Install the ClickHouse® client

This page explains how to install the ClickHouse® client to interact with your cluster. You can use the method that best suits your needs.

You can install the ClickHouse® client together with ClickHouse® on Linux, FreeBSD, or macOS with the following command:

curl | sh

This command downloads the official binary for your operating system.


When you connect to a cluster using the ClickHouse® client installed this way, you need to replace clickhouse-client in the native interface connection string with ./clickhouse client.

./clickhouse client --host<rest_of_the_connection_string>
  1. Open your terminal.

  2. (Optional) Start Docker if needed:

    sudo service docker start
  3. Pull the clickhouse-client container image from Docker Hub:

    docker pull clickhouse/clickhouse-client
  1. Open your terminal.

  2. Connect to the ClickHouse® official DEB repository from your Linux system:

    sudo apt update && sudo apt install -y apt-transport-https ca-certificates dirmngr && \
    sudo apt-key adv --keyserver hkp:// --recv 8919F6BD2B48D754 && \
    echo "deb stable main" | sudo tee \
  3. Refresh the package list and install the clickhouse-client :

    sudo apt update && sudo apt install -y clickhouse-client
  1. Open your terminal.

  2. Connect to a ClickHouse® official RPM repository from your Linux system:

    sudo yum install -y yum-utils
    sudo yum-config-manager --add-repo
  3. Install the clickhouse-client :

    sudo yum install -y clickhouse-client


If you run a RedHat 7-based Linux distribution, including Cent OS 7, Oracle Linux 7 and others, you need to download and install trusted certificates and manually add the path to them in the clickhouse-client configuration file as follows:

  1. Install the root certificate:

    curl > \ 
  2. Install the intermediate certificate:

    curl > \
  3. Update the list of trusted certificates:

    sudo update-ca-trust
  4. Locate your clickhouse-client configuration file (by default, you can find it at /etc/clickhouse-client/config.xml) and add the path to the certificates into the <openSSL> section:

    <client> <!-- Used for connection to server's secure tcp port -->
        <!-- Use for self-signed: <verificationMode>none</verificationMode> -->
        <!-- Use for self-signed: <name>AcceptCertificateHandler</name> -->