Member since
07-31-2013
1924
Posts
462
Kudos Received
311
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 1969 | 07-09-2019 12:53 AM | |
| 11882 | 06-23-2019 08:37 PM | |
| 9148 | 06-18-2019 11:28 PM | |
| 10136 | 05-23-2019 08:46 PM | |
| 4581 | 05-20-2019 01:14 AM |
10-01-2015
04:11 AM
Please see http://community.cloudera.com/t5/Cloudera-Manager-Installation/Moving-CM-Services-to-a-new-node/m-p/32476
... View more
10-01-2015
04:00 AM
To add a new disk into a DN/NM config is as easy as configuring their data.dirs/local-dirs keys to the path the disk is mounted as. To change log dirs, you can use CM configuration fields to set newer locations, or alternatively move the log dirs and create symlinks to the new paths from the original. Does this help?
... View more
10-01-2015
03:57 AM
3 Kudos
The preferred way to test a cross-realm auth (in CDH context) is to try and obtain a cluster realm's service ticket when logged in as the remote realm. kinit user@REMOTEREALM kvno hdfs/namenode-host@LOCALREALM If the service ticket obtaining fails, then Cross Realm Trust is broken. A lot of people also oversee/misconfigure [domain_realm]. It exists to mean an automatic mapping of hostnames to their realms, and it factors greatly into the use of cross-realm trust when dealing with service authentication. An ideal [domain_realm], if you have two cluster realms A (host1.a.com, host2.a.com) and B (mybhost.data.com, mychost.data.com) would look like: [domain_realm] host1.a.com=A host2.a.com=A mybhost.data.com=B mychost.data.com=B Or if you use the limited wildcard ability, if applicable range-wise: [domain_realm] .a.com=A .data.com=B This section helps Kerberos libraries and clients to find the right KDC to talk to when looking for a server under a specific realm (its the intelligence mapping that helps determine which service host lies in what realm). Another thing to remember is that the communication isn't done in fallback manner. The trust works based on the key being the same on both ends (For the krbtgt principals). That is, an encrypted token generated on one end may be trusted on another end if it can decrypt it (and since you use the same key on both sides, this is possible). The path of communication therefore is purely dependent on reaching the correct KDC for the provided principal - something [domain_realm] would help with. Does this help?
... View more
10-01-2015
03:45 AM
What error do you get if you try a simple 'curl -v http://myhostname:7180/cmf/parcel/download/CDH-5.4.0-1.cdh5.4.0.p0.27-el6.parcel'? Is this a single host installation? Do you have a firewall running that may prevent local transfers (over the external network interface)? You could try disabling the firewall temporarily.
... View more
10-01-2015
03:19 AM
1 Kudo
Unless your NameNode is down, the only other reason, minus firewalls/etc. misconfigs, is that the NameNode port (and maybe other services' ports) are listening on a different network interfaces than the internal IP one. You could verify this with netstat on the refusing service's host.
... View more
09-30-2015
08:00 AM
1 Kudo
Sorry, I assumed you use Cloudera Manager here. It appears you do have proper local configs in place (from what I understand by 'slave configuration'). Could you try running the command in DEBUG mode to see what its hung on? export HBASE_ROOT_LOGGER=DEBUG,console export HADOOP_ROOT_LOGGER=DEBUG,console sudo -E -u hbase hbase hbck Are you also certain there's no firewall involved between your cluster hosts, that may otherwise be preventing communication?
... View more
09-29-2015
01:29 AM
1 Kudo
You will need a HBase Gateway role defined on any host you want to run HBase commands on. Without the local configs, the commands may not function correctly.
... View more
09-27-2015
07:54 AM
2 Kudos
A few points: 1. Remote/non-short-circuit-local block reads are done via the DN IPC port (50010 or 1004), and not via local filesystem, so HDFS clients of any form will never require local permission access to the block files. The DN reads and streams the data. Same applies for writes. 2. Local short circuit reads, if enabled and applicable, are done in a secure manner via use of Unix Socket Domains. The DN opens the file and passes the file descriptor to the client, bypassing the need for clients to be able to read block file paths directly.
... View more
09-27-2015
07:51 AM
1 Kudo
Given a fully used situation with preemption disabled, B will begin running as soon as A's containers complete (as opposed to waiting the A application to end entirely before it runs).
... View more
09-27-2015
07:41 AM
Have you already followed points (2) and (3) under http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_mc_isilon_service.html#concept_d2m_fwp_rp_unique_1?
... View more