Install on Self-hosted Kubernetes
After performing the steps in Before You Install on Self-hosted Kubernetes, you are ready to install Collibra DQ on self-hosted Kubernetes.
Sign in to the Kubernetes cluster
- Sign in to the Kubernetes cluster from a Linux compatible terminal.
- Create a namespace in the cluster using the following command:Copy
kubectl create namespace <owldq>
Pull images from the Collibra registry
Collibra DQ images are located in the Google Artifact Registry (http://gcr.io/). To access the images, you need a key file (repo-key.json
). Contact Collibra Support to obtain a key file for your organization. Collibra strongly recommends that you designate a key file recipient to obtain this file and keep it secure.
- Run the following command:
- To pull the images, run the following docker pull commands:
docker login -u _json_key -p "$(cat repo-key.json)" https://gcr.io
Note Contact Collibra Support to obtain a key file (repo-key.json
) for your organization.
docker pull gcr.io/owl-hadoop-cdh/dq-agent:<version and build tag provided by Collibra>
docker pull gcr.io/owl-hadoop-cdh/dq-web:<version and build tag provided by Collibra>
docker pull gcr.io/owl-hadoop-cdh/dq-spark:<version and build tag provided by Collibra>
docker pull gcr.io/owl-hadoop-cdh/dq-livy:<version and build tag provided by Collibra>
Push images into your private registry
- Sign in to your private container registry.
- Tag and push the images from Collibra to your private registry, by using the following commands:
docker tag gcr.io/owl-hadoop-cdh/dq-web:2023.11 <registryURL>/dq-web:2023.11
docker push <registryURL>/dq-web:2023.11
Example:
docker tag [OPTIONS] IMAGE [:TAG][REGISTRYHOST/][USERNAME/]NAME[:TAG]
docker tag push NAME[:TAG]
Create an SSL keystore secret
To create an SSL keystore secret, run the following command:
kubectl create secret generic dq-ssl-secret \
--from-file /path/to/keystore.jks \
--namespace <namespace>
Warning The file name that you use in the --from-file
argument should be keystore.jks. If the file name is anything else, you must include an additional argument specifying the keystore file name in the Helm command.
Create a pull secret
Note Deploying containers directly from the Collibra image repository is not recommended. You should only access the Collibra image registry for the initial download and validation of Docker images. After this, you should upload and store images to your private registry to provide you control over when the images are updated and eliminate any operational dependencies on Collibra's repository.
To create a pull secret, run the following command:
kubectl create secret docker-registry dq-pull-secret \
--docker-server=<cdq-registry-server> \
--docker-username=_json_key \
--docker-email=<service-account-email> \
--docker-password="$(cat /path/to/key.json)" \
--namespace <namespace>
Note If your private registry is used for images and if they are accessible from within the Kubernetes cluster, this secret need not be created. If credentials are required to access your private registry, create this secret by modifying the docker-server URL and docker-password.