Databricks - Supporting Lineage via Unity Catalog
Learn how to configure the necessary permissions and connection settings in Databricks for Cloudera Octopai integration using Unity Catalog.
This guide outlines the process of configuring the necessary permissions and connection settings in Databricks for Cloudera Octopai integration. Please follow the steps below to create a dedicated service principal, grant permissions to the required system tables, and retrieve the connection details.
- Ensure you have a Databricks cluster type that supports Unity Catalog.
- Confirm that you have Admin permissions in Databricks to view and manage system tables and access control.
-
Configure Permissions in Databricks
-
Create a Dedicated Service Principal
- In the Databricks workspace, navigate to Settings (top-right corner).
- Go to Identity and Access > Service Principals
- Click Manage, then select Add Service Principal.
- Choose Databricks Managed and assign a
descriptive name (e.g., octopai).
- Open the created service principal →
Configurations tab → Select
Databricks SQL Access and
Workspace Access.
-
Create a Dedicated Service Principal
-
Grant Permissions to Lineage System Table
-
Option 1: M2M Authentication (Service Principal)
- In Databricks, navigate to the Secrets tab.
- Click Generate Secret to create a new token
for the service principal.
- Set the maximum lifespan for the token (note that this token must be regenerated periodically, as indicated in the UI).
- After generation, securely save the following details:
- Secret Token
- Client ID
-
Option 2: User Authentication Token
- In Databricks, navigate to Settings > Developer > Access Tokens (Manage)
- Click Generate New Token.
- Set the maximum lifespan for the token (note that this token must be
regenerated periodically, as indicated in the UI).
- In Databricks, navigate to Settings > Developer > Access Tokens (Manage)
-
-
Grant Permissions to Lineage System Tables
- Open the Catalog in Databricks.
- Search for the following tables:
- Catalog: system
- Schema: access
- Tables:
column_lineagetable_lineage
- For each table:
- Open the Permissions tab.
- Click Grant.
- Select the service principal created earlier.
- Enable Select Permission.

-
Retrieve Connection Details
-
Create or Locate an SQL Warehouse
- Go to the SQL Warehouses tab.
- If none exist, click Create SQL Warehouse and configure it as needed.
- Assign the service principal Manager
permissions on the warehouse (Can Use).
- Open the SQL Warehouse and navigate to Connection Details.
- Copy the HTTP Path - this will be used
for integration.
-
Create or Locate an SQL Warehouse
-
Download the ODBC Driver
- Download and install the Simba ODBC Driver for Databricks from the official link: https://www.databricks.com/spark/odbc-drivers-download
- Select the appropriate version for your operating system (Windows, macOS, or Linux).
-
Final step - Setting up Databricks Metadata Source
Cloudera Octopai supports two authentication methods for connecting to Databricks:
- User Authentication using a Personal Access Token
- Machine-to-Machine (M2M) authentication using a Service Principal
-
Option 1: User Authentication (Personal Access Token)
- Connection Name
Assign a clear and meaningful name for the connection. This name will appear to users within the Cloudera Octopai platform.
- Databricks Server URL
Enter the customer's Databricks workspace URL.
Example:
https://abc-1234.5.azuredatabricks.net - HTTP Path
Paste the HTTP Path copied from the Databricks SQL Warehouse → Connection Details section.
Example:
/sql/1.0/warehouses/abc123xyz - Token
Enter the Personal Access Token generated under Settings > Developer > Access Tokens (Manage) in Databricks.
- Connection Name
-
Option 2: M2M Authentication (Service Principal)
- Connection Name
Assign a clear and meaningful name for the connection. This name will appear to users within the Cloudera Octopai platform.
- Databricks Server URL
Enter the customer's Databricks workspace URL.
Example:
https://abc-1234.5.azuredatabricks.net - HTTP Path
Paste the HTTP Path copied from the Databricks SQL Warehouse → Connection Details section.
Example:
/sql/1.0/warehouses/abc123xyz - Client ID
Enter the Client ID of the service principal created in Databricks.
- Client Secret
Enter the Secret Token generated for the service principal.
- Connection Name
You have successfully configured Databricks Unity Catalog for Cloudera Octopai lineage extraction. You should now have:
- A service principal or user authentication token
- Permissions granted to system lineage tables
- SQL Warehouse HTTP Path for connection
- ODBC driver installed
