Skip to main content
  1. Blog
  2. Article

Guest
on 3 March 2016


Tom Barber at Meteorite explains how beneficial Juju Charms has been when migrating customer services from old, tricky servers.

I promised a demo of Juju GUI in my earlier blog and we’ve worked hard on a Pentaho Data Integration charm, so I figured we’d combine the two.

For those of you who don’t know, Juju is an Application Modelling platform developed by Canonical. Pentaho Data Integration is the best Open Source ETL toolkit on the planet. So why not combine the best of both worlds?

At Meteorite we have been migrating customer services from old, tricky to maintain servers to Juju managed clusters and its been an eye opening experience, in a good way! The latest product in our armoury to get the treatment is PDI. Our brief for this is threefold:

Firstly we need an easy way to deploy PDI on a bunch of different servers, in different clouds and maintain it, along with that it needs to provide on demand and scheduled ETL execution.

We also need a way to spin up and configure remote Carte servers for remote execution of ETL jobs and transformations, we would also like self configuring clusters as an added bonus.

Big Data deployment to work with the Big Data charms Juju already provides.

The charm is still under development, don’t expect everything to work yet, some of the functionality hasn’t even got any code written yet, but the charm is available here

Of our brief 1 and 2 are 90% complete, 3 will be done in the not too distant future.

But of course it wouldn’t be cricket if we didn’t give you a quick video demo of how easy it is so spin up a PDI cluster so here we are…

Apologies for the lack of contrast on the terminal, I need to remember to resolve that before the next video, but luckily we’re mostly interested in the GUI and webpages so hopefully it doesn’t impact things too much!

Original post

About the author

Tom Barber is the founder and technical director of Meteorite.bi, a consulting company specialising in the Saiku Analytics platform. His weekly duties include BI consulting, Scala & Java programming and tinkering with System Administration frameworks. In his spare time Tom is a regular blogger and open source committer. You can read more about Tom on the Meteorite.bi blog.

Related posts


Massimiliano Gori
31 March 2026

How to manage Ubuntu fleets using on-premises Active Directory and ADSys

Cloud and server Article

The “hybrid fleet” is today’s reality: organizations diversify operating systems while Microsoft Active Directory (AD) remains the dominant identity “source of truth.” IT administrators must ensure Linux machines, like Ubuntu desktops and servers, behave as first-class citizens in this environment. Efficient Linux management demands unifi ...


Massimiliano Gori
30 March 2026

How to Harden Ubuntu SSH: From static keys to cloud identity

Cloud and server Article

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, ...


Massimiliano Gori
27 March 2026

Modern Linux identity management: from local auth to the cloud with Ubuntu

Cloud and server Article

The modern enterprise operates in a hybrid world where on-premises infrastructure coexists with cloud services, and security threats evolve daily. IT administrators are tasked with a difficult balancing act: maintaining traditional local workflows while managing the inevitable shift toward cloud-native architectures. Identity has emerged ...