Requirements
Hardware
A GKE cluster with at least 2 worker nodes. Each node requires:- 2 x86 vCPUs
- 8 GiB Memory
- 64 GiB Storage
t2a-standard-2 or t2d-standard-2
Ingestion workloads can run on Spot VMs to reduce costs, but at least one node must always remain running.
Software
- Kubernetes 1.28 or later
- Helm CLI and
kubectlinstalled locally - Argo Workflows 3.7 (installed automatically by the Helm chart)
Installation
The Helm chart bundles all required Kubernetes resources, including:- The Hybrid Runner Server pod
- Argo Workflows (installed as a dependency)
- A cron job to periodically renew credentials from Collate’s ECR registry
Step 1 — Prerequisites
Before deploying, ensure:- Collate has provided you with AWS ECR credentials to pull the required Docker images.
- You have a GKE cluster running Kubernetes 1.28+.
helmandkubectlare installed and configured to target your cluster.
Step 2 — Get the Collate Authentication Token
The Hybrid Runner authenticates to the Collate API using a JWT token from the ingestion bot.- Log in to your Collate instance as an administrator.
- Navigate to Settings → Bots and search for
ingestion. - Open the IngestionBot entry and copy the OpenMetadata JWT Token.
https://<your-instance>.getcollate.io/bots/ingestion-bot.
Step 3 — Create the Helm values file
Create avalues.yaml file with the minimal required configuration:
Step 4 — Deploy
Add the Helm repository and install the chart:Step 5 — Validating the Setup
Once deployed, verify the runner is connected from the Collate UI:- Go to Settings → Preferences → Ingestion Runners.
- Find your runner by the
agentIdyou configured. - Confirm the status shows Active.
Additional Settings
Creating a Service with the Hybrid Runner
- Navigate to Settings → Services and click Add New Service.
- In the Ingestion Runner dropdown, select your Hybrid Runner.
- Before filling in connection details, store any secrets in GCP Secret Manager.
By default, the Runner has access to the prefix
/collate/hybrid-ingestion-runner.
Secrets management
In the GCP Console, go to Secret Manager → Create Secret. Store the raw secret value (no quotes, no JSON wrapping).Configuring GCP Secret Manager
Use Workload Identity to grant the ingestion pods access to GCP Secret Manager without managing service account keys. Required IAM role:roles/secretmanager.secretAccessor
Update your Helm values to configure the secrets manager and annotate the pod service account:
<gcp-service-account> and <project-id> with your GCP values.
Referencing the secret in the Collate UI
In any password or secret field in the connection form, enter the secret reference using this format:/collate/hybrid-ingestion-runner/my-db-password, enter:
Secret references only work for fields that are treated as secrets in the connection form — these are the masked fields with a show/hide toggle icon.