Starburst Galaxy

  •  Get started

  •  Working with data

  •  AI workflows

  •  Data engineering

  •  Developer tools

  •  Cluster administration

  •  Security and compliance

  •  Troubleshooting

  • Galaxy status

  •  Reference

  • Unity catalog #

    Use a Unity catalog to configure access to external, Unity catalog-owned, and managed tables stored on Amazon S3, Azure Data Lake Storage, and Google Cloud Storage.

    The Unity catalog supports a subset of operations across managed, external, and Unity Catalog-owned tables. The following outlines which operations are supported:

    Supported for Operation Notes
    External tables CREATE TABLE, INSERT, UPDATE, MERGE, DELETE, DROP TABLE, READ To perform write operations on external tables with Unity Catalog, you must meet Databricks’ requirements for external access.
    Managed tables READ Managed tables that are not Unity Catalog-owned tables are read-only.
    Unity Catalog-owned tables INSERT, UPDATE, MERGE, DELETE, DROP, READ A Unity Catalog-owned table is a managed table specific to Unity and created in Databricks. Unity Catalog-owned tables are in private preview in Databricks and may change without notice. You must contact Databricks for access to this feature, and you must contact Starburst support to enable write access to Unity catalog-owned tables.
    TBLPROPERTIES (
      'delta.enableRowTracking' = 'false',
      'delta.checkpointPolicy' = 'classic'
    )
    

    Follow these steps to create a catalog for Unity:

    1. In the navigation menu, select Data, then Catalogs.
    2. Click Create catalog.
    3. On the Create a catalog pane, click the Unity icon.

    Select a data source

    1. Configure the catalog as prompted in the dialog.
    2. Test the connection.
    3. Connect the catalog.
    4. Set any required permissions.
    5. Add the new catalog to a cluster.

    The following sections provide more detail for creating Unity catalog connections.

    Define catalog name and description #

    The Catalog name is visible in the query editor and other clients. It is used to identify the catalog when writing SQL or showing the catalog and its nested schemas and tables in client applications.

    The name is displayed in the query editor, and in the output of a SHOW CATALOGS command. It is used to fully qualify the name of any table in SQL queries following the catalogname.schemaname.tablename syntax. For example, you can run the following query in the sample cluster without first setting the catalog or schema context: SELECT * FROM tpch.sf1.nation;.

    The Description is a short, optional paragraph that provides further details about the catalog. It appears in the Starburst Galaxy user interface and can help other users determine what data can be accessed with the catalog.

    Enter catalog name and description

    Unity configuration #

    To configure the connection to your Unity catalog, provide the following details:

    • Unity Workspace host: the name of the Databricks workspace host with Unity Catalog enabled, without any https prefix, for example: dbc-a1b2345c-d6e7.cloud.databricks.com
    • Unity Bearer token: the secret token used by the service principal to authenticate a connection to the Unity Catalog metastore. For more information about generating an on-behalf token for the service principal, see the Databricks documentation.
    • Unity Catalog name: the name of the Unity Catalog within the Databricks workspace.

        Unity configuration

    Authentication to S3 #

    Select between Cross account IAM role or AWS access key to grant access to the object storage.

    With Cross account IAM role, provide an alias for the role in Starburst Galaxy and the AWS IAM ARN.

    With AWS access key, provide the AWS access key for S3 and the AWS secret key for S3.

    Read External security in AWS to learn about configuring these details in the AWS console.

    Authentication to ADLS #

    Provide an ADLS storage account name, which you can find in your list of Resources in the Azure services section when you log into the Azure portal.

      Azure select storage account

    Specify an authentication method that can grant access to that object storage account. Select between the following authentication methods:

    • Azure service principal: Select a service principal alias from the drop-down list of configured service principals. If you have not yet configured a service principal for this Starburst Galaxy account, click Configure an Azure service principal to do so now. Configure Azure service principals following the guidance in:

    • Azure access key: Provide the ABFS access key for the specified storage account. Obtain this access key as described in:

    Authentication to GCS #

    Provide the GCS JSON key to grant access to the object storage.

    Create a JSON-formatted API key for your Google Cloud account.

    GCS authentication

    Fast warmup #

    If you intend to connect the catalog to an accelerated cluster, Starburst Warp Speed optionally provides fast warmup.

    To set a backup location in your object storage for index and data caches, enter a Bucket name and a Directory name within the bucket where the cache data is to be stored.

    fast warmup backup location

    Test the connection #

    Once you have configured the connection details, click Test connection to confirm data access is working. If the test is successful, you can then save the catalog.

    If the test fails, look over your entries in the configuration fields, correct any errors, and try again. If the test continues to fail, Galaxy provides diagnostic information that you can use to fix the data source configuration in the cloud provider system.

    Test connection

    Connect catalog #

    Click Connect catalog, and proceed to set permissions where you can grant access to certain roles.

    Set permissions #

    This optional step allows you to configure read-only access or full read and write access to the catalog.

    Use the following steps to assign read-only access to all roles:

    1. Select the Read-only catalog switch to grant a set of roles read-only access to the catalog’s schemas, tables, and views.
    2. Next, use the drop-down menu in the Role-level permissions section to specify the roles that have read-only access.
    3. Click Save access controls.

    You can specify read-only access and read-write access separately for different sets of roles. That is, one set of roles can get full read and write access to all schemas, tables, and views in the catalog, while another set of roles gets read-only access.

    Use the following steps to assign read/write access to some or all roles:

    1. Leave the Read-only catalog switch cleared.
    2. In the Role-level permissions section:
      • Expand the drop-down menu in the Roles with read and write access field and select one or more roles to grant read and write access to.
      • Expand the drop-down menu in the Roles with read access field and select one or more roles from the list to grant read-only access to.
    3. Click Save access controls.

      Set permissions for read and write screenshot

    Add to cluster #

    You can add your catalog to a cluster later by editing a cluster. Click Skip to proceed to the catalogs page.

    Use the following steps to add your catalog to an existing cluster or create a new cluster in the same cloud region:

    • In the Add to cluster section, expand the menu in the Select cluster field.
    • Select one or more existing clusters from the drop down menu.
    • Click Create a new cluster to create a new cluster in the same region, and add it to the cluster selection menu.
    • Click Add to cluster to view your new catalog’s configuration.

        Add to cluster