Member since
07-09-2019
422
Posts
97
Kudos Received
58
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
428 | 07-06-2025 05:24 AM | |
444 | 05-28-2025 10:35 AM | |
2159 | 08-26-2024 08:17 AM | |
2760 | 08-20-2024 08:17 PM | |
1135 | 07-08-2024 04:45 AM |
05-09-2024
12:11 AM
Hello @Hadoop16 Can you try adding public group to the ranger knox policy and then run webhdfs curl command
... View more
05-06-2024
08:12 PM
1 Kudo
Hello @Scharan , I installed the NTP, but still the same error. Any suggestions on what went wrong?
... View more
04-24-2024
12:34 AM
1 Kudo
@Scharan THANKS , Its working now.
... View more
04-13-2024
10:13 AM
1 Kudo
Register on https://education.cloudera.com/ and you can enroll on several courses, for instance, ADMIN-332: Building Secure Clusters or ADMIN-138 Introducing AWS for CDP Public Cloud
... View more
04-05-2024
12:25 AM
1 Kudo
Hello @ipson To edit the entity in Atlas, you need to export the entity, which will be downloaded in zip format, extract the files, edit the required files, zip the file in its original order, and then import the updated files to Atlas in compressed format (zip). You can make use of export and import atlas api's to perform the above steps
... View more
04-03-2024
01:09 AM
@rizalt I had a same bug when used ODP stack to deploy Ambari. After debug, I found code in ambari-agent bug when runtime to try start Hive Server2. Problem: This below codes output {out} parameter to handle hdfs path, but this code returned not valid hdfs URI 163 metatool_cmd = format("hive --config {conf_dir} --service metatool")
164 cmd = as_user(format("{metatool_cmd} -listFSRoot", env={'PATH': execution_path}), params.hive_user) \
165 + format(" 2>/dev/null | grep hdfs:// | cut -f1,2,3 -d '/' | grep -v '{fs_root}' | head -1")
166 code, out = shell.call(cmd) 2024-04-03 07:40:48,317 - call['ambari-sudo.sh su hive -l -s /bin/bash -c 'hive --config /usr/odp/current/hive-server2/conf/ --service metatool -listFSRoot' 2>/dev/null | grep hdfs:// | cut -f1,2,3 -d '/' | grep -v 'hdfs://vm-ambari.internal.cloudapp.net:8020' | head -1'] {}
2024-04-03 07:40:58,721 - call returned (0, '07:40:53.268 [main] DEBUG org.apache.hadoop.fs.FileSystem - hdfs:// = class org.apache.hadoop.hdfs.DistributedFileSystem from ') To fix: Step 1: edit row 170 in file "/var/lib/ambari-agent/cache/stacks/ODP/1.0/services/HIVE/package/scripts/hive_service.py" as below: I hard code old_path to valid URI, this help by pass updateLocation config # cmd = format("{metatool_cmd} -updateLocation {fs_root} {out}")
cmd = format("{metatool_cmd} -updateLocation {fs_root} hdfs://oldpath") You can see as below image: Step 2: Restart ambari agent sudo ambari-agent restart Step 3: Try to restart Hive server2 in Ambari Service started successful.
... View more
03-29-2024
10:29 PM
1 Kudo
@Scharan Thanks! I figured out the issue, following properties were not configured in hive-site hive.server2.authentication.spnego.keytab hive.server2.authentication.spnego.principal
... View more
03-15-2024
06:00 AM
@S_chinna To create user follow below steps on knox host # useradd <Username> (to create a user) # passwd <Username> (to set the password) - Set read permission on /etc/shadow file for knox user and try to login with the above created credentials
... View more
02-28-2024
05:12 AM
Hi @valerio29 To access the application logs add the following property in Spark Client Advanced Configuration Snippet (Safety Valve) for spark-conf/spark-defaults.conf spark.acls.enable=true spark.ui.view.acls=<specify users that can have access to the application> spark.ui.view.acls.groups=<specify groups that can have access to the application> Deploy Client configurations under Spark => Actions
... View more
02-12-2024
05:53 AM
Hi @Loaimohamed79 When Kerberos is enabled by default, Spnego authentication will be enabled for a few web UIs in CDP. To access the web UI, either you need to configure Spnego authentication or disable Spnego authentication by unchecking "Enable Kerberos Authentication for HTTP Web-Consoles" in service configurations. Refer to the below document to configure Spnego authentication settings in the browser. https://docs.cloudera.com/cdp-private-cloud-base/7.1.8/security-how-to-guides/topics/cm-security-browser-access-kerberos-protected-url.html
... View more