Member since
09-30-2015
15
Posts
22
Kudos Received
3
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
1940 | 10-13-2017 01:49 PM | |
851 | 03-01-2017 05:30 PM | |
1928 | 02-28-2017 03:45 PM |
03-05-2018
01:34 PM
@Purnima Kuchikulla As @Attila Kanto mentioned, Nifi is not supported in HDC, in HDC there are predefined HDP blueprints only. The cloudbreak team is working on HDF support in Cloudbreak: https://hortonworks.jira.com/browse/RMP-10082. It is planned to release in Cloudbreak 2.5 or later.
... View more
03-05-2018
01:25 PM
2 Kudos
Hi @MARTIN GATTO, cloudbreak 2.4 is the recommended version and hdcloud planned to be replaced with this version in the future. So the recommendation is to use Cloudbreak 2.4, because it is the long term supported one.
... View more
10-13-2017
01:49 PM
5 Kudos
@Anagha Khanolkar You can create your custom virtual network on the Azure Portal, where you can define your custom dns server. After this you can create a new network resource, where you can setup your exisiting virtual network and subnet settings. (http://hortonworks.github.io/cloudbreak-docs/latest/azure/#infrastructure-templates "Custom AZURE Network" paragraph) During Azure cluster creation you have to use this network with the custom DNS server
... View more
03-01-2017
05:30 PM
2 Kudos
Hi @Davide Ferrari, you can define the hdp repository urls during cluster creation on the 'Configure HDP repository' tab if you enable the 'Advanced Options' on the UI.
... View more
02-28-2017
03:45 PM
6 Kudos
Hi @Atul Aggarwal, You have 2 options: using key-based or role-based credentials. Key-based credential: you can set your AWS keys of an IAM user with an "AssumeRole" policy in the Profile file. In this case you don't need the instance profile export AWS_ACCESS_KEY_ID=AKIA**************W7SA
export AWS_SECRET_ACCESS_KEY=RWCT4Cs8******************/*skiOkWD This iam user has the generate-role policy next to the assume-role policy. in this case you can use the following command to generate an iam role for cloudbreak with the following cbd commands: cbd aws generate-role - Generates an AWS IAM role for Cloudbreak provisioning on AWS
cbd aws show-role - Show assumers and policies for an AWS role
cbd aws delete-role - Deletes an AWS IAM role, removes all inline policies After the role generation you can use the generated role for the credential creation from cb shell: credential create --AWS --name cloudbreak --roleArn "arn:aws:iam::xxxx:role/cbreak-deployer" --sshKeyString "xxxxx" --publicInAccount true If you use the roleArn for credential creation, you don't need to use the accesskey and secretkey in the command. Role-based credential: You can create an IAM user with "AssumeRole" policy. The "generate-role" policy will be necessary here as well. To configure role-based credentials, start your instance with an "AssumeRole" policy. For more information, see Using Instance Profiles and Using an IAM Role to Grant Permissions to Applications Running on Amazon EC2 Instances. In this case you don't need to set the aws access and secret key in the Profile file. After this the 3-4 steps from the Key based credential have to be executed. You can find the details in the documentation here: http://sequenceiq.com/cloudbreak-docs/latest/aws/#configure-role-based-credentials
... View more