Use a Unity catalog to configure access to external, Unity catalog-owned, and managed tables stored on Amazon S3, Azure Data Lake Storage, and Google Cloud Storage.
The Unity catalog supports a subset of operations across managed, external, and Unity Catalog-owned tables. The following outlines which operations are supported:
Supported for | Operation | Notes |
---|---|---|
External tables | CREATE TABLE, INSERT, UPDATE, MERGE, DELETE, DROP TABLE, READ |
To perform write operations on external tables with Unity Catalog, you must meet Databricks’ requirements for external access. |
Managed tables | READ |
Managed tables that are not Unity Catalog-owned tables are read-only. |
Unity Catalog-owned tables | INSERT, UPDATE, MERGE, DELETE, DROP, READ |
A Unity Catalog-owned table is a managed table specific to Unity and created in Databricks. Unity Catalog-owned tables are in private preview in Databricks and may change without notice. You must contact Databricks for access to this feature, and you must contact Starburst support to enable write access to Unity catalog-owned tables. |
TBLPROPERTIES (
'delta.enableRowTracking' = 'false',
'delta.checkpointPolicy' = 'classic'
)
Follow these steps to create a catalog for Unity:
The following sections provide more detail for creating Unity catalog connections.
The Catalog name is visible in the query editor and other clients. It is used to identify the catalog when writing SQL or showing the catalog and its nested schemas and tables in client applications.
The name is displayed in the query editor, and in the output of a SHOW
CATALOGS command.
It is used to fully qualify the name of any table in SQL queries following the
catalogname.schemaname.tablename
syntax. For example, you can run the
following query in the sample cluster without first setting the catalog or
schema context: SELECT * FROM tpch.sf1.nation;
.
The Description is a short, optional paragraph that provides further details about the catalog. It appears in the Starburst Galaxy user interface and can help other users determine what data can be accessed with the catalog.
To configure the connection to your Unity catalog, provide the following details:
dbc-a1b2345c-d6e7.cloud.databricks.com
Unity Catalog name: the name of the Unity Catalog within the Databricks workspace.
Select between Cross account IAM role or AWS access key to grant access to the object storage.
With Cross account IAM role, provide an alias for the role in Starburst Galaxy and the AWS IAM ARN.
With AWS access key, provide the AWS access key for S3 and the AWS secret key for S3.
Read External security in AWS to learn about configuring these details in the AWS console.
Provide an ADLS storage account name, which you can find in your list of Resources in the Azure services section when you log into the Azure portal.
Specify an authentication method that can grant access to that object storage account. Select between the following authentication methods:
Azure service principal: Select a service principal alias from the drop-down list of configured service principals. If you have not yet configured a service principal for this Starburst Galaxy account, click Configure an Azure service principal to do so now. Configure Azure service principals following the guidance in:
Azure access key: Provide the ABFS access key for the specified storage account. Obtain this access key as described in:
Provide the GCS JSON key to grant access to the object storage.
Create a JSON-formatted API key for your Google Cloud account.
If you intend to connect the catalog to an accelerated cluster, Starburst Warp Speed optionally provides fast warmup.
To set a backup location in your object storage for index and data caches, enter a Bucket name and a Directory name within the bucket where the cache data is to be stored.
Once you have configured the connection details, click Test connection to confirm data access is working. If the test is successful, you can then save the catalog.
If the test fails, look over your entries in the configuration fields, correct any errors, and try again. If the test continues to fail, Galaxy provides diagnostic information that you can use to fix the data source configuration in the cloud provider system.
Click Connect catalog, and proceed to set permissions where you can grant access to certain roles.
This optional step allows you to configure read-only access or full read and write access to the catalog.
Use the following steps to assign read-only access to all roles:
You can specify read-only access and read-write access separately for different sets of roles. That is, one set of roles can get full read and write access to all schemas, tables, and views in the catalog, while another set of roles gets read-only access.
Use the following steps to assign read/write access to some or all roles:
You can add your catalog to a cluster later by editing a cluster. Click Skip to proceed to the catalogs page.
Use the following steps to add your catalog to an existing cluster or create a new cluster in the same cloud region:
Click Add to cluster to view your new catalog’s configuration.
Is the information on this page helpful?
Yes
No