Starburst Power BI DirectQuery driver#

The Power BI DirectQuery driver can be used to connect Microsoft Power BI Desktop and Microsoft Power BI Service to Starburst Enterprise Presto (SEP). It allows Power BI to let SEP perform all query processing. This combines the scalability and power of SEP with the business intelligence reporting features of Power BI.

Connecting with Power BI Desktop#

The driver is included as part of Power BI 2.87.720.0 and higher, and you can connect to Presto with it easily.

  • Access the Get Data dialog

  • Select Other

  • Use Starburst Enterprise Presto

  • Choose your Data Connectivity mode and proceed with OK.

  • Configure the necessary connection and authentication details for your SEP cluster. More information on authentication can be found in the following sections.

  • After the connection is established, you can use the Data Navigator to browse catalogs, query data sources and more.

The driver always tries to connect with an encrypted connection first. If you are connecting without SSL/TLS, the connector offers the option to connect using an unencrypted connection afterwards.

To use an SSL/TLS encrypted connection to your SEP server, make sure the server’s certificate is added to the system trust store (Certificates -> Trusted Root Certification Authorities) ​before connecting to a SSL/TLS-enabled. The certificate can be added for the machine, or for each user running the Power BI connector. In many organizations this handled automatically as part of the operating system and browser configuration.

LDAP authentication with Power BI Desktop#

If your SEP server is configured to use LDAP authentication, select LDAP in the authentication window when connecting to Presto and provide your username and password credentials.

Kerberos authentication with Power BI Desktop#

To use Kerberos authentication, Kerberos must be installed for the user and initialized using kinit, before using the driver. This establishes your user credentials on the machine.

Select Kerberos in the authentication window, when connecting, and provide the Kerberos Service name.

Connecting with Power BI service#

Using the Power BI service, requires you to have the on-premises data gateway for Power BI installed on your machine.

You have to request the driver as a .mez file from Starburst support, when using the Power BI service.

As a next step you have to copy the file into %USER%\Documents\Power BI Desktop\Custom Connectors for each user. Create the directory, if it does not exist.

The gateway service account needs to have sufficient permissions to access the Custom Connectors directory, C:\Users\<Name>\Documents\Power BI Desktop\Custom Connectors inside your Power BI installation.

Update the directory properties in the Security - Advanced tab. Add access that grants Basic Permissions - Full Control to Everyone / Authenticated Users. Alternatively, you can also create a new group and add the gateway service account to a new group.

Update the value for Load custom data connectors from folders in the Connectors configuration of the gateway to point at the folder in your Power BI Desktop installation.

Login to Power BI Online and update the Gateway Cluster Settings. Enable the setting Allow user’s custom data connector to refresh through this gateway clusters.

Now you can add a data source:

  • Login to the Power BI service

  • Navigate to Setting -> Manage gateways

  • Select the gateway -> Add data source

  • Set the Data Source Type to Starburst Enterprise Presto

  • Enter the corresponding host and port

  • Set the authentication as desired

  • Click Add to create the data source and begin using it


  • Self-signed certificate usage for TLS/SSL connections is not supported.

  • Authentication type and field name customizations do not apply on Power BI Service. The following is the mapping of the Service field names to their Desktop counterparts:

    Service name

    Desktop name





    Key: Account Key

    Kerberos: Service Name