Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 26A54200BEE for ; Fri, 16 Dec 2016 20:00:21 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id 2579E160B4D; Fri, 16 Dec 2016 19:00:21 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 80055160B46 for ; Fri, 16 Dec 2016 20:00:19 +0100 (CET) Received: (qmail 31483 invoked by uid 500); 16 Dec 2016 19:00:18 -0000 Mailing-List: contact commits-help@ambari.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: ambari-dev@ambari.apache.org Delivered-To: mailing list commits@ambari.apache.org Received: (qmail 31283 invoked by uid 99); 16 Dec 2016 19:00:18 -0000 Received: from git1-us-west.apache.org (HELO git1-us-west.apache.org) (140.211.11.23) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 16 Dec 2016 19:00:18 +0000 Received: by git1-us-west.apache.org (ASF Mail Server at git1-us-west.apache.org, from userid 33) id 2FCB2F1699; Fri, 16 Dec 2016 19:00:18 +0000 (UTC) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: alejandro@apache.org To: commits@ambari.apache.org Date: Fri, 16 Dec 2016 19:00:38 -0000 Message-Id: <4ab9a892f29e4dd9a558fa84dd7f6da4@git.apache.org> In-Reply-To: References: X-Mailer: ASF-Git Admin Mailer Subject: [22/34] ambari git commit: AMBARI-19220. Fix version of HDFS and YARN used by HDP 3.0 (alejandro) archived-at: Fri, 16 Dec 2016 19:00:21 -0000 http://git-wip-us.apache.org/repos/asf/ambari/blob/7df6bba4/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-policymgr-ssl.xml ---------------------------------------------------------------------- diff --git a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-policymgr-ssl.xml b/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-policymgr-ssl.xml deleted file mode 100644 index de3fcd6..0000000 --- a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-policymgr-ssl.xml +++ /dev/null @@ -1,67 +0,0 @@ - - - - - - xasecure.policymgr.clientssl.keystore - {{stack_root}}/current/hadoop-client/conf/ranger-plugin-keystore.jks - Java Keystore files - - - - xasecure.policymgr.clientssl.keystore.password - myKeyFilePassword - PASSWORD - password for keystore - - password - - - - - xasecure.policymgr.clientssl.truststore - {{stack_root}}/current/hadoop-client/conf/ranger-plugin-truststore.jks - java truststore file - - - - xasecure.policymgr.clientssl.truststore.password - changeit - PASSWORD - java truststore password - - password - - - - - xasecure.policymgr.clientssl.keystore.credential.file - jceks://file{{credential_file}} - java keystore credential file - - - - xasecure.policymgr.clientssl.truststore.credential.file - jceks://file{{credential_file}} - java truststore credential file - - - http://git-wip-us.apache.org/repos/asf/ambari/blob/7df6bba4/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-security.xml ---------------------------------------------------------------------- diff --git a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-security.xml b/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-security.xml deleted file mode 100644 index 1b0a821..0000000 --- a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ranger-hdfs-security.xml +++ /dev/null @@ -1,65 +0,0 @@ - - - - - - ranger.plugin.hdfs.service.name - {{repo_name}} - Name of the Ranger service containing Hdfs policies - - - - ranger.plugin.hdfs.policy.source.impl - org.apache.ranger.admin.client.RangerAdminRESTClient - Class to retrieve policies from the source - - - - ranger.plugin.hdfs.policy.rest.url - {{policymgr_mgr_url}} - URL to Ranger Admin - - - - ranger.plugin.hdfs.policy.rest.ssl.config.file - /etc/hadoop/conf/ranger-policymgr-ssl.xml - Path to the file containing SSL details to contact Ranger Admin - - - - ranger.plugin.hdfs.policy.pollIntervalMs - 30000 - How often to poll for changes in policies? - - - - ranger.plugin.hdfs.policy.cache.dir - /etc/ranger/{{repo_name}}/policycache - Directory where Ranger policies are cached after successful retrieval from the source - - - - xasecure.add-hadoop-authorization - true - Enable/Disable the default hadoop authorization (based on rwxrwxrwx permission on the resource) if Ranger Authorization fails. - - - http://git-wip-us.apache.org/repos/asf/ambari/blob/7df6bba4/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-client.xml ---------------------------------------------------------------------- diff --git a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-client.xml b/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-client.xml deleted file mode 100644 index 6ec064a..0000000 --- a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-client.xml +++ /dev/null @@ -1,70 +0,0 @@ - - - - - - ssl.client.truststore.location - /etc/security/clientKeys/all.jks - Location of the trust store file. - - - - ssl.client.truststore.type - jks - Optional. Default value is "jks". - - - - ssl.client.truststore.password - bigdata - PASSWORD - Password to open the trust store file. - - password - - - - - ssl.client.truststore.reload.interval - 10000 - Truststore reload interval, in milliseconds. - - - - ssl.client.keystore.type - jks - Optional. Default value is "jks". - - - - ssl.client.keystore.location - /etc/security/clientKeys/keystore.jks - Location of the keystore file. - - - - ssl.client.keystore.password - bigdata - PASSWORD - Password to open the keystore file. - - password - - - - http://git-wip-us.apache.org/repos/asf/ambari/blob/7df6bba4/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-server.xml ---------------------------------------------------------------------- diff --git a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-server.xml b/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-server.xml deleted file mode 100644 index 5d2745f..0000000 --- a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/configuration/ssl-server.xml +++ /dev/null @@ -1,80 +0,0 @@ - - - - - - ssl.server.truststore.location - /etc/security/serverKeys/all.jks - Location of the trust store file. - - - - ssl.server.truststore.type - jks - Optional. Default value is "jks". - - - - ssl.server.truststore.password - bigdata - PASSWORD - Password to open the trust store file. - - password - - - - - ssl.server.truststore.reload.interval - 10000 - Truststore reload interval, in milliseconds. - - - - ssl.server.keystore.type - jks - Optional. Default value is "jks". - - - - ssl.server.keystore.location - /etc/security/serverKeys/keystore.jks - Location of the keystore file. - - - - ssl.server.keystore.password - bigdata - PASSWORD - Password to open the keystore file. - - password - - - - - ssl.server.keystore.keypassword - bigdata - PASSWORD - Password for private key in keystore file. - - password - - - - http://git-wip-us.apache.org/repos/asf/ambari/blob/7df6bba4/ambari-server/src/main/resources/common-services/HDFS/3.0.0/kerberos.json ---------------------------------------------------------------------- diff --git a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/kerberos.json b/ambari-server/src/main/resources/common-services/HDFS/3.0.0/kerberos.json deleted file mode 100644 index 1dd801b..0000000 --- a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/kerberos.json +++ /dev/null @@ -1,246 +0,0 @@ -{ - "services": [ - { - "name": "HDFS", - "identities": [ - { - "name": "/spnego", - "principal": { - "configuration": "hdfs-site/dfs.web.authentication.kerberos.principal" - }, - "keytab": { - "configuration": "hdfs-site/dfs.web.authentication.kerberos.keytab" - } - }, - { - "name": "/smokeuser" - } - ], - "auth_to_local_properties" : [ - "core-site/hadoop.security.auth_to_local" - ], - "configurations": [ - { - "core-site": { - "hadoop.security.authentication": "kerberos", - "hadoop.security.authorization": "true", - "hadoop.proxyuser.HTTP.groups": "${hadoop-env/proxyuser_group}" - } - }, - { - "ranger-hdfs-audit": { - "xasecure.audit.jaas.Client.loginModuleName": "com.sun.security.auth.module.Krb5LoginModule", - "xasecure.audit.jaas.Client.loginModuleControlFlag": "required", - "xasecure.audit.jaas.Client.option.useKeyTab": "true", - "xasecure.audit.jaas.Client.option.storeKey": "false", - "xasecure.audit.jaas.Client.option.serviceName": "solr", - "xasecure.audit.destination.solr.force.use.inmemory.jaas.config": "true" - } - } - ], - "components": [ - { - "name": "HDFS_CLIENT", - "identities": [ - { - "name": "/HDFS/NAMENODE/hdfs" - } - ] - }, - { - "name": "NAMENODE", - "identities": [ - { - "name": "hdfs", - "principal": { - "value": "${hadoop-env/hdfs_user}-${cluster_name|toLower()}@${realm}", - "type" : "user" , - "configuration": "hadoop-env/hdfs_principal_name", - "local_username" : "${hadoop-env/hdfs_user}" - }, - "keytab": { - "file": "${keytab_dir}/hdfs.headless.keytab", - "owner": { - "name": "${hadoop-env/hdfs_user}", - "access": "r" - }, - "group": { - "name": "${cluster-env/user_group}", - "access": "" - }, - "configuration": "hadoop-env/hdfs_user_keytab" - } - }, - { - "name": "namenode_nn", - "principal": { - "value": "nn/_HOST@${realm}", - "type" : "service", - "configuration": "hdfs-site/dfs.namenode.kerberos.principal", - "local_username" : "${hadoop-env/hdfs_user}" - }, - "keytab": { - "file": "${keytab_dir}/nn.service.keytab", - "owner": { - "name": "${hadoop-env/hdfs_user}", - "access": "r" - }, - "group": { - "name": "${cluster-env/user_group}", - "access": "" - }, - "configuration": "hdfs-site/dfs.namenode.keytab.file" - } - }, - { - "name": "/spnego", - "principal": { - "configuration": "hdfs-site/dfs.namenode.kerberos.internal.spnego.principal" - } - }, - { - "name": "/HDFS/NAMENODE/namenode_nn", - "principal": { - "configuration": "ranger-hdfs-audit/xasecure.audit.jaas.Client.option.principal" - }, - "keytab": { - "configuration": "ranger-hdfs-audit/xasecure.audit.jaas.Client.option.keyTab" - } - } - ], - "configurations": [ - { - "hdfs-site": { - "dfs.block.access.token.enable": "true" - } - } - ] - }, - { - "name": "DATANODE", - "identities": [ - { - "name": "datanode_dn", - "principal": { - "value": "dn/_HOST@${realm}", - "type" : "service", - "configuration": "hdfs-site/dfs.datanode.kerberos.principal", - "local_username" : "${hadoop-env/hdfs_user}" - }, - "keytab": { - "file": "${keytab_dir}/dn.service.keytab", - "owner": { - "name": "${hadoop-env/hdfs_user}", - "access": "r" - }, - "group": { - "name": "${cluster-env/user_group}", - "access": "" - }, - "configuration": "hdfs-site/dfs.datanode.keytab.file" - } - } - ], - "configurations" : [ - { - "hdfs-site" : { - "dfs.datanode.address" : "0.0.0.0:1019", - "dfs.datanode.http.address": "0.0.0.0:1022" - } - } - ] - }, - { - "name": "SECONDARY_NAMENODE", - "identities": [ - { - "name": "secondary_namenode_nn", - "principal": { - "value": "nn/_HOST@${realm}", - "type" : "service", - "configuration": "hdfs-site/dfs.secondary.namenode.kerberos.principal", - "local_username" : "${hadoop-env/hdfs_user}" - }, - "keytab": { - "file": "${keytab_dir}/nn.service.keytab", - "owner": { - "name": "${hadoop-env/hdfs_user}", - "access": "r" - }, - "group": { - "name": "${cluster-env/user_group}", - "access": "" - }, - "configuration": "hdfs-site/dfs.secondary.namenode.keytab.file" - } - }, - { - "name": "/spnego", - "principal": { - "configuration": "hdfs-site/dfs.secondary.namenode.kerberos.internal.spnego.principal" - } - } - ] - }, - { - "name": "NFS_GATEWAY", - "identities": [ - { - "name": "nfsgateway", - "principal": { - "value": "nfs/_HOST@${realm}", - "type" : "service", - "configuration": "hdfs-site/nfs.kerberos.principal", - "local_username" : "${hadoop-env/hdfs_user}" - }, - "keytab": { - "file": "${keytab_dir}/nfs.service.keytab", - "owner": { - "name": "${hadoop-env/hdfs_user}", - "access": "r" - }, - "group": { - "name": "${cluster-env/user_group}", - "access": "" - }, - "configuration": "hdfs-site/nfs.keytab.file" - } - } - ] - }, - { - "name": "JOURNALNODE", - "identities": [ - { - "name": "journalnode_jn", - "principal": { - "value": "jn/_HOST@${realm}", - "type" : "service", - "configuration": "hdfs-site/dfs.journalnode.kerberos.principal", - "local_username" : "${hadoop-env/hdfs_user}" - }, - "keytab": { - "file": "${keytab_dir}/jn.service.keytab", - "owner": { - "name": "${hadoop-env/hdfs_user}", - "access": "r" - }, - "group": { - "name": "${cluster-env/user_group}", - "access": "" - }, - "configuration": "hdfs-site/dfs.journalnode.keytab.file" - } - }, - { - "name": "/spnego", - "principal": { - "configuration": "hdfs-site/dfs.journalnode.kerberos.internal.spnego.principal" - } - } - ] - } - ] - } - ] -} http://git-wip-us.apache.org/repos/asf/ambari/blob/7df6bba4/ambari-server/src/main/resources/common-services/HDFS/3.0.0/metainfo.xml ---------------------------------------------------------------------- diff --git a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/metainfo.xml b/ambari-server/src/main/resources/common-services/HDFS/3.0.0/metainfo.xml deleted file mode 100644 index 01ab22f..0000000 --- a/ambari-server/src/main/resources/common-services/HDFS/3.0.0/metainfo.xml +++ /dev/null @@ -1,405 +0,0 @@ - - - - 2.0 - - - HDFS - HDFS - Apache Hadoop Distributed File System - 3.0.0 - - - - NAMENODE - NameNode - MASTER - 1-2 - true - true - - - HDFS/ZKFC - host - - false - - - - hdfs-site - dfs.nameservices - - - - - ZOOKEEPER/ZOOKEEPER_SERVER - host - - false - - - - hdfs-site - dfs.nameservices - - - - - HDFS/JOURNALNODE - host - - false - - - - hdfs-site - dfs.nameservices - - - - - - - PYTHON - 1800 - - - - hdfs_namenode - true - - - hdfs_audit - - - - - DECOMMISSION - - - PYTHON - 600 - - - - REBALANCEHDFS - true - - - PYTHON - - - - - - - DATANODE - DataNode - SLAVE - 1+ - true - true - - - PYTHON - 1200 - - - DataNodes - - NAMENODE - - - - hdfs_datanode - true - - - - - - SECONDARY_NAMENODE - SNameNode - - 1 - true - true - MASTER - - - PYTHON - 1200 - - - - hdfs_secondarynamenode - true - - - - - - HDFS_CLIENT - HDFS Client - CLIENT - 1+ - true - - - PYTHON - 1200 - - - - xml - hdfs-site.xml - hdfs-site - - - xml - core-site.xml - core-site - - - env - log4j.properties - hdfs-log4j,yarn-log4j - - - env - hadoop-env.sh - hadoop-env - - - - - - JOURNALNODE - JournalNode - SLAVE - 0+ - true - - - PYTHON - 1200 - - - - hdfs_journalnode - true - - - - - HDFS/HDFS_CLIENT - host - - true - - - - - - - ZKFC - ZKFailoverController - SLAVE - - 0+ - true - - - PYTHON - 1200 - - - - hdfs_zkfc - true - - - - - - NFS_GATEWAY - NFSGateway - 0+ - true - SLAVE - - - PYTHON - 1200 - - - - HDFS/HDFS_CLIENT - host - - true - - - - - - - - - any - - - hadoop - - - hadoop-lzo - true - should_install_lzo - - - - - - amazon2015,redhat6,redhat7,suse11 - - - hadoop-client - - - snappy - - - snappy-devel - - - lzo - true - should_install_lzo - - - hadoop-lzo-native - true - should_install_lzo - - - hadoop-libhdfs - - - - - - suse12 - - - hadoop-client - - - snappy - - - snappy-devel - - - liblzo2-2 - true - should_install_lzo - - - hadoop-lzo-native - true - should_install_lzo - - - hadoop-libhdfs - - - - - - debian7,ubuntu12,ubuntu14,ubuntu16 - - - hadoop-client - - - libsnappy1 - - - libsnappy-dev - - - liblzo2-2 - true - should_install_lzo - - - hadoop-hdfs - - - libhdfs0 - - - libhdfs0-dev - - - - - - - - PYTHON - 300 - - - - ZOOKEEPER - - - - core-site - hdfs-site - hadoop-env - hadoop-policy - hdfs-log4j - ranger-hdfs-plugin-properties - ssl-client - ssl-server - ranger-hdfs-audit - ranger-hdfs-policymgr-ssl - ranger-hdfs-security - ams-ssl-client - hadoop-metrics2.properties - - true - - - - quicklinks.json - true - - - - - - theme.json - true - - - - -