Requirements
Hardware
An EKS cluster with at least 2 worker nodes. Each node requires:- 2 x86 vCPUs
- 8 GiB Memory
- 64 GiB Storage
m6a.large
Ingestion workloads can run on Spot Instances to reduce costs, but at least one node must always remain running.
Software
- Kubernetes 1.28 or later
- Helm CLI and
kubectlinstalled locally - Argo Workflows 3.7 (installed automatically by the Helm chart)
Installation
The Helm chart bundles all required Kubernetes resources, including:- The Hybrid Runner Server pod
- Argo Workflows (installed as a dependency)
- A cron job to periodically renew credentials from Collate’s ECR registry
Step 1 — Prerequisites
Before deploying, ensure:- Collate has provided you with AWS ECR credentials to pull the required Docker images.
- You have an EKS cluster running Kubernetes 1.28+.
helmandkubectlare installed and configured to target your cluster.
Step 2 — Get the Collate Authentication Token
The Hybrid Runner authenticates to the Collate API using a JWT token from the ingestion bot.- Log in to your Collate instance as an administrator.
- Navigate to Settings → Bots and search for
ingestion. - Open the IngestionBot entry and copy the OpenMetadata JWT Token.
https://<your-instance>.getcollate.io/bots/ingestion-bot.
Step 3 — Create the Helm values file
Create avalues.yaml file with the minimal required configuration:
Step 4 — Deploy
Add the Helm repository and install the chart:Step 5 — Validating the Setup
Once deployed, verify the runner is connected from the Collate UI:- Go to Settings → Preferences → Ingestion Runners.
- Find your runner by the
agentIdyou configured. - Confirm the status shows Active.
Additional Settings
Creating a Service with the Hybrid Runner
- Navigate to Settings → Services and click Add New Service.
- In the Ingestion Runner dropdown, select your Hybrid Runner.
- Before filling in connection details, store any secrets in AWS Secrets Manager.
By default, the Runner has access to the prefix
/collate/hybrid-ingestion-runner.
Secrets Management
Configuring AWS Secrets Manager
Configure Pod Identity either via EKS Pod Identity or IRSA to assume an IAM role in your AWS account. TheserviceAccount name is ingestion by default.
Required IAM permissions:
<account> and <role-name> with your AWS values. The annotation is only required for IRSA — skip it if using EKS Pod Identity.
Storing a Secret
In the AWS Console, go to Secrets Manager → Store a new secret → Other type of secret → Plaintext. Paste the secret value as-is, without quotes or JSON wrapping.Referencing the Secret in the Collate UI
In any password or secret field in the connection form, enter the secret reference using this format:/collate/hybrid-ingestion-runner/my-db-password, enter:
Secret references only work for fields that are treated as secrets in the connection form — these are the masked fields with a show/hide toggle icon.