Configuring high availability for Hue

To enable high availabilty for Hue, you must configure at least two Hue servers, each on a different host and a load balancer. For secure connections, enable TLS/SSL and install Kerberos. Configuring Hue for high availability includes configuring Hue, Hive, and Impala.

Prerequisites:

  • SSH network access to host machines with a Hue Server/Kerberos Ticker Renewer role.
  • External database configured for each Hue Server.
  1. Add Hue roles:

    Hue HA requires at least two Hue server roles and one Load Balancer role. If the cluster is authenticating with Keberos, you need one Kerberos Ticker Renewer on each host with a Hue Server.

    1. Log in to Cloudera Manager and go to the Hue service.
    2. Go to the Hue service and select Actions > Add Role Instances.
    3. Click Hue Server, assign to one or more hosts, and click OK > Continue.
    4. Click Kerberos Ticket Renewer, assign to each host with a Hue Server, and click OK > Continue.
    5. Click Load Balancer, assign to one or more hosts, and click OK > Continue.
    6. Check each role and select Actions for Selected > Start and click Start.
  2. Enable TLS for the Hue load balancer:
    1. Go to Hue > Configuration and search on TLS/SSL.
    2. Check Enable TLS/SSL for Hue for the Hue Server Default Group.
    3. Set other TLS/SSL properties appropriate for your setup. Some to consider are:
      • Hue Load Balancer Port - Apache Load Balancer listens on this port (default is 8889).
      • Path to TLS/SSL Certificate File - Must be multi-domain with CN = Load Balancer in PEM format.
      • Path to TLS/SSL Private Key File - Must be in PEM format.
    4. Click Save Changes and Restart Hue.