Requirements
Hardware
An AKS cluster with at least 2 worker nodes. Each node requires:- 2 x86 vCPUs
- 8 GiB Memory
- 64 GiB Storage
b2as v2
Ingestion workloads can run on Spot VMs to reduce costs, but at least one node must always remain running.
Software
- Kubernetes 1.28 or later
- Helm CLI and
kubectlinstalled locally - Argo Workflows 3.7 (installed automatically by the Helm chart)
Installation
The Helm chart bundles all required Kubernetes resources, including:- The Hybrid Runner Server pod
- Argo Workflows (installed as a dependency)
- A cron job to periodically renew credentials from Collate’s ECR registry
Step 1 — Prerequisites
Before deploying, ensure:- Collate has provided you with AWS ECR credentials to pull the required Docker images.
- You have an AKS cluster running Kubernetes 1.28+.
helmandkubectlare installed and configured to target your cluster.
Step 2 — Get the Collate Authentication Token
The Hybrid Runner authenticates to the Collate API using a JWT token from the ingestion bot.- Log in to your Collate instance as an administrator.
- Navigate to Settings → Bots and search for
ingestion. - Open the IngestionBot entry and copy the OpenMetadata JWT Token.
https://<your-instance>.getcollate.io/bots/ingestion-bot.
Step 3 — Create the Helm values file
Create avalues.yaml file with the minimal required configuration:
Step 4 — Deploy
Add the Helm repository and install the chart:Step 5 — Validating the Setup
Once deployed, verify the runner is connected from the Collate UI:- Go to Settings → Preferences → Ingestion Runners.
- Find your runner by the
agentIdyou configured. - Confirm the status shows Active.
Additional Settings
Creating a Service with the Hybrid Runner
- Navigate to Settings → Services and click Add New Service.
- In the Ingestion Runner dropdown, select your Hybrid Runner.
- Before filling in connection details, store any secrets in Azure Key Vault.
By default, the Runner has access to the prefix
/collate/hybrid-ingestion-runner.
Secrets Management
Configuring Azure Key Vault
Configure Workload Identity with a User Assigned Managed Identity to grant the ingestion pods access to Azure Key Vault. TheserviceAccount name is ingestion by default.
Required role: Key Vault Secrets Officer
Update your Helm values to configure the secrets manager, annotate the pod service account, and label the Argo Workflows pods for Workload Identity:
<user_assigned_managed_identity_client_id> with your managed identity’s client ID and <azure_key_vault_name> with the name of your Key Vault.
Storing a Secret
In the Azure Portal, go to your Key Vault → Secrets → Generate/Import. Set the secret name and paste the value as-is, without quotes or JSON wrapping.Referencing the Secret in the Collate UI
In any password or secret field in the connection form, enter the secret reference using this format:my-db-password in Key Vault, enter:
Secret references only work for fields that are treated as secrets in the connection form — these are the masked fields with a show/hide toggle icon.