Sounds like you will have to (or get someone to) tell the postgres database directly to "GRANT <permissions> ON events TO <your_db_login>" (or something close to that).
Tableau doesn't need 'write' (insert/update) permission on your existing tables, but it definitely needs 'read', and 'create temporary table' is very helpful. ...I feel like I was imprecise in that sentence, but I don't actually know how insert/update in general intersects with 'create temp table', because surely owning a temporary table means one can write to it.
I'm having this same issue however I found this in a knowledge-base article regarding custom views: "...The "tableau" user has access to all of the tables that start with an underscore.". So any table that does not start with an underscore the "tableau" user does not have access to. That's most of the tables in the Workgroup database. Is there a reason why? Is there a way to get access to these tables?
The underscore tables are views on the original tables, exported for analytics with sensitive data omitted. If you'd like more tables to be exported, please make a request to support and let us know which one(s) you'd like to analyze.
Thanks James. That's good to know...that the underscore represents views built off the tables. I'm not sure what you mean by sensitive data though. Considering it's our server, our users, our views, etc...I would think sensitive would be defined by us, not by Tableau. No big deal, it's just a bit confusing. Also, it's difficult to know what tables I'd want to explore simply based on the fact I don't know what data they contain. However I'm figuring out how to join some of the available views and am starting to make sense of it so I think I'm good. Thanks again for the intel.
Well, there are some bits of data that just don't make any sense to expose. I can't think of a possible reason for you to want to analyze the hashed passwords, for example. The only use I can think of is malicious - if an attacker managed to use that connection, they could try to crack them at their leisure.
I think that some tables are also considered not "worth" exporting because they're internal data that no user or administrator would or should know how to interpret.
So that's all I mean by "sensitive".
Who do we make a request to in order to gain access to the next_gen_permissions table, for example?
When you mentioned that we could use the command "GRANT <permissions> ON events TO <your_db_login>", would that apply to getting access to the table mentioned above? Who would run such a command?
What was the resolution of this issue ? I am getting following errors when I try to run a dashboard which is using these two tables ?
ERROR: permission denied for relation system_users; Error while executing the query
ERROR: permission denied for relation next_gen_permissions; Error while executing the query
Can someone please post the resolution ? Or is there any ?