Member since 
    
	
		
		
		09-30-2015
	
	
	
	
	
	
	
	
	
	
	
	
	
	
			
      
                15
            
            
                Posts
            
        
                22
            
            
                Kudos Received
            
        
                3
            
            
                Solutions
            
        My Accepted Solutions
| Title | Views | Posted | 
|---|---|---|
| 2645 | 10-13-2017 01:49 PM | |
| 1177 | 03-01-2017 05:30 PM | |
| 2637 | 02-28-2017 03:45 PM | 
			
    
	
		
		
		03-05-2018
	
		
		01:34 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
		
	
				
		
			
					
				
		
	
		
					
							 @Purnima Kuchikulla  As @Attila Kanto mentioned, Nifi is not supported in HDC, in HDC there are predefined HDP blueprints only.  The cloudbreak team is working on HDF support in Cloudbreak: https://hortonworks.jira.com/browse/RMP-10082. It is planned to release in Cloudbreak 2.5 or later. 
						
					
					... View more
				
			
			
			
			
			
			
			
			
			
		
			
    
	
		
		
		03-05-2018
	
		
		01:25 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
		
	
				
		
			
					
	
		2 Kudos
		
	
				
		
	
		
					
							 Hi @MARTIN GATTO, cloudbreak 2.4 is the recommended version and hdcloud planned to be replaced with this version in the future. So the recommendation is to use Cloudbreak 2.4, because it is the long term supported one. 
						
					
					... View more
				
			
			
			
			
			
			
			
			
			
		
			
    
	
		
		
		10-13-2017
	
		
		01:49 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
		
	
				
		
			
					
	
		5 Kudos
		
	
				
		
	
		
					
							 @Anagha  Khanolkar    You can create your custom virtual network on the Azure Portal, where you can define your custom dns server.  After this you can create a new network resource, where you can setup your exisiting virtual network and subnet settings. (http://hortonworks.github.io/cloudbreak-docs/latest/azure/#infrastructure-templates "Custom AZURE Network" paragraph)  During Azure cluster creation you have to use this network with the custom DNS server  
						
					
					... View more
				
			
			
			
			
			
			
			
			
			
		
			
    
	
		
		
		03-01-2017
	
		
		05:30 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
		
	
				
		
			
					
	
		2 Kudos
		
	
				
		
	
		
					
							 Hi @Davide Ferrari,  you can define the hdp repository urls during cluster creation on the 'Configure HDP repository' tab if you enable the 'Advanced Options' on the UI. 
						
					
					... View more
				
			
			
			
			
			
			
			
			
			
		
			
    
	
		
		
		02-28-2017
	
		
		03:45 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
		
	
				
		
			
					
	
		6 Kudos
		
	
				
		
	
		
					
							 Hi @Atul Aggarwal,  You have 2 options: using key-based or role-based credentials.  Key-based credential:   you can set your AWS keys of an IAM user with an "AssumeRole" policy in the Profile file. In this case you don't need the instance profile   export AWS_ACCESS_KEY_ID=AKIA**************W7SA
export AWS_SECRET_ACCESS_KEY=RWCT4Cs8******************/*skiOkWD   This iam user has the generate-role policy next to the assume-role policy.  in this case you can use the following command to generate an iam role for cloudbreak with the following cbd commands:   cbd aws generate-role  - Generates an AWS IAM role for Cloudbreak provisioning on AWS
cbd aws show-role      - Show assumers and policies for an AWS role
cbd aws delete-role    - Deletes an AWS IAM role, removes all inline policies   After the role generation you can use the generated role for the credential creation from cb shell:     credential create --AWS --name cloudbreak --roleArn "arn:aws:iam::xxxx:role/cbreak-deployer" --sshKeyString "xxxxx" --publicInAccount true  If you use the roleArn for credential creation, you don't need to use the accesskey and secretkey in the command.  Role-based credential:   You can create an IAM user with "AssumeRole" policy. The "generate-role" policy will be necessary here as well.  To configure role-based credentials, start your instance with an "AssumeRole" policy. For more information, see Using Instance Profiles and Using an IAM Role to Grant Permissions to Applications Running on Amazon EC2 Instances.  In this case you don't need to set the aws access and secret key in the Profile file.  After this the 3-4 steps from the Key based credential have to be executed.   You can find the details in the documentation here:  http://sequenceiq.com/cloudbreak-docs/latest/aws/#configure-role-based-credentials 
						
					
					... View more