<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Cloudbreak 1.16 - Adding security breaks Ambari in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185120#M68107</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What do you mean by "when I enable security the cluster no longer works"? Would you mind attaching the cloudbreak log's relevant part where there are some exceptions. Also I can see that you are using a custom security group, is 9443 enabled in the group?&lt;/P&gt;</description>
    <pubDate>Fri, 15 Sep 2017 19:44:15 GMT</pubDate>
    <dc:creator>Krisz</dc:creator>
    <dc:date>2017-09-15T19:44:15Z</dc:date>
    <item>
      <title>Cloudbreak 1.16 - Adding security breaks Ambari</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185119#M68106</link>
      <description>&lt;P&gt;Using Cloudbreak I install a cluster and check that it works.  I then reinstall the same cluster and enable security &amp;amp; Knox the cluster no longer installs correctly.  Any help would be appreciated, I'm sure I have forgotten a step.  I tried doing this through the UI and from a script.  (Blueprint attached if that helps... but as my comment says below I was also able to replicate this with one of the default blueprints: "Data Science: Apache Spark 2.1, Apache Zeppelin 0.7.0")&lt;/P&gt;&lt;P&gt;Here's how I built the cluster:&lt;/P&gt;&lt;PRE&gt;credential select --name cloudbreakcredential
blueprint select --name "HA, zepplin and Ooziev2.7"
instancegroup configure --AZURE --instanceGroup master1 --nodecount 1 --templateName default-infrastructure-template-d4 --securityGroupName internal-ports-and-ssh --ambariServer false 
instancegroup configure --AZURE --instanceGroup master2 --nodecount 1 --templateName default-infrastructure-template-d4 --securityGroupName internal-ports-and-ssh --ambariServer false 
instancegroup configure --AZURE --instanceGroup master3 --nodecount 1 --templateName default-infrastructure-template-d4 --securityGroupName internal-ports-and-ssh --ambariServer false 
instancegroup configure --AZURE --instanceGroup master4 --nodecount 1 --templateName default-infrastructure-template-d4 --securityGroupName internal-ports-and-ssh --ambariServer false
instancegroup configure --AZURE --instanceGroup Utility1 --nodecount 1 --templateName default-infrastructure-template --securityGroupName internal-ports-and-ssh --ambariServer true 
instancegroup configure --AZURE --instanceGroup worker --nodecount 5 --templateName default-infrastructure-template --securityGroupName internal-ports-and-ssh --ambariServer false 
#hostgroup configure --recipeNames ranger-pre-installation --hostgroup master4 --timeout 15
network select --name default-azure-network
stack create --AZURE --name hadoop-pilot-oozie-rg  --region "Canada East" --wait true --attachedStorageType PER_VM 
cluster create --description "Haoop Pilot" --password [password] --wait true --enableKnoxGateway --enableSecurity true --kerberosAdmin admin --kerberosMasterKey [masterkey] --kerberosPassword [password]&lt;/PRE&gt;</description>
      <pubDate>Fri, 15 Sep 2017 19:37:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185119#M68106</guid>
      <dc:creator>matt_andruff</dc:creator>
      <dc:date>2017-09-15T19:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudbreak 1.16 - Adding security breaks Ambari</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185120#M68107</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What do you mean by "when I enable security the cluster no longer works"? Would you mind attaching the cloudbreak log's relevant part where there are some exceptions. Also I can see that you are using a custom security group, is 9443 enabled in the group?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 19:44:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185120#M68107</guid>
      <dc:creator>Krisz</dc:creator>
      <dc:date>2017-09-15T19:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudbreak 1.16 - Adding security breaks Ambari</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185121#M68108</link>
      <description>&lt;P&gt;I mean that if I don't install with security the cluster starts up without issues.  Yes, my security group does have 9443 enabled.&lt;/P&gt;&lt;P&gt;HiveServer2 fails to install:&lt;/P&gt;&lt;PRE&gt;stderr: 
Traceback (most recent call last):
  File "/var/lib/ambari-agent/cache/common-services/HIVE/0.12.0.2.0/package/scripts/hive_server.py", line 227, in &amp;lt;module&amp;gt;
    HiveServer().execute()
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/script/script.py", line 314, in execute
    method(env)
  File "/var/lib/ambari-agent/cache/common-services/HIVE/0.12.0.2.0/package/scripts/hive_server.py", line 81, in start
    self.configure(env) # FOR SECURITY
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/script/script.py", line 117, in locking_configure
    original_configure(obj, *args, **kw)
  File "/var/lib/ambari-agent/cache/common-services/HIVE/0.12.0.2.0/package/scripts/hive_server.py", line 52, in configure
    hive(name='hiveserver2')
  File "/usr/lib/python2.6/site-packages/ambari_commons/os_family_impl.py", line 89, in thunk
    return fn(*args, **kwargs)
  File "/var/lib/ambari-agent/cache/common-services/HIVE/0.12.0.2.0/package/scripts/hive.py", line 141, in hive
    copy_to_hdfs("mapreduce", params.user_group, params.hdfs_user, skip=params.sysprep_skip_copy_tarballs_hdfs)
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/functions/copy_tarball.py", line 267, in copy_to_hdfs
    replace_existing_files=replace_existing_files,
  File "/usr/lib/python2.6/site-packages/resource_management/core/base.py", line 155, in __init__
    self.env.run()
  File "/usr/lib/python2.6/site-packages/resource_management/core/environment.py", line 160, in run
    self.run_action(resource, action)
  File "/usr/lib/python2.6/site-packages/resource_management/core/environment.py", line 124, in run_action
    provider_action()
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/providers/hdfs_resource.py", line 555, in action_create_on_execute
    self.action_delayed("create")
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/providers/hdfs_resource.py", line 552, in action_delayed
    self.get_hdfs_resource_executor().action_delayed(action_name, self)
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/providers/hdfs_resource.py", line 287, in action_delayed
    self._create_resource()
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/providers/hdfs_resource.py", line 303, in _create_resource
    self._create_file(self.main_resource.resource.target, source=self.main_resource.resource.source, mode=self.mode)
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/providers/hdfs_resource.py", line 418, in _create_file
    self.util.run_command(target, 'CREATE', method='PUT', overwrite=True, assertable_result=False, file_to_put=source, **kwargs)
  File "/usr/lib/python2.6/site-packages/resource_management/libraries/providers/hdfs_resource.py", line 199, in run_command
    raise Fail(err_msg)
resource_management.core.exceptions.Fail: Execution of 'curl -sS -L -w '%{http_code}' -X PUT --data-binary @/usr/hdp/2.5.5.0-157/hadoop/mapreduce.tar.gz -H 'Content-Type: application/octet-stream' --negotiate -u : 'http://had-m1.bt52pnivtndublvux4s5oursrh.ux.internal.cloudapp.net:50070/webhdfs/v1/hdp/apps/2.5.5.0-157/mapreduce/mapreduce.tar.gz?op=CREATE&amp;amp;user.name=hdfs&amp;amp;overwrite=True&amp;amp;permission=444'' returned status_code=403. 
{
  "RemoteException": {
    "exception": "IOException", 
    "javaClassName": "java.io.IOException", 
    "message": "Failed to find datanode, suggest to check cluster health."
  }
[this is repeated multiple times as it retries]
...
&lt;/PRE&gt;</description>
      <pubDate>Fri, 15 Sep 2017 19:55:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185121#M68108</guid>
      <dc:creator>matt_andruff</dc:creator>
      <dc:date>2017-09-15T19:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudbreak 1.16 - Adding security breaks Ambari</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185122#M68109</link>
      <description>&lt;P&gt;I have reproduced this with &lt;/P&gt;&lt;A href="https://cloudbreak-controller-hxccak5ohj3aw.canadaeast.cloudapp.azure.com/"&gt;Data Science: Apache Spark 2.1, Apache Zeppelin 0.7.0&lt;/A&gt; blueprint</description>
      <pubDate>Sat, 16 Sep 2017 02:10:22 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185122#M68109</guid>
      <dc:creator>matt_andruff</dc:creator>
      <dc:date>2017-09-16T02:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudbreak 1.16 - Adding security breaks Ambari</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185123#M68110</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/12415/mattandruff.html" nodeid="12415"&gt;@Matt Andruff&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;Cloudbreak does not populate kerberos related settings into the gateway-site.xml config file of Knox: &lt;A href="https://github.com/apache/knox/blob/master/gateway-release/home/conf/gateway-site.xml#L40"&gt;https://github.com/apache/knox/blob/master/gateway-release/home/conf/gateway-site.xml#L40&lt;/A&gt; E.g gateway.hadoop.kerberos.secured is not set and krb5.conf is not set. &lt;/P&gt;&lt;P&gt;Until this is fixed in Cloudbreak I recommend not to select the "Enable Knox Gateway" on Cloudbreak, but as a workaround you can add KNOX_SERVER into the blueprint and let Ambari configure Knox.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;BR /&gt;Attila&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 19:31:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudbreak-1-16-Adding-security-breaks-Ambari/m-p/185123#M68110</guid>
      <dc:creator>akanto</dc:creator>
      <dc:date>2017-09-20T19:31:07Z</dc:date>
    </item>
  </channel>
</rss>

