Known Issues in Cloudera Manager 7.1.3
- Cloudera bug OPSAPS-57524: Extra Installation step required for Ubuntu 18 with Ranger and Kudu
- If you are installing Cloudera Manager on Ubuntu, and are planning
to add the Kudu service to the cluster and are planning to enable
Apache Ranger, run the following command on all cluster hosts
before installing Cloudera Manager:
If you know in advance which hosts will be running the Kudu service roles, you only need to run this command on those hosts.sudo apt-get install gettext-base
- Cloudera bug: CDPD-15937: Ubuntu 18 Support
- Schema Registry is not supported when using Ubuntu 18.
- CDPD-13222: Apache Ranger Setup fails on existing cluster
- If Apache Ranger was not added to the cluster during its initial
creation you must use the following manual steps to add Apache Ranger:
- Log in to the Cloudera Manager Admin Console.
- Add a new Solr service.
- Set the value of the Solr configuration parameter ZooKeeper ZNode to solr-infra.
- Add the Apache Ranger service. When prompted, select the newly-created Solr service.
See Adding a Service.
- Cloudera bug: OPSAPS-58277 Cloudera Manager Upgrade Fails on Ubuntu 18
- On Ubuntu 18 only, if CDH daemon process are running, upgrading Cloudera Manager from version 7.1.4 or below, or from version 6.3.4 or below, will fail with a Segmentation fault. You must stop all clusters before upgrading Cloudera Manager 7.1.x .
- OPSAPS-65189: Accessing Cloudera Manager through Knox displays the following error:
Bad Message 431 reason: Request Header Fields Too Large
Workaround: Modify the Cloudera Manager Server configuration /etc/default/cloudera-scm-server file to increase the header size from 8 KB, which is the default value, to 65 KB in the Java options as shown below:export CMF_JAVA_OPTS="...existing options... -Dcom.cloudera.server.cmf.WebServerImpl.HTTP_HEADER_SIZE_BYTES=65536 -Dcom.cloudera.server.cmf.WebServerImpl.HTTPS_HEADER_SIZE_BYTES=65536"
- TSB-431: Cloudera Manager 6.x issue with the service role Resume
- If a selected service role on a node is restarted and fails, and the customer clicks the "Resume" button in Cloudera Manager, the service role on all of the nodes will be restarted concurrently.
- OPSAPS-54299 – Installing Hive on Tez and HMS in the incorrect order causes HiveServer failure
- You need to install Hive on Tez and HMS in the correct order; otherwise, HiveServer fails. You need to install additional HiveServer roles to Hive on Tez, not the Hive service; otherwise, HiveServer fails. See Installing Hive on Tez for the correct procedures.
Technical Service Bulletins
- TSB 2021-488: Cloudera Manager is vulnerable to Cross-Site-Scripting attack
- Cloudera Manager may be vulnerable to Cross-Site-Scripting vulnerabilities identified by CVE-2021-29243 and CVE-2021-32482. A remote attacker can exploit this vulnerability and execute malicious code in the affected application.
- CVE
-
- CVE-2021-29243
- CVE-2021-32482
- Impact
- This is an XSS issue. An administrator could be tricked to click on a link that may expose certain information such as session cookies.
- Action required
-
-
- Upgrade (recommended)
- Upgrade to a version containing the fix.
-
- Workaround
- None
-
- Knowledge article
- For the latest update on this issue see the corresponding Knowledge article:
- TSB 2021-530: Local File Inclusion (LFI) Vulnerability in Navigator
- After successful user authentication to the Navigator Metadata Server and enabling dev mode of Navigator Metadata Server, local file inclusion can be performed through the Navigator’s embedded Solr web UI. All files can be accessed for reading which can be opened as cloudera-scm OS user. This is related to Apache Solr CVE-2020-13941.
- Impact
-
- Attackers can read files on the Navigator Metadata Server host with the OS user privileges running the Navigator Metadata Server.
- How to confirm the vulnerability
- Open
https://<navigator_host>:<navigator_port>/debug
Please check for Dev-mode status. To make the exploit work, dev-mode must be enabled. Please note that restarting the NMS automatically disables dev-mode.
- Open
- Action required
-
-
- Upgrade (recommended)
-
- Upgrade to Cloudera Manager 7.4.4 or higher
- Please contact Cloudera Support for patched version of Cloudera Manager 6.3.4
-
- Workaround
-
- For Cloudera Manager 6.x:
- Login to the Navigator Metadata Server host and edit these files:
/opt/cloudera/cm/cloudera-navigator-server/search-schema/solr/2900/nav_elements/conf/solrconfig.xml /opt/cloudera/cm/cloudera-navigator-server/search-schema/solr/2900/nav_relations/conf/solrconfig.xml
- Remove the entry:
<requestHandler name="/replication" class="solr.ReplicationHandler" startup="lazy" />
- Login to the Navigator Metadata Server host and edit these files:
- For Cloudera Manager 5.x:
- Login to the Navigator Metadata Server host and edit these files:
/usr/share/cmf/cloudera-navigator-server/search-schema/solr/2900/nav_elements/conf/solrconfig.xml /usr/share/cmf/cloudera-navigator-server/search-schema/solr/2900/nav_relations/conf/solrconfig.xml
- Remove the
entry:
<requestHandler name="/replication" class="solr.ReplicationHandler" startup="lazy" />
- Login to the Navigator Metadata Server host and edit these files:
- Restart Navigator Metadata Server
- This is a temporary solution and has to be followed-up with the recommended long term solution below.
- For Cloudera Manager 6.x:
-
- Knowledge article
- For the latest update on this issue see the corresponding Knowledge article:
TSB 2021-530: CVE-2021-30131 - Local File Inclusion (LFI) Vulnerability in Navigator