SHOW RUNS IN EXPERIMENT¶
Lists the runs in an experiment.
- See also:
CREATE EXPERIMENT , ALTER EXPERIMENT, SHOW EXPERIMENTS , DROP EXPERIMENT , SHOW RUN … IN EXPERIMENT
Syntax¶
SHOW RUNS [ LIKE '<pattern>' ] IN EXPERIMENT <name>
Parameters¶
LIKE 'pattern'Optionally filters the command output by object name. The filter uses case-insensitive pattern matching, with support for SQL wildcard characters (
%and_).For example, the following patterns return the same results:
... LIKE '%testing%' ...... LIKE '%TESTING%' .... Default: No value (no filtering is applied to the output).
nameSpecifies the identifier of the experiment to inspect.
If the identifier contains spaces or special characters, the entire string must be enclosed in double quotes. Identifiers enclosed in double quotes are also case-sensitive.
For more information, see Exigences relatives à l’identificateur.
Output¶
The output of the command includes the following columns, which describe the properties and metadata of the object:
Column |
Description |
|---|---|
|
Date and time when the run was created. |
|
The identifier for the run. |
|
The database that the run is stored in. |
|
The schema that the run is stored in. |
|
The experiment that the run belongs to. |
|
A JSON object containing the run status and metrics. The The |
Access control requirements¶
A role used to execute this operation must have the following privileges at a minimum:
Privilege |
Object |
Notes |
|---|---|---|
USAGE |
Experiment |
The USAGE privilege on the parent database and schema are required to perform operations on any object in a schema. Note that a role granted any privilege on a schema allows that role to resolve the schema. For example, a role granted CREATE privilege on a schema can create objects on that schema without also having USAGE granted on that schema.
For instructions on creating a custom role with a specified set of privileges, see Création de rôles personnalisés.
For general information about roles and privilege grants for performing SQL actions on securable objects, see Aperçu du contrôle d’accès.
Usage notes¶
The command doesn’t require a running warehouse to execute.
The command only returns objects for which the current user’s current role has been granted at least one access privilege.
The MANAGE GRANTS access privilege implicitly allows its holder to see every object in the account. By default, only the account administrator (users with the ACCOUNTADMIN role) and security administrator (users with the SECURITYADMIN role) have the MANAGE GRANTS privilege.
To post-process the output of this command, you can use the pipe operator (
->>) or the RESULT_SCAN function. Both constructs treat the output as a result set that you can query.For example, you can use the pipe operator or RESULT_SCAN function to select specific columns from the SHOW command output or filter the rows.
When you refer to the output columns, use double-quoted identifiers for the column names. For example, to select the output column
type, specifySELECT "type".You must use double-quoted identifiers because the output column names for SHOW commands are in lowercase. The double quotes ensure that the column names in the SELECT list or WHERE clause match the column names in the SHOW command output that was scanned.
The command returns a maximum of ten thousand records for the specified object type, as dictated by the access privileges for the role used to execute the command. Any records above the ten thousand records limit aren’t returned, even with a filter applied.
To view results for which more than ten thousand records exist, query the corresponding view (if one exists) in the Schéma d’information de Snowflake.
Executing the command for schema-level objects only returns an object if the current role also has at least one privilege on the parent database and schema.