Skip to main content

What’s New

Qrvey 8.7
Version 8.7 of the Qrvey platform is now available to customers! This version includes new features including area charts, the ability to pivot and export data, as well as numerous bug fixes and performance improvements.
Learn More
Qrvey 8.6
Version 8.6 of the Qrvey platform is now available to customers. This version includes several new feature enhancements and performance improvements.
Learn More
Required Update for 8.5.1
Attention 8.5.1 customers: for any 8.5.1 instance deployed prior to 08/05/2024, an update is required to ensure you are running the latest images.
Learn More
Qrvey 8.5
Version 8.5 (LTS) of the Qrvey platform is now available to customers. This version includes several new features and performance improvements.
Learn More
End-of-life Schedule
We've added a new article that lists the features and endpoints that have been scheduled for deprecation. All features and endpoints will be supported for (1) year after the release date of the LTS version that contains the alternative.
Learn More
Version: 8.1

Configuring AWS and Qrvey for Postgres Connections Utilizing the Export to S3 Method

Very large or long-running queries to Postgres may take several minutes to start. You can speed up this process by selecting the option, “Export Data to S3 to Support Larger Data Loads”. When employed, the query output is sent to S3 and then Qrvey pulls the data from there. The option is available when the Host URL points to an AWS RDS Postgres instance that is in the same AWS region as Qrvey.

This method requires additional configuration. The changes allow Postgres to write to a Qrvey S3 bucket.

Steps

Many of the steps below are necessary only when the Postgres RDS and Qrvey deployment are on different AWS accounts.

  1. Configure Postgres for the export to S3 extension.
    • a. Using Postgres query tool, send the following psql command.
  • CREATE EXTENSION aws_s3 CASCADE;

  • b. Grant access to queries used for monitoring and canceling other queries, replacing “myUser” with the Postgres Username which will be used for Qrvey Postgres Connections.
  • GRANT SELECT ON pg_stat_activityTO myUser; GRANT SELECT ON pg_terminate_backend TO myUser;

  1. Create a new Policy. (Different accounts only.)
    • a. Open the AWS console.
    • b. Switch to the Postgres RDS’s AWS account.
    • c. Open AWS Identity and Access Management (IAM)
    • d. Click Policies.
    • e. Click Create policy.
    • f. Select the JSON tab.
    • g. Paste the policy below. Change QRVEY_DEPLOYMENT to the Qrvey deployment name.
    "Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:AbortMultipartUpload",
"s3:ListBucket",
"s3:PutObjectAcl"
],
"Resource": [
"arn:aws:s3:::QRVEY_DEPLOYMENT-dataload-drdatacommons/*"
]
}
]
}
  • h. Click Next: Tags.
  • i. Click Next: Review.
  • j. Name the new Policy. For example: `PostgresDataAccessPolicy`.
  1. Create a new Role. (Different accounts only.)

    • a. Continue in the Postgres AWS account, IAM.
    • b. Click Roles.
    • c. Click Create Role.
    • d. Select AWS account.
    • e. Use the filter to find the policy created above.
    • f. Check its box.
    • g. Click Next.
    • h. Enter the Role name. For example: `PostgresDataAccessRole`.
    • i. Click Create Role.
    • j. Note this Role’s ARN string for later use.
  2. Add a trust relationship. (Different accounts only.)

    • a. Click Roles.
    • b. Locate the newly created Role.
    • c. Click the Trust Relations tab.
    • d. Click Edit trust relationship
    • e. Click the Trust relationships tab, and then click Edit trust relationship.
    • f. Paste the trust relationship shown below, replacing `AWS_ACCOUNT_QRVEY` with the AWS account number for the Qrvey deployment.
  "Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::AWS_ACCOUNT_QRVEY:root"
},
"Action": "sts:AssumeRole"
} ]
}
  • g. Click Update Trust Policy.
  1. Set inline policies for the Qrvey lambdas. (Different accounts only.)
    • a. Use the Qrvey AWS account.
    • b. Open AWS Identity and Access Management (IAM).
    • c. Click Roles
    • d. Search for the DB lambda role. It contains this string: `DBDatasourcePumpFunction`. There is one Role for each Qrvey deployment. Select the role applying to the current Qrvey deployment.
    • e. Click Add inline policy.
    • f. Click the JSON tab.
    • g. Paste the policy, replacing `AWS_ACCOUNT_POSTGRES` with the AWS account number for the Postgres cluster.
    "Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": [
"arn:aws:iam::AWS_ACCOUNT_POSTGRES:role/PostgresDataAccessRole"
]
}
}
  • h. Click Review policy.
  • i. Name the policy. For example: `PostgresDataAccessAssumeRole`.
  • j. Click Create Policy. See that the new policy has been added.
  • k. Repeat these steps for the lambda role `DatasourcePumpFunction`.
  • l. Repeat these steps for the lambda role `FilesourcePrimerFunction`.
  1. Configure a Qrvey Connection.
    • a. Open the Qrvey Composer application.
    • b. Click Data.
    • c. Click Connections.
    • d. Create a new Connection for Postgres.
    • e. Enter the Host URL, Username, and Password.
    • f. Enter the Role ARN created above. (Different accounts only.)
    • g. Test the new Connection.
    • h. Create a Dataset using the Connection.
    • i. Load the Dataset data from Postgres.

For More Information

Importing Amazon S3 data into an RDS for PostgreSQL DB instance