This chapter explains some common configuration, tooling, and ingestion patterns and later expands our scripts to deliver sample code generators for immediate and future use. The previous chapters looked at how to secure our account and monitor our security settings with historized data, providing robust mechanisms to allow full recovery to any point in time. Using scripts, you have become familiar with some implementation patterns, which we will now build upon. But familiarity breeds contempt, and from personal ...
7. Ingesting Data
Get Building the Snowflake Data Cloud: Monetizing and Democratizing Your Data now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.