Member since
10-25-2015
13
Posts
0
Kudos Received
3
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
2442 | 05-26-2017 06:28 AM | |
1375 | 05-26-2017 06:26 AM | |
1265 | 01-12-2017 03:04 PM |
06-24-2017
07:34 PM
Fyi, Cloudera has documented this IE 11 browser known issue with workaround Scott mentions in the release notes for Cloudera Navigator 2.10.1 (CM/CDH 5.11.1): https://www.cloudera.com/documentation/enterprise/release-notes/topics/cn_rn_known_issues.html#ie_11_issue
... View more
05-26-2017
06:28 AM
The trick is to create a BDR specific user and add them to the hive or supergroup groups as relevant for hive or general hdfs backups. No facl or sticky bits are required.
... View more
05-26-2017
06:26 AM
@ScottE wrote: https://www.cloudera.com/documentation/enterprise/5-9-x/topics/impala_ssl.html shows a bunch of "TLS/SSL ... Client" properties that no longer appear in CM for CDH 5.9.0. Is there an update to the documentation available that covers this? I have Impala running behind a proxy and I am also wondering about how this fits in. While I am here, HiveServer2 documentation indicates Kerberos and LDAP client authentication can co-exist but CM doesn't allow for this. For the above three items: The "TLS/SSL ... Client" properties are now just prefixed simply "Impala TLS/SSL Server" - this should be a documentation change. If Impala is behind a proxy you need to configure HAProxy with a TLS certificate and have it connect to the Impala Server instances also using TLS. The HAProxy documentation will help, but some additional documentaiton from Cloudera would be nice. HiveServer2 does not support simultaineous kerberos and LDAP authentication (the way Impala does). To achieve this for Hive you need to run a second HiveServer2 instance, configuring one with kerbeos authentication and the other with LDAP.
... View more
01-12-2017
03:04 PM
Thanks to the joy that is AWS Flow Logs I was able to see what was going on. It would appear that the arrow on https://www.cloudera.com/documentation/enterprise/latest/topics/cm_ig_ports_cm.html for port 9000 is the wrong way around; CM calls into CMA on 9000/TCP not the other way around. Cloudera: You might like to confirm this and update the documentation accordingly.
... View more