Skip to main content

Keebo Workload Intelligence Security Setup

Workload Intelligence (KWI) requires a dedicated Snowflake user, role, metadata views, and a warehouse before onboarding. This page covers each setup step and the security configurations involved.

What Metadata Does Workload Intelligence Access?

KWI accesses usage and storage metadata from six views across SNOWFLAKE.ACCOUNT_USAGE and SNOWFLAKE.INFORMATION_SCHEMA:

  • QUERY_HISTORY
  • WAREHOUSE_METERING_HISTORY
  • WAREHOUSE_EVENTS_HISTORY
  • TABLE_STORAGE_METRICS
  • TABLES
  • ACCESS_HISTORY

KWI does not access user data. For additional protection, a KEEBO_KWI_SCHEMA with restricted views limits access to only the required metadata fields.

How Is This Metadata Used?

KWI uses this metadata to provide visibility into workload patterns, resource consumption, and storage costs across the Snowflake environment. These fields provide insight into:

  • Workload distribution
  • Resource utilization
  • Query behaviors
  • Storage consumption and trends
  • Data access patterns

KWI's analysis identifies optimization opportunities, cost anomalies, and usage trends. A daily Snowflake task (6:30 AM UTC) populates pre-aggregated tables from these views, enabling efficient reporting without repeated queries against the raw metadata.

What Permissions Are Required?

Metadata views — read-only access via restricted views in KEEBO_KWI_SCHEMA:

ViewSourceAction
QUERY_HISTORYSNOWFLAKE.ACCOUNT_USAGESELECT
WAREHOUSE_METERING_HISTORYSNOWFLAKE.ACCOUNT_USAGESELECT
WAREHOUSE_EVENTS_HISTORYSNOWFLAKE.ACCOUNT_USAGESELECT
TABLE_STORAGE_METRICSSNOWFLAKE.INFORMATION_SCHEMASELECT
TABLESSNOWFLAKE.ACCOUNT_USAGESELECT
ACCESS_HISTORYSNOWFLAKE.ACCOUNT_USAGESELECT

Account-level actions:

PermissionPurpose
EXECUTE TASK ON ACCOUNTRun daily data collection task (6:30 AM UTC)
MONITOR ON ACCOUNTRead account-level usage metrics

Warehouse actions:

PermissionPurpose
USAGE on KEEBO_KWI_WAREHOUSEExecute data collection queries

Database, schema, and resource monitor access:

ResourcePermission
Database (KEEBO_KWI_DB)USAGE
Schema (KEEBO_KWI_SCHEMA)ALL
Each metadata viewALL
Resource monitor (KEEBO_KWI_MONITOR)MODIFY

How Does KWI Collect Data?

KWI uses Snowflake tasks to populate pre-aggregated data tables. These tasks run daily at 6:30 AM UTC. The tables are created asynchronously during onboarding, allowing KWI to begin data collection shortly after setup.

How Is the KWI User and Role Created?

To connect KWI to Snowflake, a dedicated role and user, along with the necessary permissions will need to be created. The following SQL scripts, which are part of the onboarding process, show how to setup these objects:

CREATE ROLE KEEBO_KWI_ROLE;
CREATE USER KEEBO_KWI_USER PASSWORD = '<password>';
GRANT ROLE KEEBO_KWI_ROLE TO USER KEEBO_KWI_USER;
ALTER USER KEEBO_KWI_USER SET DEFAULT_ROLE = KEEBO_KWI_ROLE;
ALTER USER KEEBO_KWI_USER SET TYPE = LEGACY_SERVICE;

How Are the Database and Schema Configured?

The following views provide KWI with read-only access to the metadata required for workload intelligence. All views are created under a dedicated database and schema.

Query History View

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.QUERY_HISTORY
AS
SELECT QUERY_ID,
QUERY_TEXT,
QUERY_HASH,
QUERY_HASH_VERSION,
QUERY_PARAMETERIZED_HASH,
QUERY_PARAMETERIZED_HASH_VERSION,
DATABASE_ID,
DATABASE_NAME,
SCHEMA_ID,
SCHEMA_NAME,
QUERY_TYPE,
SESSION_ID,
USER_NAME,
ROLE_NAME,
WAREHOUSE_ID,
WAREHOUSE_NAME,
WAREHOUSE_SIZE,
WAREHOUSE_TYPE,
CLUSTER_NUMBER,
QUERY_TAG,
EXECUTION_STATUS,
ERROR_CODE,
ERROR_MESSAGE,
START_TIME,
END_TIME,
TOTAL_ELAPSED_TIME,
BYTES_SCANNED,
PERCENTAGE_SCANNED_FROM_CACHE,
BYTES_WRITTEN,
BYTES_WRITTEN_TO_RESULT,
BYTES_READ_FROM_RESULT,
ROWS_PRODUCED,
ROWS_INSERTED,
ROWS_UPDATED,
ROWS_DELETED,
ROWS_UNLOADED,
BYTES_DELETED,
PARTITIONS_SCANNED,
PARTITIONS_TOTAL,
BYTES_SPILLED_TO_LOCAL_STORAGE,
BYTES_SPILLED_TO_REMOTE_STORAGE,
BYTES_SENT_OVER_THE_NETWORK,
COMPILATION_TIME,
EXECUTION_TIME,
QUEUED_PROVISIONING_TIME,
QUEUED_REPAIR_TIME,
QUEUED_OVERLOAD_TIME,
TRANSACTION_BLOCKED_TIME,
CREDITS_USED_CLOUD_SERVICES,
QUERY_LOAD_PERCENT,
OUTBOUND_DATA_TRANSFER_CLOUD,
OUTBOUND_DATA_TRANSFER_REGION,
OUTBOUND_DATA_TRANSFER_BYTES,
INBOUND_DATA_TRANSFER_CLOUD,
INBOUND_DATA_TRANSFER_REGION,
INBOUND_DATA_TRANSFER_BYTES,
LIST_EXTERNAL_FILES_TIME,
RELEASE_VERSION,
EXTERNAL_FUNCTION_TOTAL_INVOCATIONS,
EXTERNAL_FUNCTION_TOTAL_SENT_ROWS,
EXTERNAL_FUNCTION_TOTAL_RECEIVED_ROWS,
EXTERNAL_FUNCTION_TOTAL_SENT_BYTES,
EXTERNAL_FUNCTION_TOTAL_RECEIVED_BYTES,
IS_CLIENT_GENERATED_STATEMENT
FROM SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY;

GRANT ALL ON VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.QUERY_HISTORY TO ROLE KEEBO_KWI_ROLE;

Warehouse Metering History View

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.WAREHOUSE_METERING_HISTORY
AS
SELECT CREDITS_USED,
CREDITS_USED_CLOUD_SERVICES,
CREDITS_USED_COMPUTE,
END_TIME,
START_TIME,
WAREHOUSE_ID,
WAREHOUSE_NAME
FROM SNOWFLAKE.ACCOUNT_USAGE.WAREHOUSE_METERING_HISTORY;

GRANT ALL ON VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.WAREHOUSE_METERING_HISTORY TO ROLE KEEBO_KWI_ROLE;

Warehouse Events History View

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.WAREHOUSE_EVENTS_HISTORY
AS
SELECT CLUSTER_NUMBER,
EVENT_NAME,
EVENT_REASON,
EVENT_STATE,
QUERY_ID,
ROLE_NAME,
TIMESTAMP,
USER_NAME,
WAREHOUSE_ID,
WAREHOUSE_NAME
FROM SNOWFLAKE.ACCOUNT_USAGE.WAREHOUSE_EVENTS_HISTORY;

GRANT ALL ON VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.WAREHOUSE_EVENTS_HISTORY TO ROLE KEEBO_KWI_ROLE;

Table Storage Metrics View

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.TABLE_STORAGE_METRICS
AS
SELECT TABLE_CATALOG,
TABLE_SCHEMA,
TABLE_NAME,
ID,
CLONE_GROUP_ID,
IS_TRANSIENT,
ACTIVE_BYTES,
TIME_TRAVEL_BYTES,
FAILSAFE_BYTES,
RETAINED_FOR_CLONE_BYTES,
TABLE_CREATED,
TABLE_DROPPED,
TABLE_ENTERED_FAILSAFE,
CATALOG_CREATED,
CATALOG_DROPPED,
SCHEMA_CREATED,
SCHEMA_DROPPED,
COMMENT
FROM SNOWFLAKE.INFORMATION_SCHEMA.TABLE_STORAGE_METRICS;

GRANT ALL ON VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.TABLE_STORAGE_METRICS TO ROLE KEEBO_KWI_ROLE;

Tables View

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.TABLES AS
SELECT
TABLE_ID,
TABLE_NAME,
TABLE_SCHEMA_ID,
TABLE_SCHEMA,
TABLE_CATALOG_ID,
TABLE_CATALOG,
TABLE_OWNER,
TABLE_TYPE,
IS_TRANSIENT,
CLUSTERING_KEY,
ROW_COUNT,
BYTES,
RETENTION_TIME,
SELF_REFERENCING_COLUMN_NAME,
REFERENCE_GENERATION,
USER_DEFINED_TYPE_CATALOG,
USER_DEFINED_TYPE_SCHEMA,
USER_DEFINED_TYPE_NAME,
IS_INSERTABLE_INTO,
IS_TYPED,
COMMIT_ACTION,
CREATED,
LAST_ALTERED,
LAST_DDL,
LAST_DDL_BY,
DELETED,
AUTO_CLUSTERING_ON,
COMMENT,
OWNER_ROLE_TYPE,
INSTANCE_ID,
IS_ICEBERG,
IS_DYNAMIC
FROM SNOWFLAKE.ACCOUNT_USAGE.TABLES;

GRANT ALL ON VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.TABLES TO ROLE KEEBO_KWI_ROLE;

Access History View

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.ACCESS_HISTORY AS
SELECT
QUERY_ID,
QUERY_START_TIME,
USER_NAME,
DIRECT_OBJECTS_ACCESSED,
BASE_OBJECTS_ACCESSED,
OBJECTS_MODIFIED,
OBJECT_MODIFIED_BY_DDL,
POLICIES_REFERENCED,
PARENT_QUERY_ID,
ROOT_QUERY_ID
FROM SNOWFLAKE.ACCOUNT_USAGE.ACCESS_HISTORY;

GRANT ALL ON VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.ACCESS_HISTORY TO ROLE KEEBO_KWI_ROLE;

Account-Level Permissions

GRANT EXECUTE TASK ON ACCOUNT TO ROLE KEEBO_KWI_ROLE;
GRANT MONITOR ON ACCOUNT TO ROLE KEEBO_KWI_ROLE;

How Is Query Text Privacy Handled?

If privacy concerns exist regarding QUERY_TEXT, it can be hashed using SHA-256 to anonymize the text. Replace the QUERY_TEXT column in the Query History View with:

CREATE VIEW KEEBO_KWI_DB.KEEBO_KWI_SCHEMA.QUERY_HISTORY
AS
SELECT QUERY_ID,
SHA2(QUERY_TEXT, 256) AS QUERY_TEXT,
QUERY_HASH,
QUERY_HASH_VERSION,
QUERY_PARAMETERIZED_HASH,
QUERY_PARAMETERIZED_HASH_VERSION,
DATABASE_ID,
DATABASE_NAME,
...

How Is the KWI Warehouse Configured?

Resource Monitor

A resource monitor limits KWI warehouse spend. When KWI reaches its daily credit limit, the warehouse suspends automatically. A limit of 10 credits daily is recommended (3–5x typical usage), but this value can be adjusted.

CREATE RESOURCE MONITOR KEEBO_KWI_MONITOR
WITH CREDIT_QUOTA = 10
FREQUENCY = DAILY
START_TIMESTAMP = IMMEDIATELY
TRIGGERS ON 99 PERCENT DO SUSPEND_IMMEDIATE;

GRANT MODIFY ON RESOURCE MONITOR KEEBO_KWI_MONITOR TO ROLE KEEBO_KWI_ROLE;

Warehouse Creation

CREATE WAREHOUSE KEEBO_KWI_WAREHOUSE
WAREHOUSE_SIZE = MEDIUM,
AUTO_SUSPEND = 30
INITIALLY_SUSPENDED = TRUE
RESOURCE_MONITOR = KEEBO_KWI_MONITOR;

GRANT USAGE ON WAREHOUSE KEEBO_KWI_WAREHOUSE TO ROLE KEEBO_KWI_ROLE;

How Is Network Access Configured?

KWI connects to Snowflake from a fixed set of IP addresses. These must be allowlisted via a network policy scoped to the Keebo user.

IP AddressIP Address
34.123.209.15935.232.243.181
34.134.199.9834.41.176.165
34.136.192.18935.224.13.139
34.123.121.25134.29.108.17
35.226.95.6434.30.123.135

Authentication: Basic password or RSA key pair, scoped to the KEEBO_KWI_USER.

Network policy: Applied at the user level (ALTER USER ... SET NETWORK_POLICY), not at the account level.

All credentials are encrypted at rest and in transit, and Keebo’s infrastructure complies with SOC 2 security standards.

Option 1: Using Network Rules

CREATE NETWORK RULE KEEBO_KWI_NETWORK_RULE
TYPE = IPV4
VALUE_LIST = (
34.123.209.159,34.134.199.98,34.136.192.189,
34.123.121.251,35.226.95.64,35.232.243.181,
34.41.176.165,35.224.13.139,34.29.108.17,
34.30.123.135
)
MODE = INGRESS;

CREATE NETWORK POLICY KEEBO_KWI_NETWORK_POLICY
ALLOWED_NETWORK_RULE_LIST = (‘KEEBO_KWI_NETWORK_RULE’);

ALTER USER KEEBO_KWI_USER SET NETWORK_POLICY = KEEBO_KWI_NETWORK_POLICY;

Option 2: Without Network Rules

CREATE NETWORK POLICY KEEBO_KWI_NETWORK_POLICY ALLOWED_IP_LIST = (
34.123.209.159,34.134.199.98,34.136.192.189,34.123.121.251,
35.226.95.64,35.232.243.181,34.41.176.165,35.224.13.139,
34.29.108.17,34.30.123.135
);

ALTER USER KEEBO_KWI_USER SET NETWORK_POLICY = KEEBO_KWI_NETWORK_POLICY;

Keebo supports connecting to Snowflake accounts that are configured with AWS PrivateLink or Azure Private Link. When an account has public access disabled and is only reachable via Private Link, Keebo connects through its own VPC endpoints instead of the public internet.

Keebo VPC Endpoints (AWS)

RegionVPC Endpoint ID
us-east-1vpce-0d414758482d485d7
us-east-2vpce-03cfbba8d0539eb51
note

If your Snowflake account is deployed in an AWS region not listed above, contact Keebo support to discuss availability.

Setup

To use Private Link with Keebo, two things must be in place:

  1. Your Snowflake account must accept connections from Keebo’s VPC endpoint. Follow the Snowflake documentation for your cloud provider to authorize Keebo’s endpoint as an allowed Private Link connection:

  2. Contact Keebo support to register your Snowflake account hostname. Keebo must add your account hostname to its internal DNS configuration so that traffic routes through the Private Link connection. Without this step, DNS resolution will fail and Keebo will not be able to reach the account.

Connectivity Diagnostics

When you connect an account, Keebo automatically runs a connectivity check that tests DNS resolution, TCP reachability, authentication, and account API access. If the account requires Private Link and the hostname has not yet been registered on Keebo's side, the diagnostic will report a DNS resolution failure with a Private Link Required remediation hint. If you see this, reach out to Keebo support with your account URL to complete the setup.