Cloudera Manager Administration Guide



Similar documents
Big Data Operations Guide for Cloudera Manager v5.x Hadoop

Cloudera Backup and Disaster Recovery

Cloudera Backup and Disaster Recovery

Cloudera Navigator Installation and User Guide

Configuring TLS Security for Cloudera Manager

How To Use Cloudera Manager Backup And Disaster Recovery (Brd) On A Microsoft Hadoop (Clouderma) On An Ubuntu Or 5.3.5

Important Notice. (c) Cloudera, Inc. All rights reserved.

Cloudera Manager Training: Hands-On Exercises

Cloudera Enterprise Reference Architecture for Google Cloud Platform Deployments

Cloudera Manager Introduction

Cloudera Manager Health Checks

Cloudera Manager Health Checks

Cloudera Manager Monitoring and Diagnostics Guide

Cloudera Manager Monitoring and Diagnostics Guide

NSi Mobile Installation Guide. Version 6.2

CDH 5 Quick Start Guide

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Cloudera Manager Installation Guide

CA Performance Center

Cloudera Navigator Installation and User Guide

Cloudera Enterprise Reference Architecture for Google Cloud Platform Deployments

WhatsUp Gold v16.3 Installation and Configuration Guide

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

WhatsUp Gold v16.2 Installation and Configuration Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Sophos for Microsoft SharePoint startup guide

Copyright 2012 Trend Micro Incorporated. All rights reserved.

F-Secure Messaging Security Gateway. Deployment Guide

Installing and Configuring vcloud Connector

Installing and Configuring vcenter Support Assistant

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Configuring Hadoop Security with Cloudera Manager

VMware Identity Manager Administration

FileMaker Server 14. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Version 3.8. Installation Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Xerox Secure Access Unified ID System 5.4 Administration Guide

RealPresence Platform Director

Management Center. Installation and Upgrade Guide. Version 8 FR4

VMware Mirage Web Manager Guide

WhatsUp Gold v16.1 Installation and Configuration Guide

Upgrading VMware Identity Manager Connector

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

Installation Guide for Pulse on Windows Server 2008R2

docs.hortonworks.com

LifeSize Control Installation Guide

VMware vcenter Support Assistant 5.1.1

Installation Guide for Pulse on Windows Server 2012

Cloudera ODBC Driver for Apache Hive Version

Content Filtering Client Policy & Reporting Administrator s Guide

User's Guide. Product Version: Publication Date: 7/25/2011


Administration Guide Novell Filr May 2014

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. August 2014 Phone: Publication: , Rev. C

FileMaker Server 13. FileMaker Server Help

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

How to Install and Configure EBF15328 for MapR or with MapReduce v1

WhatsUp Gold v16.1 Database Migration and Management Guide Learn how to migrate a WhatsUp Gold database from Microsoft SQL Server 2008 R2 Express

2 Downloading Access Manager 3.1 SP4 IR1

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

HP A-IMC Firewall Manager

Using LDAP Authentication in a PowerCenter Domain

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC , revision 2.029, May 2012.

Reconfiguring VMware vsphere Update Manager

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Centrify Identity and Access Management for Cloudera

Setup Guide Access Manager 3.2 SP3

WhatsUp Gold v16.2 Database Migration and Management Guide

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

XenClient Enterprise Synchronizer Installation Guide

Server Installation Guide ZENworks Patch Management 6.4 SP2

BlackBerry Enterprise Service 10. Version: Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Managing Software and Configurations

Siteminder Integration Guide

Synchronizer Installation

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Certificate Management

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Sophos Mobile Control Installation guide. Product version: 3.5

ez Agent Administrator s Guide

Configuring Sponsor Authentication

Introduction to Directory Services

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

Virtual Web Appliance Setup Guide

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Secure Messaging Server Console... 2

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

OnCommand Performance Manager 1.1

Installation Guide. SafeNet Authentication Service

VMware Identity Manager Administration

Kaseya 2. Installation guide. Version 7.0. English

Introduction to Hyper-V High- Availability with Failover Clustering

Enterprise Vault Installing and Configuring

Transcription:

Cloudera Manager Administration Guide

Important Notice (c) 2010-2015 Cloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans contained in this document are trademarks of Cloudera and its suppliers or licensors, and may not be copied, imitated or used, in whole or in part, without the prior written permission of Cloudera or the applicable trademark holder. Hadoop and the Hadoop elephant logo are trademarks of the Apache Software Foundation. All other trademarks, registered trademarks, product names and company names or logos mentioned in this document are the property of their respective owners. Reference to any products, services, processes or other information, by trade name, trademark, manufacturer, supplier or otherwise does not constitute or imply endorsement, sponsorship or recommendation thereof by us. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Cloudera. Cloudera may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Cloudera, the furnishing of this document does not give you any license to these patents, trademarks copyrights, or other intellectual property. For information about patents covering Cloudera products, see http://tiny.cloudera.com/patents. The information in this document is subject to change without notice. Cloudera shall not be liable for any damages resulting from technical errors or omissions which may be present in this document, or from use of this document. Cloudera, Inc. 1001 Page Mill Road Bldg 2 Palo Alto, CA 94304 info@cloudera.com US: 1-888-789-1488 Intl: 1-650-362-0488 www.cloudera.com Release Information Version: 5.1.x Date: September 8, 2015

Table of Contents About this Guide...7 Managing the Cloudera Manager Server and Agents...9 Starting, Stopping, and Restarting the Cloudera Manager Server...9 Configuring Cloudera Manager Server Ports...9 Moving the Cloudera Manager Server to a New Host...9 Starting, Stopping, and Restarting Cloudera Manager Agents...10 Configuring Cloudera Manager Agents...11 Viewing Cloudera Manager Server and Agent Logs...14 Changing Hostnames...14 Backing up Databases...16 Backing Up PostgreSQL Databases...17 Backing Up MySQL Databases...17 Backing Up Oracle Databases...17 Cloudera Management Service...19 Managing Users and Authentication...23 Cloudera Manager User Accounts...23 Changing the Logged-In Internal User Password...24 Adding an Internal User Account...24 Assigning User Roles...24 Changing an Internal User Account Password...24 Deleting Internal User Accounts...24 Configuring External Authentication...25 Configuring Authentication Using Active Directory...25 Configuring Authentication Using an OpenLDAP-compatible Server...25 Configuring Authentication Using an External Program...27 Configuring Authentication Using SAML...27 Configuring TLS Security for Cloudera Manager...31 Configuring TLS Encryption only for Cloudera Manager...31 Step 1: Create a Cloudera Manager Server certificate....31 Step 2: Enable TLS encryption and specify Server keystore properties...32

Step 3: Enable and configure TLS on the Agent hosts...32 Step 4: Restart the Cloudera Manager Server...32 Step 5: Restart the Cloudera Manager Agents...33 Step 6: Verify that the Server and Agents are communicating...33 Configuring TLS Authentication of Server to Agents...33 Step 1: Configure TLS encryption...33 Step 2: Provide the Server's server certificate and CA certificate...33 Step 3: Copy the Server's server.pem file to the Agents...36 Step 4: Enable TLS Encryption in Cloudera Manager...36 Step 5: Restart the Cloudera Manager Server...36 Step 6: Restart the Cloudera Manager Agents...36 Step 7: Verify that the Server and Agents are communicating...36 Configuring TLS Authentication of Agents to Server...37 Step 1: Configure TLS encryption...37 Step 2: Configure TLS Authentication of Server to Agents...37 Step 3. Generate the private key for the Agent using openssl...37 Step 4: Generate a certificate for the agent...37 Step 5: Create a file that contains the password for the key...37 Step 6: Configure the Agent with its private key and certificate...37 Step 7: Import the Agent's certificate into the Server's truststore...38 Step 8: Repeat steps 3 through 7 for every agent in your cluster...38 Step 9: Enable Agent authentication and configure the Server to use the new truststore...38 Step 10: Restart the Server...38 Step 11: Restart the Cloudera Manager Agents...38 Step 12: Verify that the Server and Agents are communicating...38 Configuring TLS Encryption for Cloudera Manager Admin Console...38 Step 1: Create a Cloudera Manager Server certificate....39 Step 2: Enable TLS encryption and specify Server keystore properties...39 Step 3: Restart the Cloudera Manager Server...39 Step 4: Restart the Cloudera Management Services...40 Step 5: Verify that the Server and browser are using TLS to communicate...40 HTTPS Communication in Cloudera Manager...40 Cloudera Manager Agent...40 Cloudera Management Services...41 Upgrading Cloudera Manager...43 Understanding Upgrades...43 Upgrading Cloudera Manager...43 Upgrading CDH...44 Database Considerations for Cloudera Manager Upgrades...44 Back up Databases...44 Modify Databases to Support UTF-8...44 Modify Databases to Support Appropriate Maximum Connections...45

Next Steps...46 Upgrading Cloudera Manager 5 to the Latest Cloudera Manager...46 Review Warning...46 Perform Prerequisite Steps...47 Stop Selected Services and Roles...47 Stop Cloudera Manager Server, Database, and Agent...47 (Optional) Upgrade JDK on Cloudera Manager Server Host and Agent Hosts...48 Upgrade Cloudera Manager Server Packages...48 Start the Cloudera Manager Server...50 Upgrade Cloudera Manager Agent Packages...50 Verify the Upgrade Succeeded...52 (Optional) Configure SSL for Cloudera Management Service...52 Deploy JDK Upgrade...53 Start Selected Services and Roles...53 Deploy Updated Client Configurations...53 Test the Installation...54 (Optional) Upgrade CDH...54 Upgrading Cloudera Manager 4 to Cloudera Manager 5...54 Review Warnings and Notes...55 Perform Prerequisite Steps...56 Stop Selected Services...57 Stop Cloudera Manager Server, Database, and Agent...57 (Optional) Upgrade JDK on Cloudera Manager Server Host and Agent Hosts...58 Upgrade Cloudera Manager Server Packages...58 Start the Cloudera Manager Server...60 Upgrade Cloudera Manager Agent Packages...60 Verify the Upgrade Succeeded...63 Add Hive Gateway Roles...63 Configure Cluster Version for Package Installs...63 Upgrade Impala...64 (Optional) Configure SSL for Cloudera Management Service...64 (Optional) Deploy Cloudera Manager Agent Upgrade...64 Deploy JDK Upgrade...64 (Optional) Deploy Monitoring Upgrade...65 Start Selected Services and Roles...65 Deploy Updated Client Configurations...65 Test the Installation...66 (Optional) Upgrade CDH...66 Upgrading Cloudera Manager 3.7.x...66 Re-Running the Cloudera Manager Upgrade Wizard...66 Reverting a Failed Cloudera Manager Upgrade...67 Reinstall the Cloudera Manager Server Packages...67 Start the Server...69

Other Cloudera Manager Settings...71 Administration Settings...71 User Interface Language Settings...72 Managing Licenses...72 Managing Alerts...75 Configuring Alert Email Delivery...75 Configuring Alert SNMP Delivery...76 Kerberos...77 Sending Usage and Diagnostic Data to Cloudera...78 Configuring a Proxy Server...78 Managing Anonymous Usage Data Collection...78 Managing Hue Analytics Data Collection...79 Diagnostic Data Collection...79 Configuring Network Settings...81 Importing Cloudera Manager Settings...82 Backing up your Current Deployment...82 Building a Cloudera Manager Deployment...82 Uploading a Cloudera Manager 4.x Configuration Script...82

About this Guide About this Guide This guide is for system administrators who need to manage a Cloudera Manager server installation. This guide covers managing the Cloudera Manager Server and Agents, managing the Cloudera Management Service, adding and managing Cloudera Manager users, configuring TLS security, upgrading Cloudera Manager, adding or upgrading licenses, configuring the Alert Publisher, and other similar features. Cloudera Manager Administration Guide 7

Managing the Cloudera Manager Server and Agents Managing the Cloudera Manager Server and Agents This section covers information on managing the Cloudera Manager Server and Agents that run on each host of the cluster. Starting, Stopping, and Restarting the Cloudera Manager Server To start the Cloudera Manager Server: $ sudo service cloudera-scm-server start You can stop (for example, to perform maintenance on its host) or restart the Cloudera Manager Server without affecting the other services running on your cluster. Statistics data used by activity monitoring and service monitoring will continue to be collected during the time the server is down. To stop the Cloudera Manager Server: $ sudo service cloudera-scm-server stop To restart the Cloudera Manager Server: $ sudo service cloudera-scm-server restart Configuring Cloudera Manager Server Ports Required Role: 1. Select Administration > Settings. 2. Under the Ports and Addresses category, set the following options as described below: Setting HTTP Port for Admin Console HTTPS Port for Admin Console Agent Port to connect to Server Description Specify the HTTP port to use to access the Server via the Admin Console. Specify the HTTPS port to use to access the Server via the Admin Console. Specify the port for Agents to use to connect to the Server. 3. Click Save Changes. 4. Restart the Cloudera Manager Server. Moving the Cloudera Manager Server to a New Host You can move the Cloudera Manager Server if the database information is still available for either of the following reasons: The database server is still available. A current back up of the Cloudera Manager database is available. To move Cloudera Manager Server: Cloudera Manager Administration Guide 9

Managing the Cloudera Manager Server and Agents 1. Record the old host's name hostname and IP address. It is not absolutely necessary to have the old Cloudera Manager server hostname and IP address, but it simplifies the process. You could use a new hostname and IP address, but this would require updating the configuration of every Agent to use this new information. Because it is easier to use the old server hostname and address in most cases, using a new hostname and IP address is not described. 2. Identify a new host on which to install Cloudera Manager. Assign the failed Cloudera Manager Server's hostname and IP address to the new host. Note: If the Agents were configured with the server's hostname, you do not need to assign the old host's IP address to the new host. Simply assigning the hostname will suffice. 3. Install Cloudera Manager on a new host, using the method described under Install the Cloudera Manager Server Packages. Do not install the other components, such as CDH and databases. 4. If the database server is not available, a. Install the database packages on the host that will host the restored database. This could be the same host on which you have just installed Cloudera Manager or it could be a different host. The details of which package to install varies based on which database was initially installed on your system. If you used the embedded PostgreSQL database, install the PostgreSQL package as described in Embedded PostgreSQL Database. If you used an external MySQL, PostgreSQL, or Oracle database, reinstall that following the instructions in Cloudera Manager and Managed Service Databases. b. Restore the backed up databases to the new database installations. 5. Update /etc/cloudera-scm-server/db.properties with the necessary information so that the Cloudera Manager Server connects to the restored database. This information is typically the database name, database instance name, user name, and password. 6. Start the Cloudera Manager Server. At this point, Cloudera Manager should resume functioning as it did before the failure. Because you restored the database from the backup, the server should accept the running state of the Agents, meaning it will not terminate any running processes. The process is similar with secure clusters, though files in /etc/cloudera-scm-server must be restored in addition to the database. Starting, Stopping, and Restarting Cloudera Manager Agents Starting Agents To start Agents, the supervisord process, and all managed service processes, use one of the following commands: Start $ sudo service cloudera-scm-agent start Clean Start $ sudo service cloudera-scm-agent clean_start The directory /var/run/cloudera-scm-agent is completely cleaned out; all files and subdirectories are removed, and then the start command is executed. /var/run/cloudera-scm-agent contains on-disk running Agent state. Some Agent state is left behind in /var/lib/cloudera-scm-agent, but you shouldn't delete that. For further information, see Server and Client Configuration and Process Management. Stopping and Restarting Agents To stop or restart Agents while leaving the managed processes running, use one of the following commands: 10 Cloudera Manager Administration Guide

Managing the Cloudera Manager Server and Agents Stop $ sudo service cloudera-scm-agent stop Restart $ sudo service cloudera-scm-agent restart Hard Stopping and Restarting Agents Warning: The hard_stop, clean_restart, or hard_restart commands kill all running managed service processes on the host(s) where the command is run. To stop or restart Agents, the supervisord process, and all managed service processes, use one of the following commands: Hard Stop $ sudo service cloudera-scm-agent hard_stop Hard Restart $ sudo service cloudera-scm-agent hard_restart Hard restart is useful for the following situations: 1. You're upgrading Cloudera Manager and the supervisord code has changed between your current version and the new one. To properly do this upgrade you'll need to restart supervisor too. 2. supervisord is hung and needs to be restarted. 3. You want to clear out all running state pertaining to Cloudera Manager and managed services. Clean Restart $ sudo service cloudera-scm-agent clean_restart Runs hard_stop followed by clean_start. Checking Agent Status To check the status of the Agent process, use the command: $ sudo service cloudera-scm-agent status Configuring Cloudera Manager Agents Required Role: Cloudera Manager Agents can be configured globally using properties you set in the Cloudera Manager Admin Console and by setting properties in individual Agent configuration files. Configuring Agent Heartbeat and Health Status Options You can configure the Cloudera Manager Agent heartbeat interval and timeouts to trigger changes in Agent health as follows: 1. Select Administration > Settings. Cloudera Manager Administration Guide 11

Managing the Cloudera Manager Server and Agents 2. Under the Performance category, set the following option: Property Send Agent Heartbeat Every Description The interval in seconds between each heartbeat that is sent from Cloudera Manager Agents to the Cloudera Manager Server. Default: 15 sec. 3. Under the Monitoring category, set the following options: Property Set health status to Concerning if the Agent heartbeats fail Set health status to Bad if the Agent heartbeats fail Description The number of missed consecutive heartbeats after which a Concerning health status is assigned to that Agent. Default: 5. The number of missed consecutive heartbeats after which a Bad health status is assigned to that Agent. Default: 10. 4. Click Save Changes. Configuring the Host Parcel Directory To configure the location of distributed parcels: 1. Click Hosts in the top navigation bar. 2. Click the Configuration tab. 3. Configure the value of the Parcel Directory property. The setting of the parcel_dir property in the Cloudera Manager Agent configuration file overrides this setting. 4. Click Save Changes to commit the changes. Agent Configuration File The Cloudera Manager Agent supports different types of configuration options in the /etc/cloudera-scm-agent/config.ini file. You must update the configuration on each host. Property server_host, server_port, listening_port, listening_hostname, listening_ip Description Hostname and ports of the Cloudera Manager Server and Agent and IP address of the Agent. Also see Configuring Cloudera Manager Server Ports on page 9 and Ports Used by Cloudera Manager. The Cloudera Manager Agent configures its hostname automatically. However, if your cluster hosts are multi-homed (that is, they have more than one hostname), and you want to specify which hostname the Cloudera Manager Agent uses, you can update the listening_hostname property. If you want to specify which IP address the Cloudera Manager Agent uses, you can update the listening_ip property in the same file. To have a CNAME used throughout instead of the regular hostname, an Agent can be configured to use listening_hostname=cname. In this case, the CNAME should resolve to the same IP address as the IP address of the hostname on that machine. Users doing this will find that the host inspector will report problems, but the CNAME will be used in all configurations where that's appropriate. This practice is particularly useful for users who would like clients to use 12 Cloudera Manager Administration Guide

Managing the Cloudera Manager Server and Agents Property log_file lib_dir parcel_dir max_collection_wait_seconds metrics_url_timeout_seconds task_metrics_timeout_seconds use_tls,verify_cert_file, client_key_file, client_keypw_file, client_cert_file mgmt_home Description namenode.mycluster.company.com instead of machine1234.mycluster.company.com. In this case, namenode.mycluster would be a CNAME for machine1234.mycluster, and the generated client configurations (and internal configurations as well) would use the CNAME. The path to the Agent log file. If the Agent is being started via the init.d script, /var/log/cloudera-scm-agent/cloudera-scm-agent.out will also have a small amount of output (from before logging is initialized). Default: /var/log/cloudera-scm-agent/cloudera-scm-agent.log. Directory to store Cloudera Manager Agent state that persists across instances of the agent process and system reboots. The agent's UUID is stored here. Default: /var/lib/cloudera-scm-agent. Directory to store unpacked parcels. Default: /opt/cloudera/parcels. Maximum time to wait for all metric collectors to finish collecting data. Default: 10 sec. Maximum time to wait when connecting to a local role's web server to fetch metrics. Default: 30 sec. Maximum time to wait when connecting to a local TaskTracker to fetch task attempt data. Default: 5 sec. Security-related configuration. See Configuring TLS Authentication of Agents to Server on page 37 Configuring TLS Authentication of Server to Agents on page 33 Specifying the Cloudera Manager Server Certificate Adding a Host to the Cluster Directory to store Cloudera Management Service files. Default: /usr/share/cmf. cloudera_mysql_connector_jar, cloudera_oracle_connector_jar, cloudera_postgresql_jdbc_jar Location of JDBC drivers. See Cloudera Manager and Managed Service Databases. Default: MySQL - /usr/share/java/mysql-connector-java.jar Oracle - /usr/share/java/oracle-connector-java.jar PostgreSQL - /usr/share/cmf/lib/postgresql-version-build.jdbc4.jar Cloudera Manager Administration Guide 13

Managing the Cloudera Manager Server and Agents Viewing Cloudera Manager Server and Agent Logs To help you troubleshoot problems, you can view the Cloudera Manager Server and Agent logs. You can view these logs in the Logs page or in specific pages for the logs. Viewing Cloudera Manager Server and Agent Logs in the Logs Page 1. Select Diagnostics > Logs on the top navigation bar. 2. Click Select Sources to display the log source list. 3. Uncheck the All Sources checkbox. 4. Check the Cloudera Manager checkbox to view both Agent and Server logs, or click to the left of Cloudera Manager, and check either the Agent or Server checkbox. 5. Click Search. For more information about the Logs page, see Logs. Viewing the Cloudera Manager Server Log 1. Select Diagnostics > Server Log on the top navigation bar. Note: You can also view the Cloudera Manager Server log at /var/log/cloudera-scm-server/cloudera-scm-server.log on the server host. Viewing the Cloudera Manager Agent Log 1. Click the Hosts tab. 2. Click the link for the host where you want to see the Agent log. 3. In the Details panel, click the Details link in the Host Agent field. 4. Click the Agent Log link. Note: You can also view the Cloudera Manager Agent log at /var/log/cloudera-scm-agent/cloudera-scm-agent.log on the Agent hosts. Changing Hostnames Required Role: Important: The process described here requires Cloudera Manager and cluster downtime. After you have installed Cloudera Manager and created a cluster, you may need to update the names of the hosts running the Cloudera Manager Server or cluster services. To update a deployment with new hostnames, follow these steps: 1. Verify if SSL/TLS certificates have been issued for any of the services and make sure to create new SSL/TLS certificates in advance for services protected by TLS/SSL. Review Cloudera Manager and CDH documentation at Cloudera Documentation. Tip: Search for SSL and TLS in the documentation. 2. Export the Cloudera Manager configuration using one of the following methods: Open a browser and go to this URL http://cm_hostname:7180/api/api_version/cm/deployment. Save the displayed configuration. 14 Cloudera Manager Administration Guide

Managing the Cloudera Manager Server and Agents From terminal type: $ curl -u admin:admin http://cm_hostname:7180/api/api_version/cm/deployment > cme-cm-export.json If Cloudera Manager SSL is in use, specify the -k switch: $ curl -k -u admin:admin http://cm_hostname:7180/api/api_version/cm/deployment > cme-cm-export.json where cm_hostname is the name of the Cloudera Manager host and api_version is the correct version of the API for the version of Cloudera Manager you are using. For example, http://tcdn5-1.ent.cloudera.com:7180/api/v6/cm/deployment. 3. Stop all services on the cluster. 4. Stop the Cloudera Management Service. 5. Stop the Cloudera Manager Server. 6. Stop the Cloudera Manager Agents on the hosts that will be having the hostname changed. 7. Back up the Cloudera Manager Server database using mysqldump, pg_dump, or another preferred backup utility. Store the backup in a safe location. 8. Update names and principals: a. Update the target hosts using standard per-os/name service methods (/etc/hosts, dns, /etc/sysconfig/network, hostname, and so on). Ensure that you remove the old hostname. b. If you are changing the hostname of the host running Cloudera Manager Server do the following: a. Change the hostname per step 8.a. b. Update the Cloudera Manager hostname in /etc/cloudera-scm-agent/config.ini on all Agents. c. If the cluster is configured for Kerberos security, do the following: a. In the Cloudera Manager database, set the merged_keytab value: PostgreSQL MySQL update roles set merged_keytab=null; update ROLES set MERGED_KEYTAB=NULL; b. Remove old hostname cluster service principals from the KDC database using one of the following: Use the delprinc command within kadmin.local interactive shell. From the command line: kadmin.local -q "listprincs" grep -E "(HTTP hbase hdfs hive httpfs hue impala mapred solr oozie yarn zookeeper)[^/]*/ [^/]*@" > cluster-princ.txt Open cluster-princ.txt and remove any non-cluster service principal entries within it. Make sure that the default krbtgt and other principals you created, or were created by Kerberos by default, are not removed by running the following: for i in `cat cluster-princ.txt`; do yes yes kadmin.local -q "delprinc $i"; done. c. Start the Cloudera Manager database and Cloudera Manager Server. d. Start the Cloudera Manager Agents on the newly renamed hosts. The Agents should show a current heartbeat in Cloudera Manager. e. Within the Cloudera Manager Admin Console recreate all the principals based on the new hostnames: a. Select Administration > Kerberos. Cloudera Manager Administration Guide 15

Managing the Cloudera Manager Server and Agents b. Do one of the following: If there are no principals listed, click the Generate Principals button. If there are principals listed, click the top checkbox to select all principals and click the Regenerate button. 9. If one of the hosts that was renamed has a NameNode configured with High Availability and automatic failover enabled, reconfigure the ZooKeeper failover controller znodes to reflect the new hostname. Warning: Do not perform this step if you are also running JobTracker in a High Availability configuration, as clearing the hadoop-ha znode will negatively impact JobTracker HA. All other services, and most importantly HDFS, should not be running. a. Start ZooKeeper services. Note: Make sure the ZooKeeper Failover Controller role is stopped within the HDFS service; start only the ZooKeeper Server role instances. b. On one of the hosts that has a ZooKeeper Server role, log into the Zookeeper CLI to delete the Nameservice znode: On a package-based installation zkcli.sh is found at: /usr/lib/zookeeper/bin/zkcli.sh On a parcel-based installation zkcli.sh is found at: $/opt/cloudera/parcels/cdh/lib/zookeeper/bin/zkcli.sh a. Verify that the HA znode exists: zkcli$ ls /hadoop-ha b. Delete the old znode: zkcli$ rmr /hadoop-ha/nameservice1 c. In the Cloudera Manager Admin Console, go to the HDFS service. d. Click the Instances tab. e. Select Actions > Initialize High Availability State in ZooKeeper... 10. For each of the Cloudera Management Service roles (Host Monitor, Service Monitor, Reports Manager, Activity Monitor, Navigator) go to their configuration and update the Database Hostname property. 11. Start all cluster services. 12. Start the Cloudera Management Service. 13. Deploy client configurations. Backing up Databases Cloudera recommends that you periodically back up the databases that Cloudera Manager uses to store configuration, monitoring, and reporting data and for managed services that require a database: Cloudera Manager - Contains all the information about what services you have configured, their role assignments, all configuration history, commands, users, and running processes. This is a relatively small database (<100 MB), and is the most important to back up. A monitoring database contains monitoring information about service and host status. In large clusters, this database can grow large. Activity Monitor - Contains information about past activities. In large clusters, this database can grow large. Reports Manager - Keeps track of disk utilization and processing activities over time. Medium-sized. Hive Metastore - Contains Hive metadata. Relatively small. Sentry Server - Contains authorization metadata. Relatively small. Cloudera Navigator Audit Server - Contains auditing information. In large clusters, this database can grow large. 16 Cloudera Manager Administration Guide

Backing Up PostgreSQL Databases The procedure for backing up a PostgreSQL database is the same whether you are using an embedded or external database: 1. Log in to the host where the Cloudera Manager Server is installed. 2. Run the following command as root: cat /etc/cloudera-scm-server/db.properties. The db.properties file contains: # Auto-generated by scm_prepare_database.sh # Mon Jul 27 22:36:36 PDT 2011 com.cloudera.cmf.db.type=postgresql com.cloudera.cmf.db.host=host:7432 com.cloudera.cmf.db.name=scm com.cloudera.cmf.db.user=scm com.cloudera.cmf.db.password=nnyfwijlbk 3. Run the following command as root using the parameters from the preceding step: # pg_dump -h host -p 7432 -U scm > /tmp/scm_server_db_backup.$(date +%Y%m%d) 4. Enter the password specified for the com.cloudera.cmf.db.password property on the last line of the db.properties file. If you are using the embedded database, Cloudera Manager generated the password for you during installation. If you are using an external database, enter the appropriate information for your database. Backing Up MySQL Databases To back up the MySQL database, run the mysqldump command on the MySQL host, as follows: $ mysqldump -hhostname -uusername -ppassword database > /tmp/database-backup.sql For example, to back up the Activity Monitor database amon on the local host as the root user, with the password amon_password: $ mysqldump -pamon_password amon > /tmp/amon-backup.sql Managing the Cloudera Manager Server and Agents To back up the sample Activity Monitor database amon on remote host myhost.example.com as the root user, with the password amon_password: $ mysqldump -hmyhost.example.com -uroot -pcloudera amon > /tmp/amon-backup.sql Backing Up Oracle Databases For Oracle, work with your database administrator to ensure databases are properly backed up. Cloudera Manager Administration Guide 17

Cloudera Management Service Cloudera Management Service The Cloudera Management Service implements various management features as a set of roles: Activity Monitor - collects information about activities run by the MapReduce service. This role is not added by default. Host Monitor - collects health and metric information about hosts Service Monitor - collects health and metric information about services and activity information from the YARN and Impala services Event Server - aggregates relevant Hadoop events and makes them available for alerting and searching Alert Publisher - generates and delivers alerts for certain types of events Reports Manager - generates reports that provide an historical view into disk utilization by user, user group, and directory, processing activities by user and YARN pool, and HBase tables and namespaces. This role is not added in Cloudera Express. Cloudera Manager manages each role separately, instead of as part of the Cloudera Manager Server, for scalability (for example, on large deployments it's useful to put the monitor roles on their own hosts) and isolation. In addition, for certain editions of the Cloudera Enterprise license, the Cloudera Management Service provides the Navigator Audit Server and Navigator Metadata Server roles for Cloudera Navigator. Displaying the Cloudera Management Service Status 1. Do one of the following: Select Clusters > Cloudera Management Service > Cloudera Management Service. On the Status tab of the Home page, in Cloudera Management Service table, click the Cloudera Management Service link. Starting the Cloudera Management Service Required Role: 1. Do one of the following: 1. Select Clusters > Cloudera Management Service > Cloudera Management Service. 2. Select Actions > Start. 1. On the Home page, click to the right of Cloudera Management Service and select Start. 2. Click Start to confirm. The Command Details window shows the progress of starting the roles. 3. When Command completed with n/n successful subcommands appears, the task is complete. Click Close. Stopping the Cloudera Management Service Required Role: 1. Do one of the following: 1. Select Clusters > Cloudera Management Service > Cloudera Management Service. 2. Select Actions > Stop. 1. On the Home page, click to the right of Cloudera Management Service and select Stop. 2. Click Stop to confirm. The Command Details window shows the progress of stopping the roles. Cloudera Manager Administration Guide 19

Cloudera Management Service 3. When Command completed with n/n successful subcommands appears, the task is complete. Click Close. Restarting the Cloudera Management Service Required Role: 1. Do one of the following: 1. Select Clusters > Cloudera Management Service > Cloudera Management Service. 2. Select Actions > Restart. 1. On the Home page, click to the right of Cloudera Management Service and select Restart. 2. Click Restart to confirm. The Command Details window shows the progress of stopping and then starting the roles. 3. When Command completed with n/n successful subcommands appears, the task is complete. Click Close. Configuring Management Service Database Limits Required Role: Each Cloudera Management Service role maintains a database for retaining the data it monitors. These databases (as well as the log files maintained by these services) can grow quite large. For example, the Activity Monitor maintains data at the service level, the activity level (MapReduce jobs and aggregate activities), and at the task attempt level. Limits on these data sets are configured when you create the management services, but you can modify these parameters through the Configuration settings in the Cloudera Manager Admin Console. For example, the Event Server lets you set a total number of events to store, and Activity Monitor gives you "purge" settings (also in hours) for the data it stores. There are also settings for the logs that these various services create. You can throttle how big the logs are allowed to get and how many previous logs to retain. 1. Do one of the following: a. Select Clusters > Cloudera Management Service > Cloudera Management Service. b. On the Status tab of the Home page, in Cloudera Management Service table, click the Cloudera Management Service link. 2. Click the Configuration tab. 3. In the left-hand column, select the Default role group for the role whose configurations you want to modify. 4. Edit the appropriate properties: Activity Monitor - the Purge or Expiration period properties are found in the top-level settings for the role. Host and Service Monitor - see Data Storage for Monitoring Data. Log Files - log file size settings will be under the Logs category under the role group. 5. Click Save Changes. Adding and Starting Cloudera Navigator Roles Required Role: 1. Do one of the following: a. Select Clusters > Cloudera Management Service > Cloudera Management Service. b. Select Actions > Restart. 2. Click the Instances tab. 20 Cloudera Manager Administration Guide

3. Click the Add Role Instances button. The Customize Role Assignments page displays. 4. Assign the Navigator role to a host. a. Customize the assignment of role instances to hosts. The wizard evaluates the hardware configurations of the hosts to determine the best hosts for each role. The wizard assigns all worker roles to the same set of hosts to which the HDFS DataNode role is assigned. These assignments are typically acceptable, but you can reassign role instances to hosts of your choosing, if desired. Click a field below a role to display a dialog containing a pageable list of hosts. If you click a field containing multiple hosts, you can also select All Hosts to assign the role to all hosts or Custom to display the pageable hosts dialog. The following shortcuts for specifying hostname patterns are supported: Range of hostnames (without the domain portion) Cloudera Management Service Range Definition 10.1.1.[1-4] host[1-3].company.com host[07-10].company.com Matching Hosts 10.1.1.1, 10.1.1.2, 10.1.1.3, 10.1.1.4 host1.company.com, host2.company.com, host3.company.com host07.company.com, host08.company.com, host09.company.com, host10.company.com IP addresses Rack name Click the View By Host button for an overview of the role assignment by hostname ranges. 5. When you are satisfied with the assignments, click Continue. The Database Setup page displays. 6. Configure database settings: a. Choose the database type: Leave the default setting of Use Embedded Database to have Cloudera Manager create and configure required databases. Make a note of the auto-generated passwords. Select Use Custom Databases to specify external databases. 1. Enter the database host, database type, database name, username, and password for the database that you created when you set up the database. b. Click Test Connection to confirm that Cloudera Manager can communicate with the database using the information you have supplied. If the test succeeds in all cases, click Continue; otherwise check and correct the information you have provided for the database and then try the test again. (For some servers, if you are using the embedded database, you will see a message saying the database will be created at a later step in the installation process.) The Review Changes page displays. 7. Review and accept any configuration changes (typically there are none). Click Accept. This returns you to the Instances page. 8. Check the checkboxes next to the Navigator Audit Server and Navigator Metadata Server roles. 9. Select Actions for Selected > Start and confirm Start in the pop-up. 10. Click Close. Cloudera Manager Administration Guide 21

Managing Users and Authentication Managing Users and Authentication This chapter covers managing user accounts, and configuring external authentication. Cloudera Manager User Accounts on page 23 Configuring External Authentication on page 25 Cloudera Manager User Accounts Required Role: Access to Cloudera Manager features is controlled by user accounts. A user account identifies how a user is authenticated and determines what privileges are granted to the user. When you are logged in to the Cloudera Manager Admin Console, the username you are logged in as is at the far right of the top navigation bar for example, if you are logged in as admin you will see. An user in the Administrator role manages user accounts through the Administration > Users page. User Authentication Cloudera Manager provides several mechanisms for authenticating users. You can configure Cloudera Manager to authenticate users against the Cloudera Manager database or against an external authentication service. The external authentication service can be an LDAP server (Active Directory or an OpenLDAP compatible directory), or you can specify another external service. Cloudera Manager also supports using the Security Assertion Markup Language (SAML) to enable single sign-on. If you are using LDAP or an external service you can configure Cloudera Manager so that it can use both methods of authentication (internal database and external service), and you can determine the order in which it performs these searches. If you select an external authentication mechanism, Administrator users can always authenticate against the Cloudera Manager database. This is to prevent locking everyone out if the authentication settings are misconfigured such as with a bad LDAP URL. With external authentication, you can restrict login access to members of specific groups, and can specify groups whose members are automatically given Administrator access to Cloudera Manager. Users accounts in the Cloudera Manager database page show Cloudera Manager in the User Type column. User accounts in an LDAP directory or other external authentication mechanism show External in the User Type column. User Roles A user's role determines the Cloudera Manager features visible to the user and the actions the user can perform. All the tasks in the Cloudera Manager documentation indicate which role is required to perform the task. Note: Currently there is no indication in the Cloudera Manager Admin Console of the role a logged in user is assigned to. To determine your role, contact a user that has the Administrator role. A user account can be assigned one of the following roles: Read-Only - Allows the user to view service and monitoring information but cannot add services or take any actions that affect the state of the cluster. Limited Operator - Allows the user to view service and monitoring information and decommission hosts (except hosts running Cloudera Management Service roles), but cannot add services or take any other actions that affect the state of the cluster. Cloudera Manager Administration Guide 23

Managing Users and Authentication Operator - Allows the user to view service and monitoring information, stop, start, and restart clusters, services, and roles (except the Cloudera Management Service and roles), decommission and recommission hosts (except hosts running Cloudera Management Service roles), and decommission and recommission roles (except Cloudera Management Service roles), but cannot add services, roles, or hosts, or take any other actions that affect the state of the cluster. Configurator - Allows the user to perform all Operator operations, configure services (except the Cloudera Management Service), enter and exit maintenance mode, and manage dashboards (including Cloudera Management Service dashboards). Administrator - Allows the user to add, change, delete, and configure services, roles, and hosts and administer user accounts. Even if you are using an external authentication mechanism for user authentication, users with Administrator privileges can log in to Cloudera Manager using their local Cloudera Manager username and password. (This prevents the system from locking everyone out if the external authentication settings get misconfigured.) The full set of roles are available with Cloudera Enterprise; Cloudera Express supports only the Read-Only and Administrator roles. Changing the Logged-In Internal User Password 1. Right-click the logged-in username at the far right of the top navigation bar and select Change Password. 2. Enter the current password, and a new password twice and then click Update. Adding an Internal User Account 1. Select Administration > Users. 2. Click the Add User button. 3. Enter a username and password. 4. In the Role drop-down, select a role for the new user. 5. Click Add. Assigning User Roles 1. Select Administration > Users. 2. Check the checkbox next to one or more usernames. 3. Select Actions for Selected > Assign User Roles. 4. In the drop-down, select the role. 5. Click the Assign Role button. Changing an Internal User Account Password 1. Select Administration > Users. 2. Click the Change Password button next to a username with User Type Cloudera Manager. 3. Type the new password and repeat it to confirm. 4. Click the Update button to make the change. Deleting Internal User Accounts 1. Select Administration > Users. 2. Check the checkbox next to one or more usernames with User Type Cloudera Manager. 3. Select Actions for Selected > Delete. 4. Click the OK button. (There is no confirmation of the action.) 24 Cloudera Manager Administration Guide

Managing Users and Authentication Configuring External Authentication Required Role: Important: This feature is available only with a Cloudera Enterprise license. For other licenses, the following applies: Cloudera Express - The feature is not available. Cloudera Enterprise Data Hub Edition Trial - The feature is available until you end the trial or the trial license expires. To obtain a license for Cloudera Enterprise, please fill in this form or call 866-843-7207. After you install a Cloudera Enterprise license, the feature will be available. Cloudera Manager supports user authentication against an internal database and against an external service. The following sections describe how to configure the supported external services. Configuring Authentication Using Active Directory 1. Select Administration > Settings. 2. In the left-hand column, select the External Authentication category. 3. In the Authentication Backend Order field, select the order in which Cloudera Manager should attempt its authentication. You can choose to authenticate users using just one of the methods (using Cloudera Manager's own database is the default), or you can set it so that if the user cannot be authenticated by the first method, it will attempt using the second method. 4. For External Authentication Type, select Active Directory. 5. In the LDAP URL property, provide the URL of the Active Directory server. 6. In the Active Directory NT Domain property, provide the NT domain to authenticate against. 7. In the LDAP User Groups property, optionally provide a comma-separated list of case-sensitive LDAP group names. If this list is provided, only users who are members of one or more of the groups in the list will be allowed to log into Cloudera Manager. If this property is left empty, all authenticated LDAP users will be able to log into Cloudera Manager. For example, if there is a group called CN=ClouderaManagerUsers,OU=Groups,DC=corp,DC=com, add the group name ClouderaManagerUsers to the LDAP User Groups list to allow members of that group to log in to Cloudera Manager. 8. To automatically assign a role to users when they log in, provide a comma-separated list of LDAP group names in the following properties: LDAP Administrator Groups LDAP Configurator Groups LDAP Operator Groups LDAP Limited Operator Groups If you specify groups in these properties, users must also be a member of at least one of the groups specified in the LDAP User Groups property or they will not be allowed to log in. If these properties are left empty, users will be assigned to the Read-Only role and any other role assignment must be performed manually by an Administrator. Configuring Authentication Using an OpenLDAP-compatible Server For an OpenLDAP-compatible directory, you have several options for searching for users and groups: You can specify a single base Distinguished Name (DN) and then provide a "Distinguished Name Pattern" to use to match a specific user in the LDAP directory. Search filter options let you search for a particular user based on somewhat broader search criteria for example Cloudera Manager users could be members of different groups or organizational units (OUs), so a Cloudera Manager Administration Guide 25

Managing Users and Authentication single pattern won't find all those users. Search filter options also let you find all the groups to which a user belongs, to help determine if that user should have login or admin access. 1. Select Administration > Settings. 2. In the left-hand column, select the External Authentication category. 3. In the Authentication Backend Order field, select the order in which Cloudera Manager should attempt its authentication. You can choose to authenticate users using just one of the methods (using Cloudera Manager's own database is the default), or you can set it so that if the user cannot be authenticated by the first method, it will attempt using the second method. 4. For External Authentication Type, select LDAP. 5. In the LDAP URL property, provide the URL of the LDAP server and (optionally) the base Distinguished Name (DN) (the search base) as part of the URL for example ldap://ldap-server.corp.com/dc=corp,dc=com. 6. If your server does not allow anonymous binding, provide the user DN and password to be used to bind to the directory. These are the LDAP Bind User Distinguished Name and LDAP Bind Password properties. By default, Cloudera Manager assumes anonymous binding. 7. To use a single "Distinguished Name Pattern", provide a pattern in the LDAP Distinguished Name Pattern property. Use {0} in the pattern to indicate where the username should go. For example, to search for a distinguished name where the uid attribute is the username, you might provide a pattern similar to uid={0},ou=people,dc=corp,dc=com. Cloudera Manager substitutes the name provided at login into this pattern and performs a search for that specific user. So if a user provides the username "foo" at the Cloudera Manager login page, Cloudera Manager will search for the DN uid=foo,ou=people,dc=corp,dc=com. If you provided a base DN along with the URL, the pattern only needs to specify the rest of the DN pattern. For example, if the URL you provide is ldap://ldap-server.corp.com/dc=corp,dc=com, and the pattern is uid={0},ou=people, then the search DN will be uid=foo,ou=people,dc=corp,dc=com. 8. You can also search using User and/or Group search filters, using the LDAP User Search Base, LDAP User Search Filter, LDAP Group Search Base and LDAP Group Search Filter settings. These allow you to combine a base DN with a search filter to allow a greater range of search targets. For example, if you want to authenticate users who may be in one of multiple OUs, the search filter mechanism will allow this. You can specify the User Search Base DN as dc=corp,dc=com and the user search filter as uid={0}. Then Cloudera Manager will search for the user anywhere in the tree starting from the Base DN. Suppose you have two OUs ou=engineering and ou=operations Cloudera Manager will find User "foo" if it exists in either of these OUs, that is, uid=foo,ou=engineering,dc=corp,dc=com or uid=foo,ou=operations,dc=corp,dc=com. You can use a user search filter along with a DN pattern, so that the search filter provides a fallback if the DN pattern search fails. The Groups filters let you search to determine if a DN or username is a member of a target group. In this case, the filter you provide can be something like member={0} where {0} will be replaced with the DN of the user you are authenticating. For a filter requiring the username, {1} may be used, as memberuid={1}. This will return a list of groups the user belongs to, which will be compared to the list in the group properties discussed in step 8 of Configuring Authentication Using Active Directory on page 25. Configuring Cloudera Manager to Use LDAPS If the LDAP server certificate has been signed by a trusted Certificate Authority (that is, VeriSign, GeoTrust, and so on), steps 1 and 2 below may not be necessary. 1. Copy the CA certificate file to the Cloudera Manager Server host. 2. Import the CA certificate(s) from the CA certificate file to the local truststore. The default truststore is located in the $JAVA_HOME/jre/lib/security/cacerts file. This contains the default CA information shipped with the JDK. Create an alternate default file called jssecacerts in the same location as the cacerts file. You can now safely append CA certificates for any private or public CAs not present in the default cacerts file, while keeping the original file intact. 26 Cloudera Manager Administration Guide