Document toolboxDocument toolbox

Cluster installation using resources created for Azure through stack

Applies to: Kyvos Enterprise  Kyvos Cloud (SaaS on AWS) Kyvos AWS Marketplace

Kyvos Azure Marketplace   Kyvos GCP Marketplace Kyvos Single Node Installation (Kyvos SNI)


Once you have created resources from the Azure portal, install Kyvos as explained in this section.

Note

To create a Kyvos Manager node, go to metadata.json file in the <install dir>/kyvosmanager/cloud/azure/templates folder, and set the value for showKMNode as true.

  1. On the Kyvos Installer, select the I have all the resources option.

  2. Click Install Kyvos. The Setup Kyvos Environment dialog is displayed.

  3. Enter details as:

Area

Parameter/Field

Remarks/Description

Area

Parameter/Field

Remarks/Description

 

Cluster Name

Provide a unique cluster name

License

Upload your Kyvos license file, and click UPLOAD

Installation Path

Provide the installation path for Kyvos

Authentication

User Name

Enter your username for authentication.

Authentication Type

  • Private Key: Choose and Upload the Private Key file.

  • Password: Provide your credentials.

    NOTE: To use password authentication for instances while deployment, ensure that the instances have been configured for using Password-based authentication.

Configure Kyvos Services on Cloud

Select Instance by

  • IP Address: Select this option for IP Address-based deployment.

  • Hostname:  Select this option for hostname-based deployment. In this case, you can deploy the cluster using custom hostnames for nodes to be used for Kyvos services. 

    • Click the Use custom hostname for selected nodes link to specify or map custom hostname for selected BI Server, Query Engine, and Kyvos Manager/repository node.
      NOTE: Ensure that the instances have been configured for using Custom hostnames.

Deployment

Select the deployment that you created on the Azure portal.

Click Fetch resources to view and modify any resources. 

Virtual machines for Bl Server

Provide a comma-separated list of IP Addresses/Hostname (depending on the type selected above) for the Virtual machines to be used as BI Server instances.

Virtual machines for Query Engine

Provide a comma-separated list of IP Address/Hostname (depending on the type selected above) for the Virtual machines to be used as Query Engine instances.

Virtual machines for Web Portal

Provide a comma-separated list of IP Addresses/Hostname (depending on the type selected above) for the Virtual machines to be used as Web Portal instances.

Repository

Provide IP Address/Hostname (depending on the type selected above) for the Virtual machines to be used as a repository for Kyvos.

Repository Password

Provide the Postgres repository password.

Storage

ABFS Account Name

Provide the ABFS Account Name to be used for storage.

Container Name

Provide the ABFS Account Name to be used for storage.

Databricks

Databricks Cluster Id

Enter the ID of the cluster you created. To obtain this ID, click the Cluster Name on the Clusters page in Databricks. The page URL shows <https://<databricks-instance>/#/settings/clusters/<cluster-id>>

File System Type

Select the type of file system to be used in Databricks.

Organization Id

Provide the Organization ID for the Azure environment. It is the number after o= in the workspace URL.

Databricks URL

Provide the URL in <https://<account>.cloud.databricks.com> format.
Example: https://centralus.azuredatabricks.net/

Vault URL

Enter your Azure Key vault URL.

Databricks Authentication 

Select the authentication type for the Databricks cluster from:

  • AAD Token Using Managed Identity:  This option is supported only with premium workspace.

  • Personal Access Token

  • Fetch Parameters: Clicking this will open a new dialog box where you need to provide the following details:

    • fs.azure.account.auth.type: The OAuth input is displayed by default.

    • fs.azure.account.oauth.provider.type: The input for this field is displayed by default.

    • fs.azure.account.oauth2clientID: Enter the managed identity client ID.

    • fs.azure.account.oauth2clientID: Enter the tenant ID.

NOTE: Post deployment of the cluster, you can change the Databricks Authentication type from the Databricks page on Kyvos Manager.

  • W hen switching from AAD to PAT, you need to provide personal access token, which is saved as a secret in your Azure Key Vault and is read from there for authentication purposes. For this:

    • Go to Key Vault Secret.

    • Add  KYVOS -DATABRICKS-SERVICE-TOKEN-DefaultHadoopCluster01 and provide DB token value and click Save.

  • When switching from AAD to PAT, you need to Configure Managed Identity in Azure Databricks .

Function

Function Deployment

Optionally, provide the name of the deployment where your Azure Functions are deployed.
NOTE: This is displayed only if the stack that was created, contains functions.

  1. Click the Advanced Settings link. The Advanced Settings dialog box is displayed with values populated according to the ones that you defined while creating the stack.

  2. To update any fields, enter information as:

Configuration Type

Parameter/Field

Comments/Description

Configuration Type

Parameter/Field

Comments/Description

Common

Kyvos Setup Package

Select the Kyvos bundle to be installed. Kyvos Manager contains compatible Kyvos bundles. To use any other Kyvos version, click the Upload button

Semantic Model Local Path

Enter the semantic model local path where cuboids will be copied. For multiple paths, enter a semicolon-separated list.
NOTE: The deployment user must have full permission on the parent of the local semantic model path.

Automatically restart Kyvos services when down

Select this option to enable high availability mode for the Kyvos service. This will ensure Kyvos services are always up and running. The Kyvos Manager will automatically restart the BI server, query engine, repository, and web portal services, in case any of these services go down

BI Server

 

 

Listener Port

Enter the listener port for BI Server.

JMX Port

Enter the JMX port for BI Server health monitoring.

Work Directory

Enter the directory location on HDFS, where BI Server has access permissions.

Maximum Heap Memory

Enter the maximum memory available for BI Server.

Additional Java Options

Use this to define custom Java properties for your BI Server.

Query Engine

 

Thrift Listener Port

Enter the thrift listener port for Query Engine.

JMX Port

Enter the port for Query Engine health monitoring.

Maximum Heap Memory

Enter the maximum memory for Query Engine.

Additional Java Options

Use this to define custom Java properties for your Query Engine.

Web Portal

 

 

 

UI Port

Enter the port on which the Kyvos Web client will run.

JMX Port

Enter the port for Web portal health monitoring.

Shut-down Port

Enter the port to be used for shutting the Tomcat server.

AJP Port

Enter the port on which the AJP connector creates a socket and awaits an incoming connection.

Maximum Heap Memory

Enter the maximum memory for the Web portal.

Additional Java Options

Use this to define custom Java properties for the Web portal.

Network Protocol Configuration

Enable TLS

Select the checkbox to enable TLS for the cluster.

HTTP Protocol Version

Select the HTTP Protocol Version for use with TLS.

Kyvos Web Portal on HTTPS

Select the checkbox to use HTTPS for connecting to Kyvos Web Portal.

TLS Configuration

 

 

 

 

 

 

 

 

 

 

TLS Protocol

Select the version of SSL/TLS protocol to be used. For multiple versions, select the corresponding checkboxes.

TLS Certificate Mode

Select the mode from Use Path or Upload File.

Keystore

Provide the location of the keystore file. This file is used by the server when secure communication is enabled and required by the client when mutual authentication is enabled.
Example:  /data/KM_SNI/Certificate/keystore.jks

Keystore Private Key

Enter the keystore password.

Truststore 

Provide the location (path) to read the trust store file. The client requires this file when secure communication is enabled and required by the server when mutual authentication is enabled.
Example:  /data/KM_SNI/Certificate/truststore.jks

Truststore Private Key

Enter the truststore password.

Cipher Suite

Enter the encryption algorithm to be used for communication over the TLS layer.

Enable Mutual Authentication

Select to enable mutual authentication. 
NOTE: This option is displayed only if you have installed the Kyvos cluster using the war bundle. For other modes, Mutual authentication is enabled automatically.

Kyvos Web Portal Configuration

Use same certificate as TLS

Select this option to use the same TLS certificate for Kyvos Web Portal.

Use different certificate

  • Certification Mode: Select the Use Path or Upload File option.

  • Keystore: Provide the path or upload the Keystore file for the certificate.

  • Keystore Private Key: Provide the Keystore Private Key for the certificate.

  • Custom Attributes for HTTPS over TLS connector: If needed, provide attributes to be used for the TLS connector.

  1. Click Apply.

  2. Click Next. The system validates your settings, and all the configurations done so far are displayed in the Review and Confirm dialog box.

  3. Review the settings, and click Back to make any changes.

  4. Select the checkboxes to accept the terms and start Kyvos services on installation.

  5. Click Install to complete the installation.

Copyright Kyvos, Inc. All rights reserved.