Member since
03-10-2014
8
Posts
3
Kudos Received
1
Solution
My Accepted Solutions
Title | Views | Posted |
---|---|---|
4619 | 09-09-2014 03:15 PM |
02-16-2015
02:17 PM
Are you running CentOS 6.6? There appears to be an issue setting up TLS encryption on this OS: http://community.cloudera.com/t5/Cloudera-Manager-Installation/Cloudera-Manager-support-for-Centos-6-6/m-p/21478/thread-id/2820/highlight/true
... View more
01-07-2015
03:29 PM
petibonvm, I also had this issue in CDH 5.1.x. My advice would be to upgrade to CM/CDH 5.3 and use Spark on YARN. If that is not currently possible, the following work around is posted in the CM 5.1.x Release Notes: The Spark History Server does not start when Kerberos authentication is enabled. The Spark History Server does not start when managed by a Cloudera Manager 5.1 instance when Kerberos authentication is enabled. Workaround: Go to the Spark service. Expand the History Server Default Group > Advanced category. Add the following configuration to the History Server Environment Advanced Configuration Snippet property: SPARK_HISTORY_OPTS=-Dspark.history.kerberos.enabled=true \
-Dspark.history.kerberos.principal=principal \
-Dspark.history.kerberos.keytab=keytab where principal is the name of the Kerberos principal to use for the History Server, and keytab is the path to the principal's keytab file on the local filesystem of the host running the History Server. Regards, Chad
... View more
11-20-2014
12:32 PM
Kevin, 1. Log into Cloudera Manager and go to the Hue - Configuration page 2. Search for "hue_safety_valve.ini" to find the Property, Hue Service Advanced Configuration Snippet (Safety Valve) for hue_safety_value.ini 3. Add a snippet similar to the following in the Value textbox: [librdbms] [[databases]] [[[mysqlemployees]]] nice_name=MySQL - employees name=employees engine=mysql host=<db host> ## port= user=<db username> password=<password> ##options={} [[[mysqlworld]]] nice_name=MySQL - world name=world engine=mysql host=<db host> ## port= user=<db username> password=<password> ##options={} 4. Save and restart the Hue service I found the following link that describes the configuration above: http://gethue.com/dbquery-app-mysql-postgresql-oracle-and-sqlite-query/ "nice-name" is what will be shown in the Hue dropdown, while "name" is the database name. I have only configured for MySQL, but you can also use engine=postgresql Chad
... View more
11-04-2014
01:39 PM
Please refer to the following page as part of the Kerberos setup: http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_s7_prepare_cluster.html By default, the mapred, hdfs, and bin user accounts are kept from submitting and executing jobs.
... View more
11-04-2014
01:16 PM
Please refer to the following page: http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_s7_prepare_cluster.html You either need to prepare your cluster with a user account with a user id greater than min.user.id or change this setting to be less than the default setting of 1000. Also, the default setting for the banned.users property does not allow the hdfs user to submit and execute jobs. For CentOS, you can use the following to specify the UID as something over 1000: useradd -p <passwd> -u 1001 <username>
... View more
09-09-2014
03:15 PM
3 Kudos
Ignore my previous reply. Hue will no longer be able to authenticate with the Oozie server after making the above changes in a secured cluster. Since I am accessing Cloudera Manager using a browser on a Windows laptop, what I ultimately had to do is configure Kerberos authentication for Windows, as described in Appendix A of the following guide: http://www.cloudera.com/content/cloudera-content/cloudera-docs/Connectors/PDF/Cloudera-ODBC-Driver-for-Impala-Install-Guide.pdf Once I was able to obtain a ticket from the Hadoop cluster's KDC on my Windows laptop, I configured Firefox according to the following: CDH 5 Security Guide - Using a Web Browser to Access a URL Protected by Kerberos HTTP SPNEGO In addition to these instructions, I also had to set network.auth.use-sspi to 'false' for Firefox.
... View more
09-04-2014
10:12 AM
I also ran into this issue on a Kerberos secured CDH5.1 cluster. After making the following changes to the Oozie configuration via Cloudera Manager, I am able to bring the browser up (may not be suitable for production): Property: Oozie Server Advanced Configuration Snippet (Safety Valve) for oozie-site.xml <property> <name>oozie.authentication.type</name> <value>simple</value> </property> <property> <name>oozie.authentication.token.validity</name> <value>36000</value> </property> <property> <name>oozie.authentication.cookie.domain</name> <value>example.com</value> </property>
... View more
08-29-2014
03:37 PM
Ram, I also had this issue. I believe Datameer is not pulling the correct value for yarn.app.mapreduce.am.staging-dir, as my staging jobs were being created under hdfs:/tmp/hadoop-yarn/staging/datameer, rather than /user/datameer. Try adding the following to your Datameer Hadoop Cluster settings under Custom Properties: yarn.app.mapreduce.am.staging-dir=/user Another good clue I received from Datameer support was to make sure YARN Application Classpath matches the value from 'hadoop classpath' on your cluster. Mine is: $HADOOP_CONF_DIR,$HADOOP_COMMON_HOME/lib/*,$HADOOP_COMMON_HOME/*,$HADOOP_HDFS_HOME/lib/*,$HADOOP_HDFS_HOME/*,$HADOOP_YARN_HOME/lib/*,$HADOOP_YARN_HOME/*,$HADOOP_MAPRED_HOME/lib/*,$HADOOP_MAPRED_HOME/* Good luck, Chad
... View more