If you have come trying to find out why you can’t connect when you know you haven’t fat fingered your password, take heart, you aren’t going crazy. You likely used instructions in the following post to connect SQL Developer to…
Author: Steve
Deleting a service in ambari
Just a simple method to delete a service in Ambari using the REST API… [root@ambari2012 ~]# curl -u admin:admin -H “X-Requested-By: ambari” -X DELETE http://192.168.56.121:8080/api/v1/clusters/ambari2012/services/RANGER [root@ambari2012 ~]# curl -u admin:admin -H “X-Requested-By: ambari” -X DELETE http://192.168.56.121:8080/api/v1/clusters/ambari2012/services/RANGER { “status” :…
Troubleshooting oozie browser connection to secure cluster – Part 1
This is really a generic listing of using the spnego open source software to access a network service that requires authentication. In our case, it was useful to troubleshoot our inability to connect to the oozie web UI. We still…
Unable to download to any storage directory
We had an issue in which the secondary namenode was not checkpointing the edits file with updates from the primary namenode. In case you are unaware, the secondary namenode (not in an HA configuration) regularly transfers the edits file from…
How often does YARN purge locally cached resources?
If you are stretched for space locally, this may come in handy. By default, localized resources are purged every ten minutes… [root@cmhlddlkedat01 2.2.4.2-2]# grep -A1 yarn.nodemanager.localizer.cache.cleanup.interval-ms yarn-default.xml yarn.nodemanager.localizer.cache.cleanup.interval-ms 600000 [root@cmhlddlkedat01 2.2.4.2-2]# Of course, this can be overridden.
Phoenix to a secure HBase cluster
This is just a simple example of using a custom JDBC class to connect to an HBase cluster that is secured by kerberos. import java.sql.*; import java.util.*; public class phoenixTest { public static void main(String args[]) throws Exception { Connection…
Nastiness with Hive/ODBC
We ran into an issue that is not documented, although the hive user guide does indicate it should be set. Whenever we issued a statement with the Hive 64-bit ODBC driver through knox, the knox server would truncate anything after…
Examples of connecting to kerberos hive in JDBC
We had a need to authenticate user requests against AD in a kerberos enabled cluster, and allow “local” hive sessions to use only a keytab. Below are the examples of each. First, we show how to connect over a binary…
Credit card tokenization overview
You will often hear of online and in store retailers in which credit card numbers are stolen. This is often due to storing the card numbers locally in an encrypted status. As soon as a hacker obtains the encrypted value,…
Accessing Hive via DBVisualizer
Download the most recent free version of DB Visualizer from the following URL: http://www.dbvis.com/ Execute the downloaded file. If you see the following, it means you have either not installed java, or the installer can’t find where you installed it.…