Skip to content

Custom Service Repo for Access Management for Starburst Trino

Creating a Service Repo

To create a custom service repository, refer to the Creating a Service Repository.

Configure Custom Repo Name

  • Open the vars.trino.opensource.yml file and update the following configuration:

    Bash
    ### This is for hive catalog
    TRINO_HIVE_POLICY_REPO_CATALOG_MAPPING: "custom_hive_repo_1:catalog_1;custom_repo_2:catalog_2,catalog_3" 
    
    Bash
    ### This is for catalog other than hive catalog
    TRINO_RANGER_SERVICE_REPO: "custom_trino_repo"
    

  • After configuring the properties, start the connector by executing the following instructions: Step 1 - Setup which generates the helm charts. This step usually takes few minutes.

    Bash
    cd ~/privacera/privacera-manager
    ./privacera-manager.sh setup
    
    Step 2 - Apply the Privacera Manager helm charts.
    Bash
    cd ~/privacera/privacera-manager
    ./pm_with_helm.sh upgrade
    
    Step 3 - Post-installation step which generates Plugin tar ball, updates Route 53 DNS and so on.

    Bash
    cd ~/privacera/privacera-manager
    ./privacera-manager.sh post-install
    
  • Follow the steps to copy the configuration files and rebuild the image Follow this steps

    Note

    If the custom service repo is not defined, the plugin will use default service repos.

Comments