Encrypt Network Traffic
Looker strongly recommends encrypting network traffic between the Looker application and your database. Consider one of the options described in our documentation on enabling secure database access.
The Exasol JDBC drivers support encrypted connections. If you’re interested, see Exasol’s documentation.
Create a Looker User
First, create a designated Looker user and give it the ability to create sessions:
CREATE USER LOOKER IDENTIFIED BY "<password>"; GRANT CREATE SESSION TO LOOKER;
Put the password in double quotes as shown above. Otherwise, it will be stored as case-insensitive; ChangeIt will be stored as CHANGEIT.
Give the Looker user the appropriate
SELECT permissions for the data tables you plan to access from Looker. If you want to access additional tables in the future, you will need to grant
SELECT on those new tables as well.
GRANT SELECT ON <all tables that will be used by LOOKER>;
Alternatively, if you do not want to have to re-run
GRANT statements on newly created tables in the future:
GRANT SELECT ANY TABLE TO LOOKER;
Persistent Derived Tables
If you want to enable PDTs for your Looker connection to Exasol, run this command:
CREATE SCHEMA LOOKER_SCRATCH; ALTER SCHEMA LOOKER_SCRATCH CHANGE OWNER LOOKER;
Enable Query Killing
To allow the Looker user to kill queries, run this command that gives them the ability to kill Exasol sessions:
GRANT KILL ANY SESSION TO LOOKER;
Enable Symmetric Aggregates
To allow Exasol to take advantage of symmetric aggregates, create the
Looker’s ability to provide some features depends on whether the database dialect can support them.
In the current Looker release, Exasol supports the following Looker features:
After completing the database connection, configure authentication options.