5. Prepare the Environment

To deploy your HDP instance, you need to prepare your deploy environment:

 5.1. Enable NTP on the Cluster

The clocks of all the nodes in your cluster must be able to synchronize with each other. If your system does not have access to the Internet, set up a master node as an NTP xserver. Use the following instructions to enable NTP for your cluster:

  1. Configure NTP clients. Execute the following command on all the nodes in your cluster:

    • For RHEL/CentOS/Oracle Linux:

      yum install ntp
    • For SLES:

      zypper install ntp

  2. Enable the service. Execute the following command on all the nodes in your cluster:

    chkconfig ntpd on
  3. Start the NTP. Execute the following command on all the nodes in your cluster:

    /etc/init.d/ntpd start
  4. You can use the existing NTP server in your environment. Configure the firewall on the local NTP server to enable UDP input traffic on port 123 and replace 192.168.1.0/24 with the ip addresses in the cluster. See the following sample rule:

    # iptables -A RH-Firewall-1-INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 123 -j ACCEPT

    Restart iptables. Execute the following command on all the nodes in your cluster:

    # iptables service iptables restart

    Configure clients to use the local NTP server. Edit the /etc/ntp.conf and add the following line:

    server $LOCAL_SERVER_IP OR HOSTNAME

 5.2. Check DNS

All hosts in your system must be configured for DNS and Reverse DNS.

[Note]Note

If you are unable to configure DNS and Reverse DNS, you must edit the hosts file on every host in your cluster to contain each of your hosts.

Use the following instructions to check DNS for all the host machines in your cluster:

  1. Forward lookup checking.

    For example, for domain localdomain that contains host with name host01 and IP address 192.168.0.10, execute the following command:

    nslookup host01

    You should see a message similar to the following:

    Name:	host01.localdomain
    Address: 192.168.0.10

  2. Reverse lookup checking.

    For example, for domain localdomain that contains host with name host01 and IP address 192.168.0.10, execute the following command:

    nslookup 192.168.0.10

    You should see a message similar to the following:

     10.0.168.192.in-addr.arpa	name = host01.localdomain.

If you do not receive valid responses (as shown above), set up a DNS zone in your cluster or configure host files on each host of the cluster using one of the following options:

  • Option I: Configure hosts file on each node of the cluster.

    For all nodes of cluster, add to the /etc/hosts file key-value pairs like the following:

    192.168.0.11	host01

  • Option II: Configuring DNS using BIND nameserver.

    The following instructions, use the example values given below:

    Example values:
    domain name: “localdomain”
    nameserver: “host01”/192.168.0.11
    hosts: “host02”/192.168.0.12, “host02”/192.168.0.12

    1. Install BIND packages:

      yum install bind
      yum install bind-libs
      yum install bind-utils
    2. Initiate service

      chkconfig named on
    3. Configure files. Add the following lines for the example values given above (ensure that you modify these for your environment) :

      • Edit the /etc/resolv.conf (for all nodes in cluster) and add the following lines:

        domain localdomain
        search localdomain
        nameserver 192.168.0.11
      • Edit the /etc/named.conf (for all nodes in cluster) and add the following lines:

        listen-on port 53 { any; };//by default it is opened only for localhost
         ...
        zone "localdomain" {
         type master;
         notify no;
         allow-query { any; };
         file "named-forw.zone";
         };
         zone "0.168.192.in-addr.arpa" {
          type master;
          notify no;
          allow-query { any; };
          file "named-rev.zone";
        };
                        

      • Edit the named-forw.zone as shown in the following sample forward zone configuration file:

         $TTL 3D
         @	SOA   host01.localdomain.root.localdomain (201306030;3600;3600;3600;3600)
         NS	host01            ; Nameserver Address
         localhost	IN	A	127.0.0.1
         host01		IN	A	192.168.0.11
         host02		IN	A	192.168.0.12
         host03		IN	A	192.168.0.13

      • Edit the named-rev.zone as shown in the following sample reverse zone configuration file:

         $TTL 3D
         @	SOA	host01.localdomain.root.localdomain. (201306031;28800;2H;4W;1D);
         NS	host01.localdomain.; Nameserver Address
         11	IN	PTR	host01.localdomain.
         12	IN	PTR	host02.localdomain.
         13	IN	PTR	host03.localdomain.

    4. Restart bind service.

      /etc/init.d/named restart

    5. Add rules to firewall.

       iptables -A INPUT -p udp -m state --state NEW --dport 53 -j ACCEPT
       iptables -A INPUT -p tcp -m state --state NEW --dport 53 -j ACCEPT
       service iptables save
       service iptables restart

      Alternatively, you can also allow traffic over DNS port (53) using system-config-firewall utility.

 5.3. Disable SELinux

Security-Enhanced (SE) Linux feature should be disabled during installation process.

  1. Check state of SELinux. On all the host machines, execute the following command:

    getenforce

    If the result is permissive or disabled, no further actions are required, else proceed to step 2.

  2. Disable SELinux either temporarily for each session or permanently.

    • Option I: Disable SELinux temporarily by executing the following command:

      setenforce 0

    • Option II: Disable SELinux permanently in the /etc/sysconfig/selinux file by changing the value of SELINUX field to permissive or disabled. Restart your system.

 5.4. Disable IPTables

For HDP to communicate during setup with the hosts it deploys to and manages, certain ports must be open and available. The easiest way to do this is to temporarily disable iptables.

On all the RHEL/CentOS host machines, execute the following command to disable iptables:

chkconfig iptables off
/etc/init.d/iptables stop

If the security protocols at your installation do not allow you to disable iptables, you can proceed with them on, as long as all of the relevant ports are open and available. If you plan to run with them enabled, see Configuring Ports for more information on the necessary ports per component.


loading table of contents...