Insights configuration#
Insights requires some additional configuration before you can access its features in the Starburst Enterprise web UI.
Requirements#
Insights requires:
A configured and operational backend service.
A valid Starburst Enterprise license.
Configuration properties on the coordinator, described next.
Note
Usage metrics are surfaced and documented in Insights. However, usage metrics continue to be collected even when Insights is disabled.
Insights is configured in the config.properties file on the coordinator only. To avoid startup failures, do not add Insights properties to worker configuration files.
General configuration properties#
You must explicitly enable Insights to use the persisted data in the
backend service database with
insights.persistence-enabled=true
. Persisted data provides the information
needed for the query and cluster history features. Additionally, you can
configure Insights to persist cluster metrics to the same database with the
insights.metrics-persistence-enabled
property.
For deployments using built-in access control, usage metrics and unrestricted access to query history are controlled through roles and privileges in the built-in access control system.
Warning
Do not use the deprecated insights.authorized-users
and
insights.authorized-groups
with SEP’s built-in access control, as they
provide administrative access outside of built-in access control. Use the
built-in access control configuration properties instead.
Deployments using supported third-party access control integrations such as Ranger and Privacera must use the UI access controls and configuration properties available in SEP’s built-in access control to control which users can access specific UI elements if that level of control is desired.
For legacy deployments, usage metrics and unrestricted access to query history
are controlled by the deprecated insights.authorized-users
and
insights.authorized-groups
configuration properties. You must assign
specific authorized users and/or groups, or enable everyone with a wildcard. If
a user has not been granted access, they can only review queries made by that
user account. See example authorization configurations in
Authorization examples.
Property name |
Description |
---|---|
|
Enable the query history functionality. Defaults to |
|
Enable the usage metrics functionality. Defaults to |
|
Regular expression to match user names granted unrestricted access to the query history and to the usage metrics feature. See the examples for more details. Do not use if implementing SEP’s built-in access control. Use the built-in access control configuration properties instead. |
|
Regular expression to match user groups granted unrestricted access to the query history and to the usage metrics feature. See the examples for more details. Do not use if implementing SEP’s built-in access control. Use the built-in access control configuration properties instead. |
The following example config.properties configuration enables Insights on a coordinator that already has the backend service configured:
insights.persistence-enabled=true
insights.metrics-persistence-enabled=true
Data retention#
Insights’s data retention configuration properties allow you to define intervals at which SEP performs a sweep to purge history, as well as the range of data purged, from the following tables:
biac_change_log
biac_access_log
biac_audit_session
completed_queries
query_user_group
query_tables
query_views
query_plan
Note
Usage metrics, cluster metrics, query editor tab information, node anomalies, and recommendations are not purged.
Note
Retention policy for the built-in access control audit logs is the same as for the query history because audit logs maintain a reference to the query that triggered them. If you need to retain audit logs that would otherwise be deleted by the data retention configuration, download the access logs and change logs as CSV files.
Data retention policies are disabled by default, ensuring that no data is purged automatically. If data retention policies are enabled, SEP logs all deletions.
Property name |
Description |
Example |
---|---|---|
|
Data older than this threshold is purged. Can be any SEP duration value, but is always rounded up to an integer number of days. If omitted, no data is deleted. |
|
|
Schedule to start sweep in unix |
|
|
Specifies the timezone in TZDB format to be used by sweep schedule. If omitted, the system timezone is used. |
|
|
Maximum sweep duration. Can be used along with sweep schedule to limit the time interval when data deletion occurs. Can be any SEP duration value. If omitted, or if the configured value exceeds time until the next schedule, the sweep runs until the next scheduled sweep. |
|
Miscellaneous configuration properties#
The following optional properties allow you to fine-tune the functionality and behavior of Insights.
Property name |
Description |
---|---|
|
Maximum number of connections to the backend service database in the
connection pool in SEP. Default is |
|
Minimum number of connections to the backend service database in the
connection pool in SEP. Default is |
|
How often query and cluster metrics are sampled for the overview page.
Default is |
|
How often query and cluster resource metrics are persisted for the
cluster history page. Default is |
|
The number of sample data points to store in memory for the graphs on
the overview page. Default is |
|
When explicitly set to |
Instructions for configuring Insights for Kubernetes deployments are available in the Kubernetes documentation.