You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/managed-datahub/operator-guide/setting-up-remote-ingestion-executor-on-aws.md
+49-24Lines changed: 49 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,20 @@
1
1
---
2
2
description: >-
3
-
This page describes the steps required to configure a remote ingestion
4
-
executor, which allows you to ingest metadata from private metadata sources
3
+
This page describes the steps required to configure a remote executor,
4
+
which allows you to ingest metadata from private metadata sources
5
5
using private credentials via the DataHub UI.
6
6
---
7
7
import FeatureAvailability from '@site/src/components/FeatureAvailability';
8
8
9
-
# Setting up Remote Ingestion Executor on AWS
9
+
# Setting up Remote Executor on AWS
10
10
<FeatureAvailabilitysaasOnly />
11
11
12
12
## Overview
13
13
14
-
UI-based Metadata Ingestion reduces the overhead associated with operating DataHub. It allows you to create, schedule, and run batch metadata ingestion on demand in just a few clicks, without requiring custom orchestration. Behind the scenes, a simple ingestion "executor" abstraction makes this possible.
14
+
> [!NOTE]
15
+
> Acryl Remote Executor can now be used to both run ingestions from and monitor ingestion sources that are not publicly accessible via the internet.
15
16
16
-
Acryl DataHub comes packaged with an Acryl-managed ingestion executor, which is hosted inside of Acryl's environment on your behalf. However, there are certain scenarios in which an Acryl-hosted executor is not sufficient to cover all of an organization's ingestion sources.
17
+
Acryl DataHub comes packaged with an Acryl-managed executor, which is hosted inside of Acryl's environment on your behalf. However, there are certain scenarios in which an Acryl-hosted executor is not sufficient to cover all of an organization's ingestion sources.
17
18
18
19
For example, if an ingestion source is not publicly accessible via the internet, e.g. hosted privately within a specific AWS account, then the Acryl executor will be unable to extract metadata from it.
19
20
@@ -23,31 +24,58 @@ For example, if an ingestion source is not publicly accessible via the internet,
23
24
</p>
24
25
25
26
26
-
To accommodate these cases, Acryl supports configuring a remote ingestion executor which can be deployed inside of your AWS account. This setup allows you to continue leveraging the Acryl DataHub console to create, schedule, and run metadata ingestion, all while retaining network and credential isolation.
27
+
To accommodate these cases, Acryl supports configuring a remote executor which can be deployed inside of your AWS account. This setup allows you to continue leveraging the Acryl DataHub console to create, schedule, and run both ingestion and assertion monitors, all while retaining network and credential isolation.
1.**Provide AWS Account Id**: Provide Acryl Team with the id of the AWS in which the remote executor will be hosted. This will be used to grant access to private Acryl containers and create a unique SQS queue which your remote agent will subscribe to. The account id can be provided to your Acryl representative via Email or [One Time Secret](https://onetimesecret.com/).
35
+
## Deploying a Remote Executor
36
36
37
-
2.**Provision an Acryl Executor** (ECS)**:** Acryl team will provide a [Cloudformation Template](https://github.com/acryldata/datahub-cloudformation/blob/master/Ingestion/templates/python.ecs.template.yaml) that you can run to provision an ECS cluster with a single remote ingestion task. It will also provision an AWS role for the task which grants the permissions necessary to read and delete from the private SQS queue created for you, along with reading the secrets you've specified. At minimum, the template requires the following parameters:
37
+
> [!NOTE]
38
+
> Customers migrating from the legacy DataHub Executor: migration to the new executor requires a configuration change on Acryl side. Please contact your Acryl representative for detailed guidance.
39
+
>
40
+
> Steps you will need to perform on your end when instructed by your Acryl representative:
> 2. Deploy new DataHub Executor using steps below.
43
+
> 3. Trigger an ingestion to make sure the new executor is working as expected.
44
+
> 4. Tear down legacy executor ECR deployment.
45
+
46
+
47
+
1.**Provide AWS Account Id**: Provide Acryl Team with the id of the AWS in which the remote executor will be hosted. This will be used to grant access to private Acryl ECR registry. The account id can be provided to your Acryl representative via Email or [One Time Secret](https://onetimesecret.com/).
48
+
49
+
2.**Provision an Acryl Executor** (ECS)**:** Acryl team will provide a [Cloudformation Template](https://raw.githubusercontent.com/acryldata/datahub-cloudformation/master/remote-executor/datahub-executor.ecs.template.yaml) that you can run to provision an ECS cluster with a single remote ingestion task. It will also provision an AWS role for the task which grants the permissions necessary to read and delete from the private SQS queue created for you, along with reading the secrets you've specified. At minimum, the template requires the following parameters:
38
50
1.**Deployment Location:** The AWS VPC + subnet in which the Acryl Executor task is to be provisioned.
39
-
2.**SQS Queue ARN**: Reference to your private SQS command queue. This is provided by Acryl and is used to configure IAM policies enabling the Task role to read from the shared queue.
40
-
3.**SQS Queue URL**: The URL referring to your private SQS command queue. This is provided by Acryl and is used to read messages.
41
-
4.**DataHub Personal Access Token**: A valid DataHub PAT. This can be generated inside of **Settings > Access Tokens** of DataHub web application. You can alternatively create a secret in AWS Secrets Manager and refer to that by ARN.
42
-
5.**Acryl DataHub URL**: The URL for your DataHub instance, e.g. `<your-company>.acryl.io/gms`. Note that you MUST enter the trailing /gms when configuring the executor.
43
-
6.**Acryl Remote Executor Version:** The version of the remote executor to deploy. This is converted into a container image tag. It will be set to the latest version of the executor by default.
44
-
7.**Ingestion Source Secrets:** The template accepts up to 10 named secrets which live inside your environment. Secrets are specified using the **OptionalSecrets** parameter in the following form: `SECRET_NAME=SECRET_ARN` with multiple separated by comma, e.g. `SECRET_NAME_1=SECRET_ARN_1,SECRET_NAME_2,SECRET_ARN_2.`
45
-
8.**Environment Variables:** The template accepts up to 10 arbitrary environment variables. These can be used to inject properties into your ingestion recipe from within your environment. Environment variables are specified using the **OptionalEnvVars** parameter in the following form: `ENV_VAR_NAME=ENV_VAR_VALUE` with multiple separated by comma, e.g. `ENV_VAR_NAME_1=ENV_VAR_VALUE_1,ENV_VAR_NAME_2,ENV_VAR_VALUE_2.`
51
+
2.**DataHub Personal Access Token**: A valid DataHub PAT. This can be generated inside of **Settings > Access Tokens** of DataHub web application. You can alternatively create a secret in AWS Secrets Manager and refer to that by ARN.
52
+
3.**Acryl DataHub URL**: The URL for your DataHub instance, e.g. `<your-company>.acryl.io/gms`. Note that you MUST enter the trailing /gms when configuring the executor.
53
+
4.**Acryl Remote Executor Version:** The version of the remote executor to deploy. This is converted into a container image tag. It will be set to the latest version of the executor by default.
54
+
5.**Source Secrets:** The template accepts up to 10 named secrets which live inside your environment. Secrets are specified using the **OptionalSecrets** parameter in the following form: `SECRET_NAME=SECRET_ARN` with multiple separated by comma, e.g. `SECRET_NAME_1=SECRET_ARN_1,SECRET_NAME_2,SECRET_ARN_2.`
55
+
6.**Environment Variables:** The template accepts up to 10 arbitrary environment variables. These can be used to inject properties into your ingestion recipe from within your environment. Environment variables are specified using the **OptionalEnvVars** parameter in the following form: `ENV_VAR_NAME=ENV_VAR_VALUE` with multiple separated by comma, e.g. `ENV_VAR_NAME_1=ENV_VAR_VALUE_1,ENV_VAR_NAME_2,ENV_VAR_VALUE_2.`
46
56
``
47
57
``Providing secrets enables you to manage ingestion sources from the DataHub UI without storing credentials inside DataHub. Once defined, secrets can be referenced by name inside of your DataHub Ingestion Source configurations using the usual convention: `${SECRET_NAME}`.
48
-
58
+
49
59
Note that the only external secret provider that is currently supported is AWS Secrets Manager.
50
60
61
+
**Alternatively**: if you prefer to deploy Acryl Remote Executor on your private Kubernetes cluster, please use [DataHub Executor Helm chart](https://github.com/acryldata/datahub-executor-helm/tree/main/charts/datahub-executor-worker). Similar to the above, you would need to provide the following parameters when installing the chart:
62
+
1.**Create a secret with DataHub Access Token**. A valid DataHub PAT. You can create the secret object as follows:
2. **Acryl DataHub URL**: The URL for your DataHub instance, e.g. `<your-company>.acryl.io/gms`. Note that you MUST enter the trailing /gms when configuring the executor.
67
+
3. **Acryl Remote Executor Version:** The version of the remote executor to deploy. This is converted into a container image tag.
68
+
4. **Optionally** pass source secrets/environment variables as necessary.
In order to update the executor, ie. to deploy a new container version, you'll need to update the CloudFormation Stack to re-deploy the CloudFormation template with a new set of parameters.
86
114
### Steps - AWS Console
87
115
1. Navigate to CloudFormation in AWS Console
@@ -108,20 +136,17 @@ Unfortunately, no. Secrets are wired into the executor container at deployment t
108
136
109
137
### I want to deploy multiple Acryl Executors. Is this currently possible?**
110
138
111
-
This is possible, but requires a new SQS queue is maintained (on per executor). Please contact your Acryl representative for more information.
139
+
This is possible, but currently requires a configuration change on Acryl side. Please contact your Acryl representative for more information.
112
140
113
141
### I've run the CloudFormation Template, how can I tell that the container was successfully deployed?**
114
142
115
143
We recommend verifying in AWS Console by navigating to **ECS > Cluster > Stack Name > Services > Logs.**
116
144
When you first deploy the executor, you should a single log line to indicate success:
117
145
```
118
-
Starting AWS executor consumer..
146
+
Starting datahub executor worker
119
147
```
120
-
This indicates that the remote executor has established a successful connection to your DataHub instance and is ready to execute ingestion runs.
148
+
This indicates that the remote executor has established a successful connection to your DataHub instance and is ready to execute ingestion & monitors.
121
149
If you DO NOT see this log line, but instead see something else, please contact your Acryl representative for support.
122
150
123
151
## Release Notes
124
152
This is where release notes for the Acryl Remote Executor Container will live.
125
-
126
-
### v0.0.3.9
127
-
Bumping to the latest version of acryl-executor, which includes smarter messaging around OOM errors.
0 commit comments