Frequently asked questions
Does Tabular work with my current data tools?
Yes! Tabular can be used side-by-side with Hive-like tables in your existing infrastructure. Tabular tables can be used seamlessly with your existing data catalog.
Does Tabular support streaming data?
Yes! You can use Tabular with AWS Kinesis and Apache Flink to deliver data to your warehouse with exactly-once semantics.
What is Apache Iceberg?
Iceberg is an open table format developed by Netflix and Apple that was carefully designed to make data practitioners more productive while solving the need for reliable transactions, query performance, and scalability up to 10s or 100s of petabytes.
Iceberg is supported by nearly every big data processing framework and is being adopted by SQL data warehouses because of its unique emphasis on SQL behavior and reliability. Wide adoption has made Iceberg the open standard for cloud-native analytic tables.
Can I use Tabular with… ?
Because Tabular is based on Iceberg, warehouses can be used with nearly any compute engine.
- Starburst Galaxy
- AWS Athena
- AWS Kinesis
- AWS EMR
- … and more!
And with Tabular, your access control policies are applied consistently across all those engines.
If you’d like to find out whether Tabular works with a specific engine or version, please schedule a demo.
How is Tabular deployed?
Tabular is a SaaS service, currently supporting AWS.
During setup, you create an IAM role for Tabular to control access to your data. Tabular uses that role to control file-level access and universally enforce your RBAC policy.
The deployment model is isolated, auditable, and painless.
Tabular runs in a separate AWS account.
- No “black box” code or containers run in customer AWS accounts
- You own and control the S3 buckets where data and metadata is stored
- Access is strictly limited to reads, writes, and soft deletes in specific buckets
- Tabular accesses S3 from within AWS, without going over the public internet
- Tabular maintenance services never persist data outside of your buckets
- Tabular follows best practices from AWS for external access
All accesses are logged and are available for inspection.
- S3 access logs show all data access
- Tabular audit tables show all authorization requests, by user
- All accesses use the same authorization path, including Tabular services
Exceptional data infrastructure, set up in minutes.
Does Tabular offer private deployment?
Is Tabular SOC 2 compliant?