Skip to content

jporeilly/Workshop--Pentaho-Data-Catalog

Repository files navigation

### Workshop: Pentaho Data Catalog 10.1

This workshop introduces the Pentaho Data Catalog and its capabilities to manage both structured and unstructured data efficiently. Through a combination of automated processes and machine learning, the course will guide you through the essential functions of data ingestion, profiling, and curation. You will learn how to connect to various data sources, understand the importance of a business glossary, enforce metadata rules, and gain insights into the components of the Pentaho+ Data Catalog.
By the end of the workshop, participants will have a comprehensive understanding of:

- Key Concepts & Terminology: Familiarize yourself with the foundational terminology and concepts used within the Pentaho Data Catalog environment.
- Connecting to Various Data Sources: Learn how to establish connections to a wide range of data sources to enable data ingestion.
- Ingesting & Profiling Data: Discover the methods used for data ingestion and how profiling assists in understanding your data's structure and quality.
- Business Glossary & Terms: Understand the significance of maintaining a business glossary and how it aids in aligning data with business terminology.
- Rules: Explore how metadata rules are applied to data within the Pentaho Data Catalog to ensure consistency and relevance.
- Pentaho Data Catalog Components: Get an insight into the various components that make up the Pentaho Data Catalog and how they interact to provide a comprehensive data management solution.

#### Notes on PDC/PDO

Resolved using SKytap DNS \
Domain: pentaho.example (10.0.0.254) 

#### Install a PEM-format certificate

* Ensure you add the HCP Certificate to the PDC server
* HCP Certificate located: Tenant -> Replication

Assuming your PEM-formatted root CA certificate is in local-ca.crt, run the following commands to install it:

sudo apt-get install -y ca-certificates \
sudo cp local-ca.crt /usr/local/share/ca-certificates \
sudo update-ca-certificates

sudo keytool -import -trustcacerts -keystore /usr/lib/jvm/java-17-openjdk-amd64/lib/security/cacerts -alias hcp1-pentaho -file hcp1-pentaho.crt \
Warning: use -cacerts option to access cacerts keystore \
Enter keystore password:   \
Certificate already exists in keystore under alias <mycert> \
Do you still want to add it? [no]:  yes \
Certificate was added to keystore 


The CA trust store location
The CA trust store (as generated by update-ca-certificates) is available at the following locations:

As a single file (PEM bundle) in /etc/ssl/certs/ca-certificates.crt \
As an OpenSSL-compatible certificate directory in /etc/ssl/certs 


#### Notes on Windows Server 2022

Username: Administrator \
Password: Welcome123! \
DNS Domain: pentaho.plus \
HCP Forwarding: *.hcp1.pentaho.plus 

#### Notes on HCP 9.4.4

System Account \
Username: admin \
Password: Pentaho123! \
Endpoint: http://PentahoTNT.hcp1.pentaho.plus 

Tenant Accounts \
PentahoTNT - administration account \
Username: PentahoTNT \
Password: Pentaho123! 

s3user - data account \
Username: s3user \
Password123! \
Namespace: Bucket1 

Username (base64): czN1c2Vy \
Password (md5): 42ebed8106e9a0bc70c1d4f245c42769

About

PDC 10.0.2 Workshop

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published