Member since
04-22-2014
1218
Posts
341
Kudos Received
157
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
22537 | 03-03-2020 08:12 AM | |
13033 | 02-28-2020 10:43 AM | |
3757 | 12-16-2019 12:59 PM | |
3342 | 11-12-2019 03:28 PM | |
5128 | 11-01-2019 09:01 AM |
07-23-2019
10:37 AM
@Roroka, I am very glad to hear that you got it working. The reason I asked about Cloudera Express 6.x is that it does not have support for Auto-TLS. It is certainly possible to set up TLS manually (our docs cover that). If you have any questions, this community is a good place to ask. Cheers.
... View more
07-23-2019
10:34 AM
1 Kudo
@dennisli, Awesome work tracking that down! The "Gateway" role is merely an indicator that Cloudera Manager should distribute client configuration files to that host for that service. A hive gateway will ensure that /etc/hive/conf is populated with the necessary configuration to run hive clients on that host. Since there is no running gateway, the status will be None and that is expected. The parcel files shouldn't need to be modified and are expected to be static. Cloudera Manager does use those files to generate configuration files for servers and clients based on defaults and on your configuration in CM. I know you ran into some trouble, but I think all the work you did to troubleshoot goes a long way to an understanding the concepts of CM, services, roles, and client configuration :-).
... View more
07-23-2019
09:44 AM
@HadoopHelp, I think all directories are listed as 0 size. Do you mean you are looking to delete "empty" directories?
... View more
07-23-2019
09:36 AM
@wsmolak, This thread covers a different issue that is quite old. Let's continue the conversation in the other thread you opened if that is ok: https://community.cloudera.com/t5/Cloudera-Manager-Installation/Problem-with-path-to-parcels/m-p/93062#M17196?eid=1&aid=1 Please explain what problem you are facing if there is one.
... View more
07-23-2019
09:33 AM
@vincenth, I'm not sure what you mean by "Authority Certificate." I think you mean Certificate Authority. https://en.wikipedia.org/wiki/Certificate_authority If so, then no, there is no restriction on this being public. You can create and manage your own authority. The advantage of using a public CA is that it is likely already trusted by clients (like browsers or openssl). However, if you have control over your clients, there is no reason why the clients could not import whatever root CA public certificate of the CA you create. If you are OK with running creating and using your own CA, you can save a good deal of money since public CAs do need to charge for their services. If you have the $ and don't want to manage a CA, a public CA will work fine. I wouldn't recommend self-signed certificates for production as management can become cumbersome. Truststores, rather than havining your root CA may require every certificate of every host in your cluster. If you add a host, then, you would need to update all trust stores. If you have clients connecting to a different hostname (public) to CM and Hue, then you can add the hostnames you want to Subject Alternative Name in the certificate. see: https://en.wikipedia.org/wiki/Subject_Alternative_Name If you are interested in learning about using OpenSSL to maintain your own CA, this person seems to explain it pretty well (though I haven't gone over it completely): https://jamielinux.com/docs/openssl-certificate-authority/index.html I can't speak for the overall design, but the above should help a bit with the TLS side of things.
... View more
07-22-2019
08:49 PM
1 Kudo
@dennisli, No, that password stuff is all server side. There are no passwords to supply from the hive client side. Can you explain what you have done so far with CDH and what you are trying to do? Are you following some instructions? Are you new to Cloudera Manager and CDH? There are some fundamental concepts about how configuration is done with a managed cluster, so feel free to ask questions. If you installed Cloudera Manager and then used it install CDH with parcels, then if you run "hive" command from any host that has a Hive role on it. For instance, if you have HiveServer2 or the Metastore or a Gateway role installed on hosta.example.com, you can ssh to hosta.example.com and simply run: hive This will connect according to the client configuration that is in /etc. Cloudera Manager manages the passwords in your hive-site.xml, so you should not have to do anything with them. The "*******" is redacted so you can't see the password. Try going to a host with a Hive role on it and run: hive once you get a prompt, you can run: hive> show databases;
... View more
07-22-2019
08:04 PM
1 Kudo
@dennisli, I'm not sure what you are trying to accomplish. Can you describe what you are trying to do at the command line? If you are trying to run SQL queries via hive from the commandline, you can use the "beeline" command line tool. From CM, start Hive Service (which starts both the Metastore and the HiveServer2 roles). You can then use beeline to query via HiveServer2. "hive" commandline as a client tool is deprecated. CM managing Hive: https://www.cloudera.com/documentation/enterprise/latest/topics/cm_mc_hive_service.html If Cloudera Manager is managing your cluster, hive and beeline clients should be available and ready to use on your manage hosts. If you are on a host that has no other roles, you can add a Hive Gateway role to the host to ensure that the Hive client configuration files are distributed by Cloudera Manager.
... View more
07-22-2019
03:29 PM
@BrettM, That's great to hear. I'll inform the Cloudera Manager engineering team.
... View more
07-22-2019
03:00 PM
@TCloud, Yeah, the deployment assumes that each HAProxy would be on its own host. See the diagram here: https://www.cloudera.com/documentation/enterprise/latest/topics/admin_cm_ha_hosts.html#concept_qkr_bfd_pr and general steps: https://www.cloudera.com/documentation/enterprise/latest/topics/admin_cm_ha_hosts.html#concept_uxy_5zw_pr
... View more
07-22-2019
02:54 PM
@mmmunafo, I guess your workaround should be OK. The only other two option I could see would be to wrap the pam.authenticate() call with an unset and set of KRB5CCNAME. Assuming authentication takes milliseconds, it would be unlikely that Hue is attempting to retrieve cache information at that moment, but I don't know that it is any better than what you are up to. for instance, in desktop/core/src/desktop/auth/backend.py wrap: if pam.authenticate(username, password, desktop.conf.AUTH.PAM_SERVICE.get()): With del os.environ['KRB5CCNAME'] and then after auth: os.environ['KRB5CCNAME'] = desktop.conf.KERBEROS.CCACHE_PATH.get() NOTE: we would need to import os in backend.py to do that. So possibly, something like this would work: class PamBackend(DesktopBackendBase):
"""
Authentication backend that uses PAM to authenticate logins. The first user to
login will become the superuser.
"""
@metrics.pam_authentication_time
def authenticate(self, request=None, username=None, password=None):
username = force_username_case(username)
del os.environ['KRB5CCNAME']
if pam.authenticate(username, password, desktop.conf.AUTH.PAM_SERVICE.get()):
os.environ['KRB5CCNAME'] = desktop.conf.KERBEROS.CCACHE_PATH.get()
is_super = False
if User.objects.count() == 0:
is_super = True
try:
if desktop.conf.AUTH.IGNORE_USERNAME_CASE.get():
user = User.objects.get(username__iexact=username)
else:
user = User.objects.get(username=username)
except User.DoesNotExist:
user = find_or_create_user(username, None)
if user is not None and user.is_active:
profile = get_profile(user)
profile.creation_method = UserProfile.CreationMethod.EXTERNAL.name
profile.save()
user.is_superuser = is_super
ensure_has_a_group(user)
user.save()
user = rewrite_user(user)
return user
os.environ['KRB5CCNAME'] = desktop.conf.KERBEROS.CCACHE_PATH.get()
return None
@classmethod
def manages_passwords_externally(cls):
return True Might not be worth it, though
... View more