System requirements of an Edge site
To use Edge, you must ensure that the following system requirements are met.
Software requirements
- You must be able to install the Edge software on one of the following supported versions of Red Hat Enterprise Linux (RHEL):
- RHEL 8.8 or later (8.x).
- RHEL 9.3 or later (9.x).Note
- We recommend not installing Edge on end-of-Life versions of RHEL.
- We recommend ensuring the k3s version installed on your Edge site can be run on the version of RHEL you have.
- For more information on installing Edge on a Linux server, go to How to prepare a Linux server for running and installing Edge on the Collibra Support Portal.
- Your Edge site installer must use an Edge supported k3s version.
- The sudo package is installed on the Linux host.
- The user who installs Edge has full sudo access (
ALL=(ALL) ALL). - If you want SE Linux enabled, install the following policy packages before installing Edge:Packages
yum install -y container-selinux selinux-policy-base- If you use RHEL 8:
yum install -y https://github.com/k3s-io/k3s-selinux/releases/download/v1.6.latest.1/k3s-selinux-1.6-1.el8.noarch.rpm - If you use RHEL 9:
yum install -y https://github.com/k3s-io/k3s-selinux/releases/download/v1.6.latest.1/k3s-selinux-1.6-1.el9.noarch.rpm
These packages are not hosted by Collibra. If you have any questions, contact your internal teams.
Hardware requirements
Note When installing on k3s, the Virtual Machine (VM) must be dedicated to a single Edge site installer.
You need the following minimum hardware requirements:
- 64 GB memory.
- 16-core CPU with x86_64 architecture.
- At least 50 GB of free storage on the partition that contains /var/lib/rancher/k3s. This partition is used for:
- K3s cluster configuration data.
- Docker images that are used by the k3s container runtime on the Edge site.
How to mount...Copymkdir -p /var/lib/rancher/k3s
mkfs.xfs /dev/<block-device-name>
mount /dev/<block-device-name> /var/lib/rancher/k3s
echo '/dev/<block-device-name> /var/lib/rancher/k3s xfs defaults 0 0' >> /etc/fstabNote- This is the default install path. If it is not created as a separate mount point after following the steps above, the install will use 50 GB of disk space from either /var, or if not present, the root level of the drive.
- The partition mountpoint should not have the noexec option.
Warning Any data in this location is fully managed by the Edge site. Do not save any other data in this location as the data can be removed by Edge without notification.
- At least 5 GB of free storage on the partition that contains /var/log. This partition is used to:
- Write k3s audit logs. Edge uses up to 1.1 GB of space to write and store these logs. Each log file can be up to 100 MB, and only the last 10 files within a 30-day period are retained.
- Write pod logs. Edge uses up to 60 MB per container to write and store these logs. The number of containers depends on the workload.
- At least 200 GB of free storage on the partition that holds /var/lib/kubelet.
- We recommend dedicating this storage on the /var partition if it exists. If it doesn't exist, you can dedicate this storage on the /(root) partition.
- This partition is used by k3s to write ephemeral data related to kubernetes, using the hardcoded path /var/lib/kubelet/pods/<containerId>/volumes/kubernetes.io~empty-dir/.Note If you have technical lineage capabilities, each concurrent execution of these capabilities requires 15 GB of space on /var/lib/kubelet. The number of technical lineage capabilities you can run concurrently depends on the available space on /var/lib/kubelet. If you need to run more technical lineage capabilities concurrently than you have space for, you can use the auto-scaling mechanism within the managed k8s platforms.
-
If you run the Linux server on AWS, Azure, or GCP, disable the services nm-cloud-setup.service and nm-cloud-setup.timer.
How to disable...Copysystemctl disable nm-cloud-setup.service nm-cloud-setup.timer
reboot
Warning When new capabilities are added in the future, the hardware requirements may change.
Network requirements
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
- Your Edge site has to be able to connect to port 443.
- Set the Linux system value for IP forwarding to 1:
net.ipv4.ip_forward=1Note If IP forwarding is turned off (net.ipv4.ip_forward=0), your Edge site may become unhealthy. Follow the steps in this Support article to turn IP forwarding on. - The resolve configuration file of your Linux host has maximum three search domains and two name servers.
- Ensure that the network connectivity between the internal cluster and the service CIDRs use by k3s (which are by default 10.42.0.0/16 and 10.43.0.0/16) is not blocked.
- In case
firewalldis enabled, run the following commands to add the cni0 and loopback interfaces to a trusted zone, so that Kubernetes can use it between its services:Copyfirewall-cmd --zone=trusted --change-interface=cni0 --permanent
firewall-cmd --zone=trusted --change-interface=lo --permanent
firewall-cmd --reload
FedRAMP
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
- Your Edge site has to be able to connect to port 443.
- Set the Linux system value for IP forwarding to 1:
net.ipv4.ip_forward=1Note If IP forwarding is turned off (net.ipv4.ip_forward=0), your Edge site may become unhealthy. Follow the steps in this Support article to turn IP forwarding on. - The resolve configuration file of your Linux host has maximum three search domains and two name servers.
- Ensure that the network connectivity between the internal cluster and the service CIDRs use by k3s (which are by default 10.42.0.0/16 and 10.43.0.0/16) is not blocked.
- In case
firewalldis enabled, run the following commands to add the cni0 and loopback interfaces to a trusted zone, so that Kubernetes can use it between its services:Copyfirewall-cmd --zone=trusted --change-interface=cni0 --permanent
firewall-cmd --zone=trusted --change-interface=lo --permanent
firewall-cmd --reload
- Create an Edge site in Collibra Platform.
- Install an Edge site and learn more about which upgrade method you should select for your Edge site.
- Optionally, you can configure your own private docker registry.
- Optionally, you can set up a Vault integration.
- Create an Edge site connection.
- Create an Edge site capability.
|
Which Kubernetes cluster do you want to install your Edge site on?
|
What is your Edge site installation method? |
Which Edge CLI method do you want to use? |
EKS requirements
Note The default Edge CLI method is an easier solution for installing your Edge site via the Edge CLI. Edge creates the cluster level objects, such as namespaces and priority classes for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- AWS EKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new and existing Edge sites.
- EKS cluster has IRSA enabled.
- Set up security groups to ensure that worker nodes can communicate with each other on non-privileged ports.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on EKS.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the EKS cluster.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the EKS cluster.
- Ensure your kubectl client is compatible with the relevant EKS version.
Hardware requirements
You need an operational EKS cluster with at least 1 worker node that is running a Linux-based operating system. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the EKS cluster.
Note For more information about Linux OS for EKS clusters, go to the Amazon documentation about Amazon EKS optimized AMIs. As Edge sites are only compatible with Linux OS, disregard the Windows AMI option in this resource.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS truststore. For more information, go to Configure a forward proxy.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS truststore. For more information, go to Configure a forward proxy.
FedRAMP
EKS requirements
Note The restrictive Edge CLI method allows you or your company to create the cluster level objects, such as namespaces and priority classes, for your Edge site. This method may be required if your company has security requirements or process that do not allow Edge sites to create the cluster level objects for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- AWS EKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new and existing Edge sites.
- EKS cluster has IRSA enabled.
- Set up security groups to ensure that worker nodes can communicate with each other on non-privileged ports.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on EKS.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the EKS cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a valid kubeconfig file that contains the following:
- A user/service account with a role scoped to the collibra-edge namespace.
- The rules within the role must at minimum be set to "*".Note You need to set each rules’ value to “*” because the apiVersions and resources rules can change or be deprecated at any point within Kubernetes. Setting these values to “*” ensures that your Edge site remains compatible with the latest versions of Kubernetes. If the role has stricter permissions, your site may experience breaking changes that will require reinstallation.
Show an exampleapiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: edge-namespace-role namespace: collibra-edge rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: edge-namespace-rb namespace: collibra-edge subjects: - kind: User name: username> # The user that will perform the installation namespace: collibra-edge roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: edge-namespace-role - Ensure your kubectl client is compatible with the relevant EKS version.
Hardware requirements
You need an operational EKS cluster with at least 1 worker node that is running a Linux-based operating system. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the EKS cluster.
Note For more information about Linux OS for EKS clusters, go to the Amazon documentation about Amazon EKS optimized AMIs. As Edge sites are only compatible with Linux OS, disregard the Windows AMI option in this resource.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS truststore. For more information, go to Configure a forward proxy.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS truststore. For more information, go to Configure a forward proxy.
FedRAMP
EKS requirements
Warning Collibra Support will not assist with custom Helm or Kubernetes configurations. The following steps are an example, and any assistance for configurations or issues outside of these steps is unsupported. We recommend using the Edge CLI method for managed Kubernetes installations.
A common example of custom Helm configurations is, but not limited to, using an unsupported private repository. For more information, go to our supported private helm registries documentation.
You can install the Edge software on managed Kubernetes clusters.
- AWS EKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new and existing Edge sites.
- EKS cluster has IRSA enabled.
- Set up security groups to ensure that worker nodes can communicate with each other on non-privileged ports.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on EKS.
Tip This server will also contain the Edge tools.
- Helm (v3).
- You must have yq version 4.18.1 or later, and jq installed on your Linux machine.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the EKS cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the cluster.
- Ensure your kubectl client is compatible with the relevant EKS version.
Hardware requirements
You need an operational EKS cluster with at least 1 worker node that is running a Linux-based operating system. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the EKS cluster.
Note For more information about Linux OS for EKS clusters, go to the Amazon documentation about Amazon EKS optimized AMIs. As Edge sites are only compatible with Linux OS, disregard the Windows AMI option in this resource.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS truststore. For more information, go to Configure a forward proxy.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS truststore. For more information, go to Configure a forward proxy.
FedRAMP
EKS requirements
You can install the Edge software on managed Kubernetes clusters.
- AWS EKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new and existing Edge sites.
- EKS cluster has IRSA enabled.
- Set up security groups to ensure that worker nodes can communicate with each other on non-privileged ports.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on EKS.
Tip This server will also contain the Edge tools.
- On the workstation with access to the ZARF CLI:
- The /tmp directory must allow the write and execute permissions.
- The
noexecmount must be disabled so the ZARF scripts can run successfully.
- Ensure your kubectl client is compatible with the relevant EKS version.
Hardware requirements
You need an operational EKS cluster with at least 1 worker node that is running a Linux-based operating system. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the EKS cluster.
Note For more information about Linux OS for EKS clusters, go to the Amazon documentation about Amazon EKS optimized AMIs. As Edge sites are only compatible with Linux OS, disregard the Windows AMI option in this resource.
Network requirements
- An Edge site needs outbound connections to all of the URL of your Collibra Platform Self-Hosted environment.
- Access to all data sources you need to connect to your Edge sites.
- Your Edge site has to be able to connect to port 443.
- If you intend to use a man-in-the-middle (MITM) proxy, you need to add the specific truststores customization to the ca.pem, because Edge does not use the host TLS trustsore. For more information, go to Configure a forward proxy.
- The resolve configuration file of your Linux host has maximum three search domains and two name servers.
GKE requirements
Note The default Edge CLI method is an easier solution for installing your Edge site via the Edge CLI. Edge creates the cluster level objects, such as namespaces and priority classes for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- GKE 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on GKE.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the GKE cluster.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the GKE cluster.
- Ensure your Kubectl client is compatible with the relevant GKE version.
Hardware requirements
You need an operational GKE cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 2 worker nodes each with 8 core CPU and 32 GB or 4 work nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the GKE cluster.
Note At this time, Edge site installations on GKE clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for GKE clusters, go to the Google documentation about Node images.
Network requirements
Commercial
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
GKE requirements
Note The restrictive Edge CLI method allows you or your company to create the cluster level objects, such as namespaces and priority classes, for your Edge site. This method may be required if your company has security requirements or process that do not allow Edge sites to create the cluster level objects for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- GKE 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on GKE.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to theGKE cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a valid kubeconfig file that contains the following:
- A user/service account with a role scoped to the collibra-edge namespace.
- The rules within the role must at minimum be set to "*".Note You need to set each rules’ value to “*” because the apiVersions and resources rules can change or be deprecated at any point within Kubernetes. Setting these values to “*” ensures that your Edge site remains compatible with the latest versions of Kubernetes. If the role has stricter permissions, your site may experience breaking changes that will require reinstallation.
Example…apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: edge-namespace-role namespace: collibra-edge rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: edge-namespace-rb namespace: collibra-edge subjects: - kind: User name: username> # The user that will perform the installation namespace: collibra-edge roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: edge-namespace-role - Ensure your Kubectl client is compatible with the relevant GKE version.
Hardware requirements
You need an operational GKE cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 2 worker nodes each with 8 core CPU and 32 GB or 4 work nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the GKE cluster.
Note At this time, Edge site installations on GKE clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for GKE clusters, go to the Google documentation about Node images.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
GKE requirements
Warning Collibra Support will not assist with custom Helm or Kubernetes configurations. The following steps are an example, and any assistance for configurations or issues outside of these steps is unsupported. We recommend using the Edge CLI method for managed Kubernetes installations.
A common example of custom Helm configurations is, but not limited to, using an unsupported private repository. For more information, go to our supported private helm registries documentation.
You can install the Edge software on managed Kubernetes clusters.
- GKE 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on GKE.
Tip This server will also contain the Edge tools.
- Helm (v3).
- You must have yq version 4.18.1 or later, and jq installed on your Linux machine.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the GKE cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the cluster.
- Ensure your Kubectl client is compatible with the relevant GKE version.
Hardware requirements
You need an operational GKE cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 2 worker nodes each with 8 core CPU and 32 GB or 4 work nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the GKE cluster.
Note At this time, Edge site installations on GKE clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for GKE clusters, go to the Google documentation about Node images.
Network requirements
Commercial
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
FedRAMP
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
AWS Fargate using EKS requirements
Note The default Edge CLI method is an easier solution for installing your Edge site via the Edge CLI. Edge creates the cluster level objects, such as namespaces and priority classes for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- AWS Fargate using EKS on Kubernetes 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
- EKS cluster has IRSA enabled
- You must create an AWS Fargate profile for your cluster with the following namespace selectors:
kube-systemdefaultcollibra-*edge-kube-installer
- EKS cluster has CoreDNS enabled and running on a Fargate Node(s).
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on AWS Fargate using EKS.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the AWS Fargate using EKS cluster.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the cluster.
- Ensure your Kubectl client is compatible with the relevant EKS version.
Network requirements
Commercial
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
AWS Fargate using EKS requirements
Note The restrictive Edge CLI method allows you or your company to create the cluster level objects, such as namespaces and priority classes, for your Edge site. This method may be required if your company has security requirements or process that do not allow Edge sites to create the cluster level objects for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- AWS Fargate using EKS on Kubernetes 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
- EKS cluster has IRSA enabled
- You must create an AWS Fargate profile for your cluster with the following namespace selectors:
kube-systemdefaultcollibra-*edge-kube-installer
- EKS cluster has CoreDNS enabled and running on a Fargate Node(s).
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on AWS Fargate using EKS.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the AWS Fargate using EKS cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a valid kubeconfig file that contains the following:
- A user/service account with a role scoped to the collibra-edge namespace.
- The rules within the role must at minimum be set to "*".Note You need to set each rules’ value to “*” because the apiVersions and resources rules can change or be deprecated at any point within Kubernetes. Setting these values to “*” ensures that your Edge site remains compatible with the latest versions of Kubernetes. If the role has stricter permissions, your site may experience breaking changes that will require reinstallation.
Example…apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: edge-namespace-role namespace: collibra-edge rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: edge-namespace-rb namespace: collibra-edge subjects: - kind: User name: username> # The user that will perform the installation namespace: collibra-edge roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: edge-namespace-role - Ensure your Kubectl client is compatible with the relevant EKS version.
Network requirements
Commercial
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
AWS Fargate using EKS requirements
Warning Collibra Support will not assist with custom Helm or Kubernetes configurations. The following steps are an example, and any assistance for configurations or issues outside of these steps is unsupported. We recommend using the Edge CLI method for managed Kubernetes installations.
A common example of custom Helm configurations is, but not limited to, using an unsupported private repository. For more information, go to our supported private helm registries documentation.
You can install the Edge software on managed Kubernetes clusters.
- AWS Fargate using EKS on Kubernetes 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
- EKS cluster has IRSA enabled
- You must create an AWS Fargate profile for your cluster with the following namespace selectors:
kube-systemdefaultcollibra-*edge-kube-installer
- EKS cluster has CoreDNS enabled and running on a Fargate Node(s).
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on AWS Fargate using EKS.
Tip This server will also contain the Edge tools.
- Helm (v3).
- You must have yq version 4.18.1 or later, and jq installed on your Linux machine.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the AKS Fargate using EKS cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the cluster.
- Ensure your Kubectl client is compatible with the relevant EKS version.
Network requirements
Commercial
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
OpenShift requirements
Note The default Edge CLI method is an easier solution for installing your Edge site via the Edge CLI. Edge creates the cluster level objects, such as namespaces and priority classes for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- OpenShift 4.14, 4.15, 4.16, 4.17, 4.18, and 4.19 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on OpenShift.
Tip This server will also contain the Edge tools
- You must have a kubeconfig file with plain cluster_admin kubectl access to the OpenShift cluster.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the OpenShift cluster.
- Ensure your Kubectl client is compatible with the relevant OpenShift version.
Hardware requirements
You need an operational OpenShift cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the OpenShift cluster.
Note At this time, Edge site installations on OpenShift clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for OpenShift clusters, go to the OpenShift documentation.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
OpenShift requirements
Note The restrictive Edge CLI method allows you or your company to create the cluster level objects, such as namespaces and priority classes, for your Edge site. This method may be required if your company has security requirements or process that do not allow Edge sites to create the cluster level objects for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- OpenShift 4.14, 4.15, 4.16, 4.17, 4.18, and 4.19 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on OpenShift.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the OpenShift cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a valid kubeconfig file that contains the following:
- A user/service account with a role scoped to the collibra-edge namespace.
- The rules within the role must at minimum be set to "*".Note You need to set each rules’ value to “*” because the apiVersions and resources rules can change or be deprecated at any point within Kubernetes. Setting these values to “*” ensures that your Edge site remains compatible with the latest versions of Kubernetes. If the role has stricter permissions, your site may experience breaking changes that will require reinstallation.
Example…apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: edge-namespace-role namespace: collibra-edge rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: edge-namespace-rb namespace: collibra-edge subjects: - kind: User name: username> # The user that will perform the installation namespace: collibra-edge roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: edge-namespace-role - Ensure your Kubectl client is compatible with the relevant OpenShift version.
Hardware requirements
You need an operational OpenShift cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the OpenShift cluster.
Note At this time, Edge site installations on OpenShift clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for OpenShift clusters, go to the OpenShift documentation.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
OpenShift requirements
Warning Collibra Support will not assist with custom Helm or Kubernetes configurations. The following steps are an example, and any assistance for configurations or issues outside of these steps is unsupported. We recommend using the Edge CLI method for managed Kubernetes installations.
A common example of custom Helm configurations is, but not limited to, using an unsupported private repository. For more information, go to our supported private helm registries documentation.
You can install the Edge software on managed Kubernetes clusters.
- OpenShift 4.14, 4.15, 4.16, 4.17, 4.18, and 4.19 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on OpenShift.
Tip This server will also contain the Edge tools.
- Helm (v3).
- You must have yq version 4.18.1 or later, and jq installed on your Linux machine.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the OpenShift cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the cluster.
- Ensure your Kubectl client is compatible with the relevant OpenShift version.
Hardware requirements
You need an operational OpenShift cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 4 worker nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the OpenShift cluster.
Note At this time, Edge site installations on OpenShift clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for OpenShift clusters, go to the OpenShift documentation.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
AKS requirements
Note The default Edge CLI method is an easier solution for installing your Edge site via the Edge CLI. Edge creates the cluster level objects, such as namespaces and priority classes for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- AKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on AKS.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the AKS cluster.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the AKS cluster.
- Ensure your Kubectl client is compatible with the relevant AKS version.
Hardware requirements
You need an operational AKS cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 2 worker nodes each with 8 core CPU and 32 GB or 4 work nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the AKS cluster.
Note At this time, Edge site installations on AKS clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for AKS clusters, go to the Azure documentation about Azure Kubernetes core concepts.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
AKS requirements
Note The restrictive Edge CLI method allows you or your company to create the cluster level objects, such as namespaces and priority classes, for your Edge site. This method may be required if your company has security requirements or process that do not allow Edge sites to create the cluster level objects for you. This method can be used for both dedicated and shared clusters.
You can install the Edge software on managed Kubernetes clusters.
- AKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on AKS.
Tip This server will also contain the Edge tools.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the AKS cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a valid kubeconfig file that contains the following:
- A user/service account with a role scoped to the collibra-edge namespace.
- The rules within the role must at minimum be set to "*".Note You need to set each rules’ value to “*” because the apiVersions and resources rules can change or be deprecated at any point within Kubernetes. Setting these values to “*” ensures that your Edge site remains compatible with the latest versions of Kubernetes. If the role has stricter permissions, your site may experience breaking changes that will require reinstallation.
Example…apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: edge-namespace-role namespace: collibra-edge rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: edge-namespace-rb namespace: collibra-edge subjects: - kind: User name: username> # The user that will perform the installation namespace: collibra-edge roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: edge-namespace-role - Ensure your Kubectl client is compatible with the relevant AKS version.
Hardware requirements
You need an operational AKS cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 2 worker nodes each with 8 core CPU and 32 GB or 4 work nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the AKS cluster.
Note At this time, Edge site installations on AKS clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for AKS clusters, go to the Azure documentation about Azure Kubernetes core concepts.
Network requirements
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
- Access to all data sources you need to connect to your Edge sites.
Commercial
- An Edge site needs outbound connections to all of the following:
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Access to all data sources you need to connect to your Edge sites.
FedRAMP
AKS requirements
Warning Collibra Support will not assist with custom Helm or Kubernetes configurations. The following steps are an example, and any assistance for configurations or issues outside of these steps is unsupported. We recommend using the Edge CLI method for managed Kubernetes installations.
A common example of custom Helm configurations is, but not limited to, using an unsupported private repository. For more information, go to our supported private helm registries documentation.
You can install the Edge software on managed Kubernetes clusters.
- AKS 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, and 1.33 are supported for new Edge sites.Note You can migrate an existing k3s or EKS Edge site to a new managed Kubernetes cluster by following the Managed Kubernetes reinstallation steps using the Edge CLI method. You can't migrate from an existing Edge site to a new cluster using the Helm chart method.
Software requirements
- A Linux server for x86_64 architecture where bash is available. This is the server from which you install the Edge software on AKS.
Tip This server will also contain the Edge tools.
- Helm (v3).
- You must have yq version 4.18.1 or later, and jq installed on your Linux machine.
- You must have a kubeconfig file with plain cluster_admin kubectl access to the AKS cluster. This kubeconfig file is used to create the Custom Resource Definitions (CRDs) and namespace required for the Edge site.Note The only thing that should be running inside of the dedicated namespace in the shared cluster is the Edge site. We do not support running third-party components, such as service mesh, inside of the Edge site's dedicated namespace.
- The kubeconfig environment variable must be set to a kubeconfig that has plain cluster_admin kubectl access to the cluster.
- Ensure your Kubectl client is compatible with the relevant AKS version.
Hardware requirements
You need an operational AKS cluster with at least 1 worker node. The cluster must meet the following requirements:
- The total cluster capacity has at least 16 core CPU and 64 GB memory, for example, 2 worker nodes each with 8 core CPU and 32 GB or 4 work nodes each with 4 core CPU and 16 GB.
- Each worker node needs at least 100 GB free disk space to store Docker images, logs, and ephemeral cluster data.
- We recommend you have at least 2 worker nodes in the AKS cluster.
Note At this time, Edge site installations on AKS clusters are only compatible with nodes running Linux-based operating systems. For more information about the currently supported Linux OS for AKS clusters, go to the Azure documentation about Azure Kubernetes core concepts.
Network requirements
Commercial
- The URL of your Collibra Platform environment.
- https://http-intake.logs.datadoghq.com: This URL is used to collect some of the logs from Edge for issue diagnosis. We do not send JDBC driver logs from Edge to Datadog.
- https://*.repository.collibra.io: This URL serves as the primary source for downloading the latest Edge docker images from Collibra's docker registry and helm-chart repository.Note If the allowlist does not accept wildcards:
- https://repository.collibra.io
- https://edge-docker-delivery.repository.collibra.io
- https://mirror-docker.repository.collibra.io
- https://otlp-http.observability.collibra.dev/: This URL is used to ingest metrics and traces for monitoring the health and usage of Edge sites.
FedRAMP
- The URL of your Collibra Platform environment.
- https://http-intake.logs.ddog-gov.com
- https://*.artifactory-gov2prod.collibra.com/Note If the allowlist does not accept wildcards:
- https://artifactory-gov2prod.collibra.com
- https://edge-docker-delivery.artifactory-gov2prod.collibra.com
- Create an Edge site in Collibra Platform.
- Install an Edge site and learn more about which upgrade method you should select for your Edge site.
- Optionally, you can configure your own private docker registry.
- Optionally, you can set up a Vault integration.
- Create an Edge site connection.
- Create an Edge site capability.