You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Hadoop QA (JIRA)" <ji...@apache.org> on 2016/04/08 08:40:25 UTC

[jira] [Commented] (AMBARI-15770) HAWQ fails to connect to YARN in HA+SEC mode

    [ https://issues.apache.org/jira/browse/AMBARI-15770?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15231724#comment-15231724 ] 

Hadoop QA commented on AMBARI-15770:
------------------------------------

{color:green}+1 overall{color}.  Here are the results of testing the latest attachment 
  http://issues.apache.org/jira/secure/attachment/12797635/AMBARI-15770.branch22.patch
  against trunk revision .

    {color:green}+1 @author{color}.  The patch does not contain any @author tags.

    {color:green}+1 tests included{color}.  The patch appears to include 3 new or modified test files.

    {color:green}+1 javac{color}.  The applied patch does not increase the total number of javac compiler warnings.

    {color:green}+1 release audit{color}.  The applied patch does not increase the total number of release audit warnings.

    {color:green}+1 core tests{color}.  The patch passed unit tests in ambari-server.

Test results: https://builds.apache.org/job/Ambari-trunk-test-patch/6303//testReport/
Console output: https://builds.apache.org/job/Ambari-trunk-test-patch/6303//console

This message is automatically generated.

> HAWQ fails to connect to YARN in HA+SEC mode
> --------------------------------------------
>
>                 Key: AMBARI-15770
>                 URL: https://issues.apache.org/jira/browse/AMBARI-15770
>             Project: Ambari
>          Issue Type: Bug
>            Reporter: Alexander Denissov
>            Assignee: Alexander Denissov
>             Fix For: 2.2.2
>
>         Attachments: AMBARI-15770.branch22.patch
>
>
> When HAWQ is in the cluster with YARN HA and Kerberos enabled, the segments are down as they cannot connect to YARN RM.
> The following updates are required:
> 1. add hadoop.security.authentication = kerberos in yarn-client.xml
> 2. add 2 properties to core-site.xml:
> <property>
>    <name>hadoop.proxyuser.postgres.hosts</name>
>    <value>*</value>
> </property>
> <property>
>    <name>hadoop.proxyuser.postgres.groups</name>
>    <value>hadoop</value>
> </property>
> 3. on every node:
> sudo useradd postgres
> sudo usermod -a -G hadoop postgres



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)