Databricks on Azure
Last updated
Was this helpful?
Last updated
Was this helpful?
To connect Databricks to Select Star, you will need:
A Databricks instance on Azure. For details, see
Account admin permissions on the Databricks instance
Workspace admin permissions on the Databricks instance
Complete all of the following steps to see Databricks metadata, lineage, and popularity in Select Star:
Account admins can add users to the Databricks account using the account console or the SCIM Account API. These instructions focus on using the account console approach.
To add a service user to the account using the account console:
Click User management.
On the Users tab, click Add user.
Enter any email, first name and last name for the service user.
Click Add.
The account console
The Workspace Assignment API
The following instructions focus on using the account console approach.
To add a service user to a workspace using the account console, the workspace must be enabled for identity federation.
Click Workspaces.
On the Permissions tab, click Add permissions.
Search for and select the service user and assign the permission level (workspace Admin), and click Save.
To grant SQL Warehouse access for a service user using the workspace admin console, the workspace must be enabled for identity federation.
As a workspace admin, log in to the Databricks workspace.
Click your username in the top bar of the Databricks workspace and select Admin Settings.
Go to the Identity and access tab, and under Users click Manage.
On the User tab, click the service user that was create in the previous steps.
Select the checkbox for Databricks SQL access and Workspace access, and click Update.
As a workspace admin, log in to a workspace that is linked to the metastore.
Click Catalog.
Click the catalog that needs to be granted access to, and select Permissions.
Click Grant.
Select the user/group and grant Privilege presets to Data Reader, and select the checkbox for USE CATALOG, USE SCHEMA and SELECT, and click Grant.
This step is required to show notebooks in the catalog and notebook lineage.
Log in to a workspace that is linked to the metastore.
Click Workspace and select top folder.
Click Share button.
Select the user/group, then select permission "Can view", and click Add.
To authenticate a service user to APIs on Databricks, an administrator can create a Access Tokens.
As a service user, log in to a workspace.
Click your username in the top bar of the Databricks workspace and select Admin Settings. Ensure that the visible username is the service user you created in the previous steps.
Go to the Developer tab, and under Access tokens click Manage.
Click Generate new token and fill form. Once submitted, preserve access token for later use.
Go to the Select Star Settings. Click Data in the sidebar, then + Add to create a new Data Source.
Choose Databricks in the Source Type dropdown and provide the following information:
Display Name: This value is Databricks
by default, but you can override it if desired.
Workspace URL: This is the address of the Workspace. This should include the <identifier>.azuredatabricks.net
.
Access Token: This is the Access token, which is used to authenticate access to Databricks on Azure.
After you fill in the information, you'll be asked to select the catalog you'd like to load into Select Star.
Select the catalogs and click Next.
For each catalog you selected, you'll be able to select the schemas.
Your metadata should start loading automatically. Please allow 24-48 hours to completely generate popularity and lineage.
When the sync is complete, you'll be able to explore Databricks in Select Star.
See the link below for more information on Databricks in Select Star.
As an account admin, log in to the .
Account admins can add service users to using the following:
As an account admin, log in to the .
These are the minimum permissions required for Select Star to collect basic metadata and query history. Query history is also used to generate .
You can you have loaded if needed.