Member since
12-20-2018
30
Posts
3
Kudos Received
0
Solutions
06-21-2021
06:56 AM
thanks a lot for your quick reply, it is an old cluster that used the Ambari to provision the services using the public repos.
... View more
06-21-2021
05:00 AM
Hello Experts, I have an Hortonworks Data Flow cluster managed by Ambari and include the following services: 1- Zookeeper. 2- NIFI. 3- Kafka. 4- Storm. naturlish, that the zookeeper is the spinal cord of the rest of the puzzle pieces, when I tried to start it I got the following error when I started the zookeeper node, and of course, my cluster won't be up until I solve this I guess because of changing the Horton works binaries public links. RuntimeError: Failed to execute command '/usr/bin/yum -y install zookeeper_3_4_1_1_4-server', exited with code '1', message: 'http://public-repo-1.hortonworks.com/HDF/centos7/3.x/updates/3.4.1.1/repodata/repomd.xml: [Errno 14] HTTP Error 403 - Forbidden Trying other mirror. can anyone help me with this Appreciated in advance.
... View more
06-16-2021
01:45 AM
Dear experts,
I built an application that runs on HDF-3.4.1.1, to be accurate, a jar file runs in Storm supervisor(s), so I need to get the Ambari 2.7.3.0 with the supported HDF stack and packs binaries, apparently, all the binaries that were for Hortonworks changed with the new links that can't be accessed publicly this is my problem.
may you kindly help me in this to provide an alternative so I can get the binaries?
Appreciated in advance
@HDF @GangWar @MattWho @smdas @Shelton
... View more
Labels:
12-04-2019
12:07 AM
it might be too late but I'll give a shoot in "userDnTemplate where sAMAccountName is referred (sAMAccountName={0},ou=Accounts,...)" if you on AD check if your users DN start with "CN" not sAMAccount, as sAMAccount is just the login name.
... View more
01-31-2019
08:51 AM
thanks, @Geoffrey Shelton Okot for your prompt response, the point is that I'm looking for documentation illustrates the minimum pre-requisite for Power servers Spec, not a reference Specs
... View more
01-29-2019
02:56 PM
I need the minimum H/W to build HDP cluster on Power servers Power8 so I know the "planning-cluster" document " https://docs.hortonworks.com/HDPDocuments/HDP3/HDP-3.1.0/cluster-planning/cluster-planning.pdf " but my question : Is there any document provide the HDP Cluster sizing on Power architecture specifically?? there is a huge difference between x64 and the Power processor.
... View more
Labels:
- Labels:
-
Hortonworks Data Platform (HDP)
01-29-2019
02:35 PM
thanks @Prabhu M , @Akhil S Naik for your input. Appreciated ,
... View more
12-09-2018
02:43 PM
- I need to build HDP cluster on x64 node and I ran into a situation that I might be able to get Power Little Endian node so is it possible to make it join the domain ??
... View more
Labels:
- Labels:
-
Apache Ambari
-
Apache Hadoop
05-15-2018
12:35 PM
yes @Nikhil Silsarma I believe I can see nothing than EOFExecption. and below is a sample of a repeated pattern 2018-05-15 13:21:09,414 INFO DataNode.clienttrace (BlockReceiver.java:finalizeBlock(1490)) - src: /192.168.1.65:45618, dest: /192.168.1.66:50010
, bytes: 295, op: HDFS_WRITE, cliID: DFSClient_NONMAPREDUCE_1052889643_113, offset: 0, srvID: a27109bc-7ef8-472d-8a16-cd4eaf9baf68, blockid: BP-1
252659232-192.168.1.64-1523785142923:blk_1081336515_7597054, duration: 41856095
2018-05-15 13:21:09,414 INFO datanode.DataNode (BlockReceiver.java:run(1463)) - PacketResponder: BP-1252659232-192.168.1.64-1523785142923:blk_10
81336515_7597054, type=LAST_IN_PIPELINE terminating
2018-05-15 13:21:09,424 INFO datanode.DataNode (BPServiceActor.java:blockReport(395)) - Unsuccessfully sent block report 0x2477e5b94b6fd918, co
ntaining 1 storage report(s), of which we sent 0. The reports had 6169093 total blocks and used 0 RPC(s). This took 330 msec to generate and 646
msecs for RPC and NN processing. Got back no commands.
2018-05-15 13:21:09,424 WARN datanode.DataNode (BPServiceActor.java:offerService(681)) - IOException in offerService
java.io.EOFException: End of File Exception between local host is: "fp-dev-03.fpconsultancy.com/192.168.1.66"; destination host is: "fp-dev-01.fp
consultancy.com":8020; : java.io.EOFException; For more details see: http://wiki.apache.org/hadoop/EOFException
at sun.reflect.GeneratedConstructorAccessor11.newInstance(Unknown Source)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
at java.lang.reflect.Constructor.newInstance(Constructor.java:423)
at org.apache.hadoop.net.NetUtils.wrapWithMessage(NetUtils.java:801)
at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:765)
at org.apache.hadoop.ipc.Client.getRpcResponse(Client.java:1558)
at org.apache.hadoop.ipc.Client.call(Client.java:1498)
at org.apache.hadoop.ipc.Client.call(Client.java:1398)
at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:233)
at com.sun.proxy.$Proxy15.blockReport(Unknown Source)
at org.apache.hadoop.hdfs.protocolPB.DatanodeProtocolClientSideTranslatorPB.blockReport(DatanodeProtocolClientSideTranslatorPB.java:216)
at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.blockReport(BPServiceActor.java:377)
at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.offerService(BPServiceActor.java:653)
at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.run(BPServiceActor.java:793)
at java.lang.Thread.run(Thread.java:745)
Caused by: java.io.EOFException
at java.io.DataInputStream.readInt(DataInputStream.java:392)
at org.apache.hadoop.ipc.Client$Connection.receiveRpcResponse(Client.java:1119)
at org.apache.hadoop.ipc.Client$Connection.run(Client.java:1014)
2018-05-15 13:21:09,455 INFO DataNode.clienttrace (BlockReceiver.java:finalizeBlock(1490)) - src: /192.168.1.65:45620, dest: /192.168.1.66:50010
, bytes: 2957, op: HDFS_WRITE, cliID: DFSClient_NONMAPREDUCE_-403725899_122, offset: 0, srvID: a27109bc-7ef8-472d-8a16-cd4eaf9baf68, blockid: BP-
1252659232-192.168.1.64-1523785142923:blk_1081336518_7597057, duration: 82257567
... View more
05-14-2018
02:27 PM
Hi Experts, I have the following symptoms and I can't pin the root cause out. 1- Datanode is always flapping between live and dead status. 2- NameNode is -I believe that consequent from 1st point- always flapping between being in safemode status and out of it. 3- inconsistency in the ambari readings such that one of the gauges illustrates that x number of datanode (is/are) dead although when I check the status of the datanode service on the node is up and running. 4- the namenode sometimes fitch no corrupted blocks and sometimes may fitch but I believe not the correct number.because when I use hadoop -fsck / I got tremendous lines like as follows : /IngestedData/Twitter/1059754915585828.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528828
/IngestedData/Twitter/1059758585906613.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515660
/IngestedData/Twitter/1059774195895653.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515666
/IngestedData/Twitter/1059779491501811.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102428
/IngestedData/Twitter/1059781413941185.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515667
/IngestedData/Twitter/1059784483341630.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528829
/IngestedData/Twitter/1059805700858061.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102444
/IngestedData/Twitter/1059808752032375.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528831
/IngestedData/Twitter/1059820909082031.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515672
/IngestedData/Twitter/1059839159043687.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515671
/IngestedData/Twitter/1059850922921177.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528834
/IngestedData/Twitter/1059879302310190.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528833
/IngestedData/Twitter/1059890677914985.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515674
/IngestedData/Twitter/1059892998401161.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102500
/IngestedData/Twitter/1059896117885101.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515677
/IngestedData/Twitter/1059897143123345.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515679
/IngestedData/Twitter/1059898881036386.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528836
/IngestedData/Twitter/10598b7b-f59b-4555-8abd-bd1dab564016: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075454299
/IngestedData/Twitter/1059908594543601.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515680
/IngestedData/Twitter/1059927449709253.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102554
/IngestedData/Twitter/1059933212287937.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528835
/IngestedData/Twitter/1059960457592976.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528832
/IngestedData/Twitter/1059966377443792.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515686
/IngestedData/Twitter/1059995695617270.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528838
/IngestedData/Twitter/1059996598183700.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515688
/IngestedData/Twitter/1059997598475029.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515692
/IngestedData/Twitter/1059a55f-6524-4e50-9fe7-aaf51f65228d: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074407507
/IngestedData/Twitter/1059b560-4f1a-447f-ae9e-678d8ec1f703: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074964486
/IngestedData/Twitter/1059c72e-9e3f-4443-98d5-1e6adf8c52e4: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075160859
/IngestedData/Twitter/1059ddcf-1f2a-4a3a-aebd-890f1e7913a7: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078522616
/IngestedData/Twitter/1059e3e1-9625-4d65-b23a-5492331c0071: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1077122861
/IngestedData/Twitter/105a157b-8ccc-476e-b22a-2e57dbb5f65b: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1077085406
/IngestedData/Twitter/105a366a-091b-413a-a4a0-e557d42a13ad: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076102477
/IngestedData/Twitter/105a5d2e-1bd6-479c-9180-566db0969704: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076820612
/IngestedData/Twitter/105a64e8-ba92-4e27-9964-7eef208e1691: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076368081
/IngestedData/Twitter/105a68bc-ac38-4173-a359-9c2561276595: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075099264
/IngestedData/Twitter/105a6a48-d537-4f6c-988d-973b1008dafe: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076152856
/IngestedData/Twitter/105a74ec-3c4b-4cd9-afc0-9c41083add0a: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076926793
/IngestedData/Twitter/105abecf-8a82-4487-8551-e5997abbd875: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074256803
/IngestedData/Twitter/105ac257-6d77-41b4-8f92-abfb3343965b: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075162810
/IngestedData/Twitter/105ad037-126c-4291-acc1-3cd8b279563f: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074333885
/IngestedData/Twitter/105ae089-39dc-495f-9dfa-f25cbf08724b: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074150937
/IngestedData/Twitter/105b15cb-809c-42c0-81a7-243089531313: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074462469
/IngestedData/Twitter/105b1ef6-5cbe-4f64-a474-0511ffe0c91a: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076979847
/IngestedData/Twitter/105b77c4-b7df-4cf0-9af6-3759e1c8c6df: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075160268
/IngestedData/Twitter/105bcdbb-aef2-4de7-bffe-3c20bddb0b2b: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075193566
/IngestedData/Twitter/105be7b6-0378-4875-9f7c-1b2bd5283a0a: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075994394
/IngestedData/Twitter/105be8c6-d987-4fde-8d52-eefdbcaec6b0: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075880255
/IngestedData/Twitter/105bee56-f8b5-43d6-b6a3-f43978bbb41b: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074479933
/IngestedData/Twitter/105bf24d-e2c5-4ef7-b07a-7183cbdae465: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1077247200
/IngestedData/Twitter/105bf47e-861a-4cb7-9004-5dc8aa50636c: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076781808
/IngestedData/Twitter/105c4037-1dd1-4ad1-a050-146004640da0: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1073992314
/IngestedData/Twitter/105c5fbd-dc88-4eac-ac2c-c05f8f887720: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075906961
/IngestedData/Twitter/105c60d4-b72e-4b42-b4c3-db95d99c4acb: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076062497
/IngestedData/Twitter/105c9cdc-86d0-43b9-b2e9-6a0f410033cc: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076099595
/IngestedData/Twitter/105cbe7a-8ff5-4d3d-a843-130e594c9dde: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076785563
/IngestedData/Twitter/105cc235-eabb-4af0-87a3-0dca6e9652e8: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076780810
/IngestedData/Twitter/105cc45b-0024-4c61-91a1-d393a6c5fdeb: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075745100
/IngestedData/Twitter/105cca1c-be9d-4102-9c5f-86b3d285284f: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074283876
/IngestedData/Twitter/105cd1e3-20d2-4b2f-9736-a695589c92f4: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075694890
/IngestedData/Twitter/105cfe17-88f0-44df-8ccb-1d0b582efb97: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075797197
/IngestedData/Twitter/105d25f6-a256-4df9-9039-34e800361017: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076429149
/IngestedData/Twitter/105d4922-a659-41c8-b43a-f74c9414b08a: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074114968
/IngestedData/Twitter/105d4be3-3520-4092-aae4-cbeddc7fe7ce: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074912637
/IngestedData/Twitter/105d8fda-80c7-4183-923d-4648ac2088b4: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075035916
/IngestedData/Twitter/105d9125-b581-4563-9791-25e0ca0dcc73: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074241287
/IngestedData/Twitter/105dbcfd-e282-45de-a2f5-6bf30e547573: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074275127
/IngestedData/Twitter/105dcd87-516c-4b27-b40c-be96d27e6b25: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076830058
/IngestedData/Twitter/105ddb32-449a-404b-8a5b-f21f0c2367a9: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075460187
/IngestedData/Twitter/105de3fd-4cc3-46a9-9b01-6a7f24f923da: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074560807
/IngestedData/Twitter/105e18b3-3ce9-416a-80c6-f7f6eb08eb63: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074186202
/IngestedData/Twitter/105e8915-0dc9-47a4-8974-765e58ce8110: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074956035
/IngestedData/Twitter/105eb1a4-c9f1-479c-a16c-2d40311d6628: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075525558
/IngestedData/Twitter/105ed063-0638-403a-b289-8a9256bae645: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075118223
/IngestedData/Twitter/105f12a6-0a74-44ff-b980-8fd3b533af94: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074916454
/IngestedData/Twitter/105f415a-7826-41fc-94be-82698f57fba2: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074565217
/IngestedData/Twitter/105f419c-badc-4e80-a6bb-7e4b2ef3b5e6: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1076582046
/IngestedData/Twitter/105f531d-4ef0-476d-8bb5-cbcb48b6d12e: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074551783
/IngestedData/Twitter/105f58fb-098f-47b9-ae21-c50fcc513c8e: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075741758
/IngestedData/Twitter/105f6909-0aac-4168-bf18-660c00cbe3a1: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074485613
/IngestedData/Twitter/105f8884-1d4f-4bb1-a396-dd12050b089e: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1075875256
/IngestedData/Twitter/105feef4-bee7-4664-9c65-ee71409a5366: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1077194235
/IngestedData/Twitter/1060008631294209.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515691
/IngestedData/Twitter/1060016964676972.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515695
/IngestedData/Twitter/1060018157584619.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102588
/IngestedData/Twitter/1060026634560925.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528840
/IngestedData/Twitter/1060044229368338.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515698
/IngestedData/Twitter/1060052334177564.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515699
/IngestedData/Twitter/1060057482442954.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528837
/IngestedData/Twitter/1060065781777604.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515704
/IngestedData/Twitter/1060076302831162.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102634
/IngestedData/Twitter/1060077900904663.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515700
/IngestedData/Twitter/1060079574221834.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528841
/IngestedData/Twitter/1060098043879957.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515708
/IngestedData/Twitter/1060107186767007.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102611
/IngestedData/Twitter/1060111225066699.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528843
/IngestedData/Twitter/1060117531851953.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515714
/IngestedData/Twitter/1060118553509265.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515709
/IngestedData/Twitter/1060125933153193.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515713
/IngestedData/Twitter/1060136947663525.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515710
/IngestedData/Twitter/1060140694299629.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102644
/IngestedData/Twitter/1060140950581234.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515716
/IngestedData/Twitter/1060146058284806.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528842
/IngestedData/Twitter/1060147016572668.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515717
/IngestedData/Twitter/1060157326209609.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515718
/IngestedData/Twitter/1060165924032053.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528839
/IngestedData/Twitter/1060169454822207.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515719
/IngestedData/Twitter/1060180540358023.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515721
/IngestedData/Twitter/1060186551784435.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515723
/IngestedData/Twitter/1060188552544100.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515720
/IngestedData/Twitter/106018e6-0595-4bc2-a233-f293bc81d43a: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1074526580
/IngestedData/Twitter/1060201573749970.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515726
/IngestedData/Twitter/1060202628871437.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515725
/IngestedData/Twitter/1060206989880022.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1080528844
/IngestedData/Twitter/1060214708009548.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1078515731
/IngestedData/Twitter/1060231377022537.json: CORRUPT blockpool BP-1252659232-192.168.1.64-1523785142923 block blk_1079102692
anyone have any clue what should I do
... View more
Labels:
- Labels:
-
Apache Hadoop
-
Cloudera DataFlow (CDF)
05-07-2018
03:00 PM
thanks @Matt Clarke for your quick response kindly find my comments : 1- 2-Was the queued data actually on the node from which you provide thread dump? yes 3-How many nodes in your cluster? I have a cluster with one node 4-
... View more
05-07-2018
01:37 PM
looping @Mohamed Emad
... View more
05-07-2018
01:35 PM
@Matt Clarke thanks Dear a lot, I can see from the dumped data " attached below " that alot of tasks are waiting but I can't understant upon what ? how should I manipulate "java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject@5bb7c15d" dump-data.zip
... View more
05-07-2018
11:32 AM
Hello, @Rahul Soni thanks for your reply but regarding your questions : 1-It is not about a specific processor I have multiple of processors like "gettwitter", "putHDFS", "getfile" and others the problem persisted on all of them. 2-IT is a cluster from one node.
... View more
05-06-2018
02:49 PM
@Shu sorry for that I thought that it is a common issue as I'm newby in HDF, Appreciated your respond. Screenshot: Done, processors scheduling information: Done, JVM memory: logs: Attached nifi-app-user-bootstrap.zip
... View more
05-06-2018
09:03 AM
Dears, I'm using HFD 3.1.0 , I ran into a situation in which the processors are running and there are no processed flowfiles between processors
... View more
Labels:
- Labels:
-
Apache NiFi
-
Cloudera DataFlow (CDF)
03-31-2018
10:00 AM
1 Kudo
@Timothy Spann
great tip thanks a lot, but I believe I run into another issue after opening the UI I believe that the processors process nothing ?!!!!! they are not working
... View more
03-28-2018
08:33 AM
thanks a lot for your response but I believe this is not my case : [root@hdf ~]# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/mapper/centos_hdf-root 462G 213G 249G 47% /
devtmpfs 1.8G 0 1.8G 0% /dev
tmpfs 1.9G 84K 1.9G 1% /dev/shm
tmpfs 1.9G 9.0M 1.9G 1% /run
tmpfs 1.9G 0 1.9G 0% /sys/fs/cgroup
/dev/sda2 497M 158M 339M 32% /boot
tmpfs 372M 16K 372M 1% /run/user/42
tmpfs 372M 0 372M 0% /run/user/0
... View more
03-28-2018
07:32 AM
all of sudden , the NIFI goes down and I can't access it , when I checked the status I found the following : nifi-app.zip[root@hdf ~]# /usr/NIFI/nifi-1.2.0.3.0.0.0-453/bin/nifi.sh status
nifi.sh: JAVA_HOME not set; results may vary
Java home:
NiFi home: /usr/NIFI/nifi-1.2.0.3.0.0.0-453
Bootstrap Config File: /usr/NIFI/nifi-1.2.0.3.0.0.0-453/conf/bootstrap.conf
2018-03-28 09:27:47,447 INFO [main] org.apache.nifi.bootstrap.Command Apache NiFi is running at PID 21028 but is not responding to ping requests
nifi-bootstrap.zip the logs attached as well. I tried to restart the NIFI and restart the machine itself which hosting the application, with no success. given that it's a standalone application. another symptom: [root@hdf ~]# netstat -anopl | grep 8080
tcp 0 0 0.0.0.0:8080 0.0.0.0:* LISTEN 21028/java off (0.00/0/0)
tcp 0 0 192.168.1.68:8080 192.168.0.28:55426 CLOSE_WAIT 21028/java off (0.00/0/0)
tcp 0 0 192.168.1.68:8080 192.168.0.28:55476 ESTABLISHED 21028/java off (0.00/0/0)
tcp 1 0 192.168.1.68:8080 192.168.0.28:55419 CLOSE_WAIT 21028/java off (0.00/0/0)
tcp 0 0 192.168.1.68:8080 192.168.0.28:55427 FIN_WAIT2 21028/java off (0.00/0/0)
tcp 1 0 192.168.1.68:8080 192.168.0.28:55388 CLOSE_WAIT 21028/java off (0.00/0/0)
any clue experts??!!
... View more
Labels:
- Labels:
-
Apache NiFi
11-23-2017
02:28 PM
1 Kudo
same issue here
... View more
07-03-2017
08:37 AM
kindly find logs attached for further info . logs-and-configuration.zip @MohamedEmad
... View more
07-03-2017
08:09 AM
the ./log/nifi-app.log includes the following 2017-07-03 09:38:23,567 WARN [main] org.apache.nifi.web.server.JettyServer Failed to start web server... shutting down.
java.lang.IllegalArgumentException: No enum constant org.wali.UpdateType.CONTENTMISSING
at java.lang.Enum.valueOf(Enum.java:238)
at org.wali.UpdateType.valueOf(UpdateType.java:24)
at org.apache.nifi.controller.repository.SchemaRepositoryRecordSerde.deserializeRecord(SchemaRepositoryRecordSerde.java:126)
at org.apache.nifi.controller.repository.SchemaRepositoryRecordSerde.deserializeEdit(SchemaRepositoryRecordSerde.java:109)
at org.apache.nifi.controller.repository.SchemaRepositoryRecordSerde.deserializeEdit(SchemaRepositoryRecordSerde.java:46)
at org.wali.MinimalLockingWriteAheadLog$Partition.recoverNextTransaction(MinimalLockingWriteAheadLog.java:1096)
at org.wali.MinimalLockingWriteAheadLog.recoverFromEdits(MinimalLockingWriteAheadLog.java:459)
at org.wali.MinimalLockingWriteAheadLog.recoverRecords(MinimalLockingWriteAheadLog.java:301)
at org.apache.nifi.controller.repository.WriteAheadFlowFileRepository.loadFlowFiles(WriteAheadFlowFileRepository.java:381)
at org.apache.nifi.controller.FlowController.initializeFlow(FlowController.java:713)
at org.apache.nifi.controller.StandardFlowService.initializeController(StandardFlowService.java:955)
at org.apache.nifi.controller.StandardFlowService.load(StandardFlowService.java:534)
at org.apache.nifi.web.contextlistener.ApplicationStartupContextListener.contextInitialized(ApplicationStartupContextListener.java:72)
at org.eclipse.jetty.server.handler.ContextHandler.callContextInitialized(ContextHandler.java:876)
at org.eclipse.jetty.servlet.ServletContextHandler.callContextInitialized(ServletContextHandler.java:532)
at org.eclipse.jetty.server.handler.ContextHandler.startContext(ContextHandler.java:839)
at org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:344)
at org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1480)
at org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1442)
at org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:799)
at org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:261)
at org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:540)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:131)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:113)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:113)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:131)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:105)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:113)
at org.eclipse.jetty.server.handler.gzip.GzipHandler.doStart(GzipHandler.java:290)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:131)
at org.eclipse.jetty.server.Server.start(Server.java:452)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:105)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:113)
at org.eclipse.jetty.server.Server.doStart(Server.java:419)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.apache.nifi.web.server.JettyServer.start(JettyServer.java:705)
at org.apache.nifi.NiFi.<init>(NiFi.java:160)
at org.apache.nifi.NiFi.main(NiFi.java:267)
2017-07-03 09:38:23,571 INFO [Thread-1] org.apache.nifi.NiFi Initiating shutdown of Jetty web server...
2017-07-03 09:38:23,576 INFO [Thread-1] o.eclipse.jetty.server.AbstractConnector Stopped ServerConnector@7f03e5f4{HTTP/1.1,[http/1.1]}{0.0.0.0:8080}
2017-07-03 09:38:23,578 INFO [Thread-1] org.eclipse.jetty.server.session Stopped scavenging any idea
... View more
- Tags:
- hdf
- nifi-state
Labels:
- Labels:
-
Apache NiFi
-
Cloudera DataFlow (CDF)
06-13-2017
05:49 PM
1 Kudo
Dear @Matt Burgess what a luck ,yea it worked after upgrading to hdf3.0 Thanks a lot man:) Appreciated a lot
... View more
06-08-2017
09:23 AM
HDF 2.1.3 and strange I can't find a way to delete the created HiveConfigurationPool instances
... View more
06-07-2017
09:34 AM
thanks @Matt Burgess for your reply but I believe I've missed something what I did so far : from the NiFi controller settings 1- I changed the controller service name 2- and change the Properties as you mentioned the DB and else: 3-enabling it * from the putHiveQL: I can't find the HiveConnectionPool which I've just created . even though when I select any one of them it complains about DB connectivity issue as per my last screenshot in my previous post .
... View more
06-07-2017
01:04 AM
sorry experts if I'm asking a naive question but I'm new in using NiFi , ,anyway, I'm constructing a flow in which I'm getting data from a website and and put it in a hive table , but while I'm setting up the PutHiveQL processor I ran into an situation after I configure the service controller in the NiFi put the putHiveQL processor always complain from HiveConnectionPool within the Connection pool setting the following screenshot appears the complaining about the Database Connection URL and Hbase client as well . I think that I 've missed something I can't hit . can anyone help me ? thanks in advance .
... View more
Labels:
- Labels:
-
Apache NiFi
06-05-2017
04:30 PM
I need to build HDF cluster , I'm using the following repo versions ambari-2.4.2.0-centos7.tar.gz HDF-2.1.3.0-centos7-tars-tarball.tar.gz hdf-ambari-mpack-2.1.2.0-10.tar.gz the problem is an error occurred preventing the ambari-server from start after the management pack installation with the following error in ambari-server.logambari-server.txt given that the DB consistency has no issues .ambari-server-check-database.txt 04 Jun 2017 14:28:42,298 INFO [main] HostRoleCommandDAO:258 - Host role command status summary cache enabled !
04 Jun 2017 14:28:42,299 INFO [main] TransactionalLock$LockArea:121 - LockArea HRC_STATUS_CACHE is enabled
04 Jun 2017 14:28:42,564 INFO [main] LockFactory:53 - Lock profiling is disabled
04 Jun 2017 14:28:42,566 INFO [main] AmbariServer:988 - Getting the controller
04 Jun 2017 14:28:44,832 INFO [main] StackManager:146 - Initializing the stack manager...
04 Jun 2017 14:28:45,372 INFO [main] ServiceDirectory:419 - Role command order info was loaded from file: /var/lib/ambari-server/resources/common-services/DRUID/0.9.2/role_command_order.json
04 Jun 2017 14:28:46,427 ERROR [main] ModuleFileUnmarshaller:141 - Cannot parse /var/lib/ambari-server/resources/stacks/HDF/2.0/upgrades/nonrolling-upgrade-2.1.xml
04 Jun 2017 14:28:46,428 ERROR [main] ModuleFileUnmarshaller:143 - cvc-complex-type.2.4.a: Invalid content was found starting with element 'downgrade-allowed'. One of '{upgrade-path, order}' is expected.
org.xml.sax.SAXParseException; systemId: file:/var/lib/ambari-server/resources/stacks/HDF/2.0/upgrades/nonrolling-upgrade-2.1.xml; lineNumber: 24; columnNumber: 22; cvc-complex-type.2.4.a: Invalid content was found starting with element 'downgrade-allowed'. One of '{upgrade-path, order}' is expected.
at com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.createSAXParseException(ErrorHandlerWrapper.java:203)
at com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.error(ErrorHandlerWrapper.java:134)
at com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:396)
at com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:327)
at com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:284)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator$XSIErrorReporter.reportError(XMLSchemaValidator.java:452)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator.reportSchemaError(XMLSchemaValidator.java:3230)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator.handleStartElement(XMLSchemaValidator.java:1790)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator.startElement(XMLSchemaValidator.java:740)
at com.sun.org.apache.xerces.internal.jaxp.validation.ValidatorHandlerImpl.startElement(ValidatorHandlerImpl.java:570)
at com.sun.xml.bind.v2.runtime.unmarshaller.ValidatingUnmarshaller.startElement(ValidatingUnmarshaller.java:101)
at com.sun.xml.bind.v2.runtime.unmarshaller.SAXConnector.startElement(SAXConnector.java:152)
at com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.startElement(AbstractSAXParser.java:509)
at com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.scanStartElement(XMLNSDocumentScannerImpl.java:374)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl$FragmentContentDriver.next(XMLDocumentFragmentScannerImpl.java:2784)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentScannerImpl.next(XMLDocumentScannerImpl.java:602)
at com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.next(XMLNSDocumentScannerImpl.java:112)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.scanDocument(XMLDocumentFragmentScannerImpl.java:505)
at com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:841)
at com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:770)
at com.sun.org.apache.xerces.internal.parsers.XMLParser.parse(XMLParser.java:141)
at com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.parse(AbstractSAXParser.java:1213)
at com.sun.org.apache.xerces.internal.jaxp.SAXParserImpl$JAXPSAXParser.parse(SAXParserImpl.java:643)
at com.sun.xml.bind.v2.runtime.unmarshaller.UnmarshallerImpl.unmarshal0(UnmarshallerImpl.java:216)
at com.sun.xml.bind.v2.runtime.unmarshaller.UnmarshallerImpl.unmarshal(UnmarshallerImpl.java:189)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:157)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:162)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:171)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:189)
at org.apache.ambari.server.stack.ModuleFileUnmarshaller.unmarshal(ModuleFileUnmarshaller.java:136)
at org.apache.ambari.server.stack.ModuleFileUnmarshaller.unmarshal(ModuleFileUnmarshaller.java:81)
at org.apache.ambari.server.stack.StackDirectory.parseUpgradePack(StackDirectory.java:448)
at org.apache.ambari.server.stack.StackDirectory.parseUpgradePacks(StackDirectory.java:422)
at org.apache.ambari.server.stack.StackDirectory.parsePath(StackDirectory.java:307)
at org.apache.ambari.server.stack.StackDirectory.<init>(StackDirectory.java:158)
at org.apache.ambari.server.stack.StackManager.parseStackDirectory(StackManager.java:555)
at org.apache.ambari.server.stack.StackManager.parseDirectories(StackManager.java:187)
at org.apache.ambari.server.stack.StackManager.<init>(StackManager.java:158)
at org.apache.ambari.server.stack.StackManager$FastClassByGuice$33e4ffe0.newInstance(<generated>)
at com.google.inject.internal.cglib.reflect.$FastConstructor.newInstance(FastConstructor.java:40)
at com.google.inject.internal.DefaultConstructionProxyFactory$1.newInstance(DefaultConstructionProxyFactory.java:60)
at com.google.inject.internal.ConstructorInjector.construct(ConstructorInjector.java:85)
at com.google.inject.internal.ConstructorBindingImpl$Factory.get(ConstructorBindingImpl.java:254)
at com.google.inject.internal.InjectorImpl$4$1.call(InjectorImpl.java:978)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1031)
at com.google.inject.internal.InjectorImpl$4.get(InjectorImpl.java:974)
at com.google.inject.assistedinject.FactoryProvider2.invoke(FactoryProvider2.java:632)
at com.sun.proxy.$Proxy28.create(Unknown Source)
at org.apache.ambari.server.api.services.AmbariMetaInfo.init(AmbariMetaInfo.java:265)
at org.apache.ambari.server.api.services.AmbariMetaInfo$FastClassByGuice$202844bc.invoke(<generated>)
at com.google.inject.internal.cglib.reflect.$FastMethod.invoke(FastMethod.java:53)
at com.google.inject.internal.SingleMethodInjector$1.invoke(SingleMethodInjector.java:56)
at com.google.inject.internal.SingleMethodInjector.inject(SingleMethodInjector.java:90)
at com.google.inject.internal.MembersInjectorImpl.injectMembers(MembersInjectorImpl.java:110)
at com.google.inject.internal.ConstructorInjector.construct(ConstructorInjector.java:94)
at com.google.inject.internal.ConstructorBindingImpl$Factory.get(ConstructorBindingImpl.java:254)
at com.google.inject.internal.ProviderToInternalFactoryAdapter$1.call(ProviderToInternalFactoryAdapter.java:46)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1031)
at com.google.inject.internal.ProviderToInternalFactoryAdapter.get(ProviderToInternalFactoryAdapter.java:40)
at com.google.inject.Scopes$1$1.get(Scopes.java:65)
at com.google.inject.internal.InternalFactoryToProviderAdapter.get(InternalFactoryToProviderAdapter.java:40)
at com.google.inject.internal.SingleFieldInjector.inject(SingleFieldInjector.java:53)
at com.google.inject.internal.MembersInjectorImpl.injectMembers(MembersInjectorImpl.java:110)
at com.google.inject.internal.ConstructorInjector.construct(ConstructorInjector.java:94)
at com.google.inject.internal.ConstructorBindingImpl$Factory.get(ConstructorBindingImpl.java:254)
at com.google.inject.internal.ProviderToInternalFactoryAdapter$1.call(ProviderToInternalFactoryAdapter.java:46)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1031)
at com.google.inject.internal.ProviderToInternalFactoryAdapter.get(ProviderToInternalFactoryAdapter.java:40)
at com.google.inject.Scopes$1$1.get(Scopes.java:65)
at com.google.inject.internal.InternalFactoryToProviderAdapter.get(InternalFactoryToProviderAdapter.java:40)
at com.google.inject.internal.InjectorImpl$4$1.call(InjectorImpl.java:978)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1024)
at com.google.inject.internal.InjectorImpl$4.get(InjectorImpl.java:974)
at com.google.inject.internal.InjectorImpl.getInstance(InjectorImpl.java:1013)
at org.apache.ambari.server.controller.AmbariServer.main(AmbariServer.java:1004)
04 Jun 2017 14:28:46,449 ERROR [main] AmbariServer:1017 - Failed to run the Ambari Server
com.google.inject.ProvisionException: Guice provision errors:
1) Error injecting constructor, org.apache.ambari.server.AmbariException: Unable to parse stack upgrade file at location: /var/lib/ambari-server/resources/stacks/HDF/2.0/upgrades/nonrolling-upgrade-2.1.xml
at org.apache.ambari.server.stack.StackManager.<init>(StackManager.java:144)
while locating org.apache.ambari.server.stack.StackManager annotated with interface com.google.inject.assistedinject.Assisted
at org.apache.ambari.server.api.services.AmbariMetaInfo.init(AmbariMetaInfo.java:261)
at org.apache.ambari.server.api.services.AmbariMetaInfo.class(AmbariMetaInfo.java:135)
while locating org.apache.ambari.server.api.services.AmbariMetaInfo
for field at org.apache.ambari.server.controller.AmbariServer.ambariMetaInfo(AmbariServer.java:166)
at org.apache.ambari.server.controller.AmbariServer.class(AmbariServer.java:166)
while locating org.apache.ambari.server.controller.AmbariServer
1 error
at com.google.inject.internal.InjectorImpl$4.get(InjectorImpl.java:987)
at com.google.inject.internal.InjectorImpl.getInstance(InjectorImpl.java:1013)
at org.apache.ambari.server.controller.AmbariServer.main(AmbariServer.java:1004)
Caused by: org.apache.ambari.server.AmbariException: Unable to parse stack upgrade file at location: /var/lib/ambari-server/resources/stacks/HDF/2.0/upgrades/nonrolling-upgrade-2.1.xml
at org.apache.ambari.server.stack.StackDirectory.parseUpgradePack(StackDirectory.java:455)
at org.apache.ambari.server.stack.StackDirectory.parseUpgradePacks(StackDirectory.java:422)
at org.apache.ambari.server.stack.StackDirectory.parsePath(StackDirectory.java:307)
at org.apache.ambari.server.stack.StackDirectory.<init>(StackDirectory.java:158)
at org.apache.ambari.server.stack.StackManager.parseStackDirectory(StackManager.java:555)
at org.apache.ambari.server.stack.StackManager.parseDirectories(StackManager.java:187)
at org.apache.ambari.server.stack.StackManager.<init>(StackManager.java:158)
at org.apache.ambari.server.stack.StackManager$FastClassByGuice$33e4ffe0.newInstance(<generated>)
at com.google.inject.internal.cglib.reflect.$FastConstructor.newInstance(FastConstructor.java:40)
at com.google.inject.internal.DefaultConstructionProxyFactory$1.newInstance(DefaultConstructionProxyFactory.java:60)
at com.google.inject.internal.ConstructorInjector.construct(ConstructorInjector.java:85)
at com.google.inject.internal.ConstructorBindingImpl$Factory.get(ConstructorBindingImpl.java:254)
at com.google.inject.internal.InjectorImpl$4$1.call(InjectorImpl.java:978)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1031)
at com.google.inject.internal.InjectorImpl$4.get(InjectorImpl.java:974)
at com.google.inject.assistedinject.FactoryProvider2.invoke(FactoryProvider2.java:632)
at com.sun.proxy.$Proxy28.create(Unknown Source)
at org.apache.ambari.server.api.services.AmbariMetaInfo.init(AmbariMetaInfo.java:265)
at org.apache.ambari.server.api.services.AmbariMetaInfo$FastClassByGuice$202844bc.invoke(<generated>)
at com.google.inject.internal.cglib.reflect.$FastMethod.invoke(FastMethod.java:53)
at com.google.inject.internal.SingleMethodInjector$1.invoke(SingleMethodInjector.java:56)
at com.google.inject.internal.SingleMethodInjector.inject(SingleMethodInjector.java:90)
at com.google.inject.internal.MembersInjectorImpl.injectMembers(MembersInjectorImpl.java:110)
at com.google.inject.internal.ConstructorInjector.construct(ConstructorInjector.java:94)
at com.google.inject.internal.ConstructorBindingImpl$Factory.get(ConstructorBindingImpl.java:254)
at com.google.inject.internal.ProviderToInternalFactoryAdapter$1.call(ProviderToInternalFactoryAdapter.java:46)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1031)
at com.google.inject.internal.ProviderToInternalFactoryAdapter.get(ProviderToInternalFactoryAdapter.java:40)
at com.google.inject.Scopes$1$1.get(Scopes.java:65)
at com.google.inject.internal.InternalFactoryToProviderAdapter.get(InternalFactoryToProviderAdapter.java:40)
at com.google.inject.internal.SingleFieldInjector.inject(SingleFieldInjector.java:53)
at com.google.inject.internal.MembersInjectorImpl.injectMembers(MembersInjectorImpl.java:110)
at com.google.inject.internal.ConstructorInjector.construct(ConstructorInjector.java:94)
at com.google.inject.internal.ConstructorBindingImpl$Factory.get(ConstructorBindingImpl.java:254)
at com.google.inject.internal.ProviderToInternalFactoryAdapter$1.call(ProviderToInternalFactoryAdapter.java:46)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1031)
at com.google.inject.internal.ProviderToInternalFactoryAdapter.get(ProviderToInternalFactoryAdapter.java:40)
at com.google.inject.Scopes$1$1.get(Scopes.java:65)
at com.google.inject.internal.InternalFactoryToProviderAdapter.get(InternalFactoryToProviderAdapter.java:40)
at com.google.inject.internal.InjectorImpl$4$1.call(InjectorImpl.java:978)
at com.google.inject.internal.InjectorImpl.callInContext(InjectorImpl.java:1024)
at com.google.inject.internal.InjectorImpl$4.get(InjectorImpl.java:974)
... 2 more
Caused by: javax.xml.bind.UnmarshalException
- with linked exception:
[org.xml.sax.SAXParseException; systemId: file:/var/lib/ambari-server/resources/stacks/HDF/2.0/upgrades/nonrolling-upgrade-2.1.xml; lineNumber: 24; columnNumber: 22; cvc-complex-type.2.4.a: Invalid content was found starting with element 'downgrade-allowed'. One of '{upgrade-path, order}' is expected.]
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.createUnmarshalException(AbstractUnmarshallerImpl.java:335)
at com.sun.xml.bind.v2.runtime.unmarshaller.UnmarshallerImpl.createUnmarshalException(UnmarshallerImpl.java:523)
at com.sun.xml.bind.v2.runtime.unmarshaller.UnmarshallerImpl.unmarshal0(UnmarshallerImpl.java:220)
at com.sun.xml.bind.v2.runtime.unmarshaller.UnmarshallerImpl.unmarshal(UnmarshallerImpl.java:189)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:157)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:162)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:171)
at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(AbstractUnmarshallerImpl.java:189)
at org.apache.ambari.server.stack.ModuleFileUnmarshaller.unmarshal(ModuleFileUnmarshaller.java:136)
at org.apache.ambari.server.stack.ModuleFileUnmarshaller.unmarshal(ModuleFileUnmarshaller.java:81)
at org.apache.ambari.server.stack.StackDirectory.parseUpgradePack(StackDirectory.java:448)
... 43 more
Caused by: org.xml.sax.SAXParseException; systemId: file:/var/lib/ambari-server/resources/stacks/HDF/2.0/upgrades/nonrolling-upgrade-2.1.xml; lineNumber: 24; columnNumber: 22; cvc-complex-type.2.4.a: Invalid content was found starting with element 'downgrade-allowed'. One of '{upgrade-path, order}' is expected.
at com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.createSAXParseException(ErrorHandlerWrapper.java:203)
at com.sun.org.apache.xerces.internal.util.ErrorHandlerWrapper.error(ErrorHandlerWrapper.java:134)
at com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:396)
at com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:327)
at com.sun.org.apache.xerces.internal.impl.XMLErrorReporter.reportError(XMLErrorReporter.java:284)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator$XSIErrorReporter.reportError(XMLSchemaValidator.java:452)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator.reportSchemaError(XMLSchemaValidator.java:3230)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator.handleStartElement(XMLSchemaValidator.java:1790)
at com.sun.org.apache.xerces.internal.impl.xs.XMLSchemaValidator.startElement(XMLSchemaValidator.java:740)
at com.sun.org.apache.xerces.internal.jaxp.validation.ValidatorHandlerImpl.startElement(ValidatorHandlerImpl.java:570)
at com.sun.xml.bind.v2.runtime.unmarshaller.ValidatingUnmarshaller.startElement(ValidatingUnmarshaller.java:101)
at com.sun.xml.bind.v2.runtime.unmarshaller.SAXConnector.startElement(SAXConnector.java:152)
at com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.startElement(AbstractSAXParser.java:509)
at com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.scanStartElement(XMLNSDocumentScannerImpl.java:374)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl$FragmentContentDriver.next(XMLDocumentFragmentScannerImpl.java:2784)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentScannerImpl.next(XMLDocumentScannerImpl.java:602)
at com.sun.org.apache.xerces.internal.impl.XMLNSDocumentScannerImpl.next(XMLNSDocumentScannerImpl.java:112)
at com.sun.org.apache.xerces.internal.impl.XMLDocumentFragmentScannerImpl.scanDocument(XMLDocumentFragmentScannerImpl.java:505)
at com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:841)
at com.sun.org.apache.xerces.internal.parsers.XML11Configuration.parse(XML11Configuration.java:770)
at com.sun.org.apache.xerces.internal.parsers.XMLParser.parse(XMLParser.java:141)
at com.sun.org.apache.xerces.internal.parsers.AbstractSAXParser.parse(AbstractSAXParser.java:1213)
at com.sun.org.apache.xerces.internal.jaxp.SAXParserImpl$JAXPSAXParser.parse(SAXParserImpl.java:643)
at com.sun.xml.bind.v2.runtime.unmarshaller.UnmarshallerImpl.unmarshal0(UnmarshallerImpl.java:216)
... 51 more
... View more
Labels:
- Labels:
-
Apache Ambari
-
Cloudera DataFlow (CDF)