Docker Compose
AWS Athena
Prerequisites
- AWS Account
- AWS Athena Workspace
- AWS S3 bucket
- PostgreSQL
- Service account credentials with access to all above
- Mapbox Token
Steps
- Copy docker-compose.yaml file
- Create
.envfile
DEKART_POSTGRES_PASSWORD=
DEKART_PROJECT_ID=
DEKART_CLOUD_STORAGE_BUCKET=
DEKART_MAPBOX_TOKEN=
DEKART_ATHENA_CATALOG=
DEKART_ATHENA_S3_OUTPUT_LOCATION=
AWS_REGION=
AWS_ACCESS_KEY_ID=
AWS_SECRET_ACCESS_KEY=
DEKART_CORS_ORIGIN=
- Run
docker-compose --env-file .env up dekart-athena
BigQuery
Prerequisites
- Google Cloud Project
- BigQuery API Enabled
- Cloud Storage Bucket
- Service account credentials with access to all above
- Mapbox Token
Steps
- Copy docker-compose.yaml file
- Create
.envfile
DEKART_POSTGRES_PASSWORD=
DEKART_PROJECT_ID=
DEKART_CLOUD_STORAGE_BUCKET=
DEKART_MAPBOX_TOKEN=
GOOGLE_APPLICATION_CREDENTIALS=
DEKART_CORS_ORIGIN=
- Run
docker-compose --env-file .env up dekart-bigquery
Snowflake
Prerequisites
- Snowflake Account and User
- Amazon S3 Bucket
- Mapbox Token
Steps
- Copy docker-compose.yaml file
- Create
.envfile
DEKART_POSTGRES_PASSWORD=
DEKART_PROJECT_ID=
DEKART_CLOUD_STORAGE_BUCKET=
DEKART_MAPBOX_TOKEN=
DEKART_SNOWFLAKE_ACCOUNT_ID=
DEKART_SNOWFLAKE_USER=
DEKART_SNOWFLAKE_PASSWORD=
DEKART_CORS_ORIGIN=
AWS_REGION=
AWS_ACCESS_KEY_ID=
AWS_SECRET_ACCESS_KEY=
- Run
docker-compose --env-file .env up dekart-snowflake
Premium v0.21: OIDC reverse proxy (Keycloak)
Use this mode when authentication is handled by reverse proxy (for example oauth2-proxy + Keycloak), and Dekart validates JWT from X-Forwarded-Access-Token.
Steps
- Configure OIDC env vars in your runtime:
DEKART_REQUIRE_OIDC=1
DEKART_OIDC_JWKS_URL=
DEKART_OIDC_ISSUER=
DEKART_OIDC_AUDIENCE=
- Start services with OIDC profile (from Dekart repo):
docker compose --env-file .env.oidc --profile oidc up db adminer keycloak oauth2-proxy
- See full setup details: