Member since
06-26-2015
515
Posts
140
Kudos Received
114
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 2586 | 09-20-2022 03:33 PM | |
| 6987 | 09-19-2022 04:47 PM | |
| 3691 | 09-11-2022 05:01 PM | |
| 4304 | 09-06-2022 02:23 PM | |
| 6816 | 09-06-2022 04:30 AM |
03-17-2022
06:36 AM
@Ankit88 , For a Java application you need to add the following Kafka property to your producer/consumer configuration: sasl.jaas.config=com.sun.security.auth.module.Krb5LoginModule required useKeyTab=true keyTab="./myuser.keytab" principal="myuser@XYZ.SITE"; Where myuser.keytab is your user's Kerberos keytab. Cheers, André
... View more
03-15-2022
11:48 PM
Hi, @abvincita , Please ignore my last post. I did a quick test using dynamic properties arguments and confirmed that it works well, regardless of the content of the attributes. Please give this a try: André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more
03-15-2022
11:21 PM
@abvincita , Yes, if ERROR_DETAIL has double-quotes in it, it will have adverse effects. Does it have single-quotes too? If not, you can try using: '${ERROR_DETAIL}'~'${ERROR_CODE}' Cheers, André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more
03-15-2022
02:58 PM
1 Kudo
@JohnnyC , No worries. For the very latest update of the latest product you do need subscription. But there's a trial available for a reasonably new version of CDP 7.1.7: https://www.cloudera.com/downloads/cdp-private-cloud-trial.html Regards, André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more
03-15-2022
02:14 PM
1 Kudo
@JohnnyC , I see. These instructions actually refer to JAR files taken from the actual CDP deployment, not the one we distribute separately. These JARs can be found under the /opt/cloudera/parcels/CDH/jars directory, in any of the CDP nodes. [centos@cdp ~]$ ls -l /opt/cloudera/parcels/CDH/jars/hive-{exec,jdbc,metastore,service}-[0-9]*[0-9].jar
-rw-r--r--. 1 cloudera-scm cloudera-scm 45594524 Aug 3 2021 /opt/cloudera/parcels/CDH/jars/hive-exec-3.1.3000.7.1.7.0-551.jar
-rw-r--r--. 1 cloudera-scm cloudera-scm 129949 Aug 3 2021 /opt/cloudera/parcels/CDH/jars/hive-jdbc-3.1.3000.7.1.7.0-551.jar
-rw-r--r--. 1 cloudera-scm cloudera-scm 41223 Aug 3 2021 /opt/cloudera/parcels/CDH/jars/hive-metastore-3.1.3000.7.1.7.0-551.jar
-rw-r--r--. 1 cloudera-scm cloudera-scm 771018 Aug 3 2021 /opt/cloudera/parcels/CDH/jars/hive-service-3.1.3000.7.1.7.0-551.jar Cheers, André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more
03-15-2022
02:09 PM
Hi, @Ankit88 , thanks for the info! The error that you're getting is because the host in the cloud where your application is running doesn't know anything about your Kerberos configuration, in particular, where your KDC is. There's a few things you must do to configure it properly: Ensure the Kerberos client libraries are installed on that host (krb5-workstation package) Your on-prem krb5.conf file must be copied to the cloud host. If you also have a Kerberos KDC in the cloud, there will already be a krb5.conf file on that host and the two configurations will need to be carefully merged. The sections [realms] and [domain_realm] are especially important to solve your issue. Ensure that the hostname of your KDC as well as the host names of ALL Kafka brokers can be resolved from the cloud (you can test it with nslookup and/or ping). This must work correctly for Kerberos to work. If there's no integrated DNS you will have to add entries to your /etc/hosts file to ensure the resolution is correct. Ensure that any firewalls are configured correctly to open ports between your application and your on-prem environment: Open all the ports required for the client to connect to Kafka Open all the ports required for the client to communicate with the KDC (typically, ports 88 UDP and 88 TCP) The above being correctly configuration, you should be able to authenticate correctly using Kerberos. A simple test to ensure it's working, before you try the Kafka application, is to authenticate on the command line using the kinit command. Hope this helps. André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more
03-15-2022
01:51 PM
1 Kudo
@JohnnyC , Where are you reading these instructions from? André
... View more
03-15-2022
05:41 AM
Hi, @Ankit88 , Is your cloud Kafka running on CDP Public Cloud or is it your own deployment on AWS? What about the Kafka on-prem? Is it a Kafka on CDP or some other type of deployment? What the version of the on-prem Kafka? André
... View more
03-15-2022
04:51 AM
Hi, @abvincita , Try using the following Command Arguments in your processor configuration: "${ERROR_DETAIL}"~"${ERROR_CODE}" Cheers, André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more
03-15-2022
04:27 AM
@krishna123 , Check your environment path and Java Home settings. NiFi will pick the first Java binary that it finds in your path. André -- Was your question answered? Please take some time to click on "Accept as Solution" below this post. If you find a reply useful, say thanks by clicking on the thumbs up button.
... View more