Member since
10-28-2014
71
Posts
11
Kudos Received
15
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
2172 | 07-19-2019 01:53 PM | |
15033 | 07-19-2019 12:17 PM | |
15047 | 07-19-2019 11:23 AM | |
1771 | 07-15-2019 09:40 AM | |
1124 | 04-04-2019 03:03 PM |
07-19-2019
01:53 PM
For every choice of semantics for these properties, we found failure scenarios that would result in good values overwriting bad values, either in CM during bootstrap or grow, or in Director's deployment or cluster template during refresh. The blacklist was the least-bad solution. The blacklisting will not result in errors if you provide the properties--they will just be silently ignored when Director passes the configuration to CM. With the blacklists in place, CM becomes the source of truth for these properties, so you will still be able to set them in CM if the autoconfigured values are not acceptable. If for some reason you have problems bootstrapping without them, the bootstrap and update blacklists are separately configurable, so you might be able to provide them at bootstrap. I can't recall what the potential failure scenarios were there.
... View more
07-19-2019
12:54 PM
Can you please clarify whether you were already using those custom settings and they are not being applied correctly, or whether you started providing those custom settings as a solution for the problem you raised in this post? If it's the latter, I'm glad you found the custom settings. That was going to be my recommendation. What version of Director are you on? While implementing improvements to the deployment/cluster refresh process in 6.2, we ran into some bugs around those settings getting overwritten during refresh. There is a new blacklist in place to avoid overwriting those properties (so that CMs autoconfigured values don't get smashed), but that could prevent your custom values from taking effect. So if you run into any problems on 6.2 or later, please let us know.
... View more
07-19-2019
12:17 PM
1 Kudo
According to the comments on the Jira, the properties will not include hikari. That is consistent with the recommendation in the previously linked stackoverflow thread.
... View more
07-19-2019
11:23 AM
1 Kudo
@Da It turns out that the inability to configure these properties was a Director bug which has been fixed for our upcoming 6.3 release. Once you are on 6.3, you will be able to configure the setting (for the Hikari connection pool, as it turns out) using the spring.datasource.maximumPoolSize property. I am sorry that there is no workaround for earlier releases.
... View more
07-19-2019
11:02 AM
We're relying on springboot, and are not doing anything special. I notice that in the application.properties embedded in the jar, some of the documented tomcat properties, like testOnBorrow and validationQuery, are being set with a prefix of spring.datasource.tomcat. Based on that stackoverflow answer, I wouldn't expect that to be required for maxActive, but give it a try and let me know if it works.
... View more
07-19-2019
09:32 AM
I can't confirm that your problem is caused by the connection pool size, and have never adjusted the connection pool settings manually, but Director uses spring-boot so you should be able to set the appropriate properties in application.properties as described in this stackoverflow question: https://stackoverflow.com/questions/25573034/spring-boot-how-do-i-set-jdbc-pool-properties-like-maximum-number-of-connection The property prefix should be spring.datasource, and the supported properties should be these: http://tomcat.apache.org/tomcat-7.0-doc/jdbc-pool.html#Common_Attributes For the pool size specifically, you should be able to set it like this: spring.datasource.maxActive=200
... View more
07-18-2019
09:15 AM
It would be helpful for us to see the logs. There should be additional info logging for the individual connection attempts ("Attempting connection to <endpoint>").
... View more
07-15-2019
09:40 AM
It looks like we failed to update the documentation when we added support for this in 6.2.0. Good catch! The cluster refresher should detect changes to the instance type made in the Azure portal and update the cluster template with the new information. If this results in an instance group being inconsistent (with some instances on the old instance type and some on the new), grow operations will be blocked for the cluster. If the instance group is made consistent (by either changing all the instances to the new instance type, or by shrinking away instances using the old instance type), grow will be enabled, and a subsequent grow operation will use the new instance type.
... View more
04-04-2019
03:03 PM
Support for CentOS 7.6 was added in Cloudera Altus Director 6.2, which released today. Altus Director does not validate the CentOS version, but CentOS 7.6 has not been tested with older Altus Director versions.
... View more
06-21-2018
01:15 PM
Glad you figured this out. Thanks for posting your solution for other forum users.
... View more