Connect Trino
Prerequisites
- You have Trino coordinator connection details (
Host,Port,Catalog,Username, optionalPassword). - You can create or use a dedicated Trino identity for Skoot.
- The user has
USAGEandSELECTaccess for the schemas and tables you want Skoot to query. - The user can read metadata from
information_schemafor schema discovery.
Set Inputs (Use Your Values)
CATALOG: Catalog Skoot should query (for examplehive,iceberg,delta_lake).TRINO_USER: User Skoot authenticates as (for exampleskoot_readonly_user).TRINO_ROLE: Role you grant read permissions to (for exampleskoot_readonly_role).
Step 1 — Create the Trino User Identity
Trino does not create users with SQL. Create TRINO_USER in your Trino authentication system:
- Password-file auth: add user to your password database.
- LDAP/OIDC/Kerberos/JWT: create or map the principal in your identity provider.
- Local dev Trino without password auth: use any valid username (for example
trino).
Use a dedicated identity for Skoot instead of a shared analyst login.
Step 2 — Create and Assign the Role (If Supported)
Create TRINO_ROLE and assign it to TRINO_USER in your target catalog.
CREATE ROLE skoot_readonly_role IN hive;
GRANT skoot_readonly_role TO USER skoot_readonly_user IN hive;If your connector or access-control model does not support SQL role management, skip this step and grant privileges directly to the user in Step 3.
Step 3 — Grant Read-Only Permissions
Grant read-only permissions at schema scope (recommended), or table scope (stricter):
-- Example for catalog "hive" and schema "analytics"
GRANT SELECT ON SCHEMA hive.analytics TO ROLE skoot_readonly_role;
-- Or, if you skipped role creation:
GRANT SELECT ON SCHEMA hive.analytics TO USER skoot_readonly_user;
-- Optional stricter table-level grants:
-- GRANT SELECT ON TABLE hive.analytics.orders TO ROLE skoot_readonly_role;If your deployment enforces authorization through an external system (for example Ranger, Lake Formation, or connector-native ACLs), apply equivalent read-only rules there instead of SQL grants.
Step 4 — Verify Access as the Skoot User
Run these as TRINO_USER to validate that Skoot can discover and query data:
SELECT table_schema, table_name
FROM hive.information_schema.tables
WHERE table_schema = 'analytics'
LIMIT 20;
SELECT * FROM hive.analytics.some_table LIMIT 1;Step 5 — Ensure Metadata Discovery Access
Skoot discovers schema by reading these metadata views:
<catalog>.information_schema.schemata<catalog>.information_schema.tables<catalog>.information_schema.columns
If connection tests succeed but schema is empty, verify the read-only identity can query those views in your selected catalog.
Step 6 — Optional: IP Whitelisting
This step is optional. Use it only if your Trino deployment is protected by network allowlists.
If needed, allowlist Skoot public egress IP from Data Sources in your network/security layer.
Connect in Skoot App
After Trino setup is complete:
- Click Trino in Available Data Sources section Trino Connection .
- Fill these fields exactly:
Connection NameHostPortCatalogUsernamePassword (optional)Use SSLQuery Timeout (ms)(minimum1000)
- Save the connection.
- Confirm status is
Connected.