Creating a semantic model on Databricks source¶
Known limitations
The PostgreSQL endpoint is not available for Databricks source, meaning:
-
Users cannot query semantic models via the PostgreSQL API.
-
BI tools that rely on PostgreSQL based connections will not be able to access semantic model.
-
BI Sync is not supported
Databricks Depot support is only for Lens and not supported to be used in other Stacks or Resources:
-
Databricks can only be referenced as a source for Lens, and cannot be used in other Stacks or Resources yet.
-
Metadata scanning for Databricks tables is not supported.
Prerequisites¶
Before setting up the connection, ensure all necessary prerequisites are in place:
1. Databricks Configuration Requirements
-
Databricks Workspace and Active SQL Warehouse: Required to establish a connection and execute SQL queries.
-
JDBC Connection Details: Includes the host, port, httpPath, and database parameters obtained from the Databricks SQL Warehouse connection URL.
-
Databricks Personal Access Token (PAT): Used for authentication to Databricks. This token must be securely stored within an Instance Secret.
2. DataOS Requirements
-
Instance Secret: Stores and secures source credentials (and repository credentials if the repository is private).
-
Depot Configuration: References both the Instance Secret and the JDBC parameters to create a secure connection between Lens and Databricks.
3. Version Control and Model Management
- Repository Setup: The semantic model should be version-controlled within a dedicated Lens repository. Ensure the model is placed inside the
model/directory before deployment.
Step 1: Set up a connection with source¶
To ensure a smooth setup, complete the following prerequisites:
1. Secure source credentials by creating Instance Secret
Before establishing a connection to the Databricks, an Instance Secret must be created. This secret securely stores the credentials(here, the Databricks Personal Access Token). Follow the official Databricks guide to generate a Personal Access Token.
name: databricks-r
version: v1
type: instance-secret
layer: user
instance-secret:
type: key-value-properties
acl: r
data:
token: "dapi0123" # databricks's personal access token here
To connect to Databricks through a Depot, you’ll need its JDBC connection details. Follow these steps to retrieve them:
-
Go to Databricks workspace.
-
Navigate to: SQL → SQL Warehouses → select warehouse → Connection Details.
-
Copy the JDBC URL, it will look like this:
jdbc:spark://<databricks-host>:443/default;transportMode=http;ssl=1;AuthMech=3;httpPath=sql/protocolv1/o/<org-id>/<warehouse-id>
Extract the following values from the URL to fill in Depot manifest file:
| Field | Description | Example Value |
|---|---|---|
subprotocol |
Identifies the JDBC driver type used to connect to Databricks. | databricks-jdbc |
database |
Specifies the default database or schema to connect to. (optional) | main |
host |
The Databricks workspace host (server hostname). | dbc-123abc23-d0aa.cloud.databricks.com |
port |
The port used for the JDBC connection. | 443 |
transportMode |
Specifies the transport protocol used for communication. | http |
ssl |
Enables SSL encryption for the connection. | 1 |
AuthMech |
Defines the authentication mechanism used. | 3 |
httpPath |
The HTTP path to the Databricks SQL Warehouse. | /sql/1.0/warehouses/99123 |
accept_policy |
Confirms acceptance of Databricks JDBC driver usage terms (required). | true |
Use the extracted values to populate the following Depot manifest file:
name: databricks #depot name
version: v2alpha
type: depot
description: databricks jdbc depot
owner: iamgroot
layer: user
depot:
type: JDBC
external: true
secrets:
- name: databricks-r #instance-secret created
allkeys: true
jdbc:
subprotocol: databricks-jdbc
database: main #optional
host: dbc-123abc23-d0aa.cloud.databricks.com
port: 443
params:
transportMode: http
ssl: 1
AuthMech: 3
httpPath: /sql/1.0/warehouses/99123
accept_policy: true # This accepts the Databricks usage policy and must be set to `true` to use the Databricks JDBC driver
Step 2: Prepare the Lens model folder¶
Step 2.1: Secure repository credentials by creating Instance Secret¶
Create an Instance Secret for your preferred hosted repository (Bitbucket, AWS CodeCommit, or GitHub). If the repository is public, this step can be skipped.Lens service requires the Personal Access Token (PAT) to access private Github repositories. After creating PAT, the user must store it in DataOS as a secret so the Lens service can authenticate the token during repository synchronization and read the model file from the repository.
name: bitbucket-r
version: v1
type: instance-secret
description: bitbucket credentials
layer: user
instance-secret:
type: key-value
acl: r # read level access
data:
GITSYNC_USERNAME: ${{"iamgroot"}} # replace the placeholder with the bitbucket (or preferred code repository) username
GITSYNC_PASSWORD: ${{"0123Abcedefghij="}} #replace the placeholder with the personal access token
In the model folder, the semantic model will be defined, encompassing SQL mappings, logical tables, logical views, and user groups. Each subfolder contains specific files related to the Lens model.
model/
├── sqls/ # Contains SQL files that load or transform data from Databricks
│ └── customer.sql # SQL query for extracting and preparing customer data
│
├── tables/ # YAML definitions describing logical tables, dimensions, measures, and joins
│ └── customer.yaml # Defines the customer table schema, joins, dimensions, and measures
│
├── views/ # YAML views combining data from multiple tables
│ └── customer_churn.yaml # Logical view combining customer and campaign data for churn insights
│
└── user_groups.yaml # Defines access control and user groups for the Lens model
Step 2.2: Load data from the data source¶
In the sqls folder, create .sql files for each logical table, where each file is responsible for loading or selecting the relevant data from the source.
Info
Ensure that only the necessary columns are extracted and the SQL dialect is specific to the databricks. For instance,
-
Format table names as:
database.table. -
Use
STRINGfor text data types instead ofVARCHAR.
For instance, a simple data load might look as follows:
Alternatively, you can write more advanced queries that include transformations, such as:
SELECT
CAST(customer_id AS VARCHAR) AS customer_id,
first_name,
CAST(DATE_PARSE(birth_date, '%d-%m-%Y') AS TIMESTAMP) AS birth_date,
age,
CAST(register_date AS TIMESTAMP) AS register_date,
occupation,
annual_income,
city,
state,
country,
zip_code
FROM
main.customer;
Step 2.3: Define the table in the model¶
Create a tables folder to store logical table definitions, with each table defined in a separate YAML file outlining its dimensions, measures, and segments. For instance, to define a table for customer data:
table:
- name: customer
sql: {{ load_sql('customer') }}
description: Table containing information about sales transactions.
Step 2.4: Add dimensions and measures¶
After defining the base table, add the necessary dimensions and measures. For instance, to create a table for sales data with measures and dimensions, the YAML definition could look as follows:
tables:
- name: customer
sql: {{ load_sql('customer') }}
description: Table containing customer records with order details.
dimensions:
- name: customer_id
type: number
description: Unique identifier for each order.
sql: order_id
primary_key: true
public: true
measures:
- name: total_customer_count
type: count
sql: id
description: Total number of orders.
Step 2.5: Add segments to filter¶
Segments are filters that allow for the application of specific conditions to refine the data analysis. By defining segments, you can focus on particular subsets of data, ensuring that only the relevant records are included in analysis. For example, to filter for records where the state is either Illinois or Ohio, you can define a segment as follows:
To know more about segments click here.
Step 2.6: Create views¶
Create a views folder to store all logical views, with each view defined in a separate YAML file (e.g., sample_view.yml). Each view references dimensions, measures, and segments from multiple logical tables. For instance, the following customer_churn view is created:
views:
- name: customer_churn_prediction
description: Contains customer churn information.
tables:
- join_path: marketing_campaign
includes:
- engagement_score
- customer_id
- join_path: customer
includes:
- country
- customer_segments
To know more about the views click here.
Step 2.7: Create User groups¶
This YAML manifest file is used to manage access levels for the semantic model. It defines user groups that organize users based on their access privileges. In this file, you can create multiple groups and assign different users to each group, allowing you to control access to the model.By default, there is a 'default' user group in the YAML file that includes all users.
user_groups:
- name: default
description: default user group for all users.
includes: "*"
To know more about the User groups click here.
Info
Once you have completely created model, push the model files to a version control repository before proceeding with deployment.
Step 3: Deployment manifest file¶
After setting up the Lens model folder, the next step is to configure the deployment manifest. Below is the YAML template for configuring a Lens deployment.
# RESOURCE META SECTION
version: v1alpha # Lens manifest version (mandatory)
name: "databricks-lens" # Lens Resource name (mandatory)
layer: user # DataOS Layer (optional)
type: lens # Type of Resource (mandatory)
tags: # Tags (optional)
- lens
description: databricks depot lens deployment on lens2 # Lens Resource description (optional)
# LENS-SPECIFIC SECTION
lens:
compute: runnable-default # Compute Resource that Lens should utilize (mandatory)
secrets: # Referred Instance-secret configuration (**mandatory for private code repository, not required for public repository)
- name: bitbucket-cred # Referred Instance Secret name (mandatory)
allKeys: true # All keys within the secret are required or not (optional)
source: # Data Source configuration
type: depot # Source type is depot here
name: databricks # Name of the databricks depot
#The name under source: should match the actual depot name (databricks here)
repo: # Lens model code repository configuration (mandatory)
url: https://bitbucket.org/tmdc/sample # URL of repository containing the Lens model (mandatory)
lensBaseDir: sample/lens/source/depot/databricks/model # Relative path of the Lens 'model' directory in the repository (mandatory)
syncFlags: # Additional flags used during synchronization, such as specific branch.
- --ref=main # Repository Branch
Each section of the YAML template defines key aspects of the Lens deployment. Below is a detailed explanation of its components:
-
Defining the Source:
-
Source type: The
typeattribute in thesourcesection must be explicitly set todepot. -
Source name: The
nameattribute in thesourcesection should specify the name of the Databricks Depot created.
-
-
Setting Up Compute and Secrets:
-
Define the compute settings, such as which engine (e.g.,
runnable-default) will process the data. -
Include any necessary secrets (e.g., credentials for Bitbucket or AWS CodeCommit) for secure access to data and repositories.
-
-
Defining Repository:
-
urlTheurlattribute in the repo section specifies the Git repository where the Lens model files are stored. For instance, if repo name is lensTutorial then the repourlwill be https://bitbucket.org/tmdc/lensTutorial -
lensBaseDir: ThelensBaseDirattribute refers to the directory in the repository containing the Lens model. Example:sample/lens/source/depot/databricks/model. -
secretId: ThesecretIdattribute is used to access private repositories (e.g., Bitbucket, GitHub). It specifies the secret needed to securely authenticate and access the repository. -
syncFlags: Specifies additional flags to control repository synchronization. Example:--ref=devspecifies that the Lens model resides in thedevbranch.
-
-
Configuring API, Worker and Metric Settings (Optional): Set up replicas, logging levels, and resource allocations for APIs, workers, routers, and other components.
Step 4: Apply the Lens manifest file¶
After configuring the deployment file with the necessary settings and specifications, apply the manifest using the following command:
Step 5: Verify Lens creation¶
To ensure that your Lens Resource has been successfully created, you can verify it in two ways:
Check the name of the newly created Lens Resource in the list of Lens resources created by you:
dataos-ctl get -t lens
# Expected Output
INFO[0000] 🔍 get...
INFO[0000] 🔍 get...complete
NAME | VERSION | TYPE | WORKSPACE | STATUS | RUNTIME | OWNER
----------------|---------|--------|-----------|--------|---------|----------------
sales-analysis | v1beta | lens | | active | | iamgroot
Alternatively, retrieve the list of all Lens resources created in your organization:
dataos-ctl get -t lens -a
# Expected Output
INFO[0000] 🔍 get...
INFO[0000] 🔍 get...complete
NAME | VERSION | TYPE | WORKSPACE | STATUS | RUNTIME | OWNER
----------------|---------|--------|-----------|--------|---------|----------------
sales-analysis | v1beta | lens | | active | | iamgroot
lens101 | v1beta | lens | | active | | thor
Once the Lens Resource is applied and all configurations are correctly set up, the Lens model will be deployed. Upon deployment, a Lens Service is created in the backend, which may take some time to initialize.
To verify whether the Lens Service is running, execute the following command. The Service name follows the pattern: <lens-name>-api. Ensure Service is active and running state.
dataos-ctl get -t service -n sales-analysis-lens-api -w public
# Expected output:
INFO[0000] 🔍 get...
INFO[0002] 🔍 get...complete
NAME | VERSION | TYPE | WORKSPACE | STATUS | RUNTIME | OWNER
--------------------------|---------|---------|-----------|--------|-----------|--------------
sales-analysis-lens-api | v1 | service | public | active | running:1 | iamgroot
Info
You can also view detailed information about any created Lens Resource through the Operations App in the DataOS GUI. Note that you must have the Operator role assigned to access this information.
Step 6: Delete Lens¶
Info
As best practice, it is recommended to regularly delete Resources that are no longer in use. This practice offers several benefits, including saving time and reducing costs.
If you need to delete a Lens which is no longer in use, type the following command in the DataOS CLI:
By executing the above command, the specified Lens will be deleted from your DataOS environment.