates ** Move the pem info into the secrets config files ** Update the version id to 0.4.0 ** Touch up the docs ** adding a note about S3 staging NOT using the SSH Tunnel configuration, if provided. ** make base class abstract to prevent double running the same tests Co-authored-by: Octavia Squidington III <[email protected]>
Issue: #12131
Acceptance tests pass and exercise both Insert and S3 type loading options as well as password and key based authentication with the SSH bastion host.
Airbyters: Credentials/configs for acceptance testing against AWS Redshift are updated in Google Cloud Secret Manager. Be sure to get both the config.json and config_staging.json as well as the new PEM file
What
User would like to be able to access their Redshift Destination database via an SSH Tunnelling config (SSH Bastion Host), similar to Postgres, MySQL, etc. destinations.
How
This change wraps the Destination constructor in the SSHWrappedDestination, which injects SSH configuration options into the connector configuration spec.
Recommended reading order
🚨 User Impact 🚨
Are there any breaking changes? What is the end result perceived by the user? If yes, please merge this PR with the 🚨🚨 emoji so changelog authors can further highlight this if needed.
We are not expecting any breaking changes as this is an enabling PR, adding new features and capabilities only.
Pre-merge Checklist
Expand the relevant checklist and delete the others.
New Connector
Community member or Airbyter
airbyte_secret
./gradlew :airbyte-integrations:connectors:<name>:integrationTest
.README.md
bootstrap.md
. See description and examplesdocs/integrations/<source or destination>/<name>.md
including changelog. See changelog exampledocs/integrations/README.md
airbyte-integrations/builds.md
Airbyter
If this is a community PR, the Airbyte engineer reviewing this PR is responsible for the below items.
/test connector=connectors/<name>
command is passing/publish
command described hereUpdating a connector
Community member or Airbyter
airbyte_secret
./gradlew :airbyte-integrations:connectors:<name>:integrationTest
.README.md
bootstrap.md
. See description and examplesdocs/integrations/<source or destination>/<name>.md
including changelog. See changelog exampleAirbyter
If this is a community PR, the Airbyte engineer reviewing this PR is responsible for the below items.
/test connector=connectors/<name>
command is passing/publish
command described hereConnector Generator
-scaffold
in their name) have been updated with the latest scaffold by running./gradlew :airbyte-integrations:connector-templates:generator:testScaffoldTemplates
then checking in your changes