Book Image

Redash v5 Quick Start Guide

By : Alexander Leibzon, Yael Leibzon
Book Image

Redash v5 Quick Start Guide

By: Alexander Leibzon, Yael Leibzon

Overview of this book

Data exploration and visualization is vital to Business Intelligence, the backbone of almost every enterprise or organization. Redash is a querying and visualization tool developed to simplify how marketing and business development departments are exposed to data. If you want to learn to create interactive dashboards with Redash, explore different visualizations, and share the insights with your peers, then this is the ideal book for you. The book starts with essential Business Intelligence concepts that are at the heart of data visualizations. You will learn how to find your way round Redash and its rich array of data visualization options for building interactive dashboards. You will learn how to create data storytelling and share these with peers. You will see how to connect to different data sources to process complex data, and then visualize this data to reveal valuable insights. By the end of this book, you will be confident with the Redash dashboarding tool to provide insight and communicate data storytelling.
Table of Contents (10 chapters)

Troubleshooting

The main thing to bear in mind here is that setup.sh (core of all the installation processes) is not idempotent.

This means that if somehow the script failed in the middle of running, you can't simply run it again.

In case something went wrong with the installation, follow these instructions:

  1. Try to check the output of the setup.sh script and figure out what the reason for its failure could be. Possible reasons include permissions/missing packages.
  2. It's always better to reinstall rather than try and run the script from where it stopped.
  3. Review the section which explains setup.sh, in combination with the logs. This might give you the answer.
  4. If using AWS/GCE, verify that ports 22, 80, and 443 are reachable (sometimes, even if not in the cloud, corporate users have strict firewall rules, so you might have to check it even if not on AWS/GCE).
...