Member since
10-04-2016
69
Posts
6
Kudos Received
5
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
5376 | 03-23-2017 08:41 AM | |
2732 | 01-26-2017 07:22 PM | |
1993 | 12-23-2016 12:07 PM | |
7020 | 12-21-2016 01:54 PM | |
1679 | 12-05-2016 06:37 AM |
01-04-2017
07:49 AM
Thanks for your quick response. I did the quick test after putting the client side setting, but it still doesn't work. I still saw MR job failed due to No Route to Host from slave 1 to slave 2 on port not defined within the set range.
... View more
01-04-2017
07:34 AM
Could you check if this JIRA is fixed by Cloudera? https://issues.apache.org/jira/browse/MAPREDUCE-6338
... View more
01-04-2017
07:19 AM
Thanks for replying. I think that I use the correct setting since this should be on the server side. MapReduce Client Advanced Configuration Snippet (Safety Valve) for mapred-site.xml Gateway Default Group For advanced use only, a string to be inserted into the client configuration for mapred-site.xml. YARN Service MapReduce Advanced Configuration Snippet (Safety Valve) YARN (MR2 Included) (Service-Wide) For advanced use only, a string to be inserted into mapred-site.xml. Applies to configurations of all roles in this service except client configuration. I double-checked the materialized configuration file on the disk and it contains the range setting. /run/cloudera-scm-agent/process/1353-yarn-RESOURCEMANAGER/mapred-site.xml (with latest time stamp).
... View more
01-03-2017
02:33 PM
I made the following in YARN/MR setting, but it doesn't work. YARN Service MapReduce Advanced Configuration Snippet (Safety Valve) <property> <name>yarn.app.mapreduce.am.job.client.port-range</name> <value>44000-50000</value> <description>Restrict the range for firewall.</description> </property> For advanced use only, a string to be inserted into mapred-site.xml. Applies to configurations of all roles in this service except client configuration.
... View more
01-03-2017
08:54 AM
Did the change work for you?
... View more
12-23-2016
12:15 PM
Reference: https://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s3_cm_principal.html Is there any way to change KDC account manager credentials after enabling Kerberos? I can’t find anywhere in CM to change the properties. If these are not in CM web UI, is it kept in JKS somewhere?
... View more
Labels:
- Labels:
-
Kerberos
12-23-2016
12:07 PM
Found this useful link: https://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s3_cm_principal.html If you are using Active Directory: Create an Organizational Unit (OU) in your AD setup where all the principals used by your CDH cluster will reside. Add a new user account to Active Directory, for example, <username>@YOUR-REALM.COM. The password for this user should be set to never expire. Use AD's Delegate Control wizard to allow this new user to Create, Delete and Manage User Accounts.
... View more
12-23-2016
12:04 PM
Here is the description for the LB: Address of the load balancer used if Oozie HA is enabled. Should be specified in host:port format. Could we improve it to "FQHN:port" and ask technical writer to update it? Kerberos only treats FQHN well.
... View more
12-21-2016
01:54 PM
Double-checked the KRB tickets, the principal for proxy is not using FQHN. I went back to check the LB configuration and sure it was using short name for the proxy host. Once I switched back, LB web UI comes back fine. Thanks.
... View more
12-21-2016
01:19 PM
Web UI "Load Balancer" gives me HTTP Status 403 - GSSException: Failure unspecified at GSS-API level - Checksum failed. However, both individual OOzie Web UIs return fine.
... View more