Known issues in Cloudera Manager 7.6.7
- OPSAPS-68452: Azul Open JDK 8 and 11 are not supported with
Cloudera Manager
-
Azul Open JDK 8 and 11 are not supported with Cloudera Manager. To use Azul Open JDK 8
or 11 for Cloudera Manager RPM/DEBs, you must manually create a symlink between the Zulu
JDK installation path and the default JDK path.
-
After installing Azul Open JDK8 or 11, you must run the following commands on all the
hosts in the cluster:
- Azul Open JDK 8
- RHEL or
SLES
# sudo ln -s /usr/lib/jvm/java-8-zulu-openjdk-jdk /usr/lib/jvm/java-8-openjdk
- Ubuntu or
Debian
# sudo ln -s /usr/lib/jvm/zulu-8-amd64 /usr/lib/jvm/java-8-openjdk
- Azul Open JDK 11
- For DEBs
only
# sudo ln -s /usr/lib/jvm/zulu-11-amd64 /usr/lib/jvm/java-11
- OPSAPS-65213: Ending the maintenance mode for a
commissioned host with either an Ozone DataNode role or a Kafka Broker role running on it,
might result in an error.
-
You may see the following error if you end the maintenance mode for Ozone and Kafka
services from Cloudera Manager when the roles are not decommissioned on the host.
Execute command Recommission and Start on service OZONE-1
Failed to execute command Recommission and Start on service OZONE-1
Recommission and Start
Command Recommission and Start is not currently available for execution.
-
To resolve this issue, use the API support feature to take
the host out of maintenance mode.
- Log into Cloudera Manager as an Administrator.
- Go to .
- Select the host for which you need to end the maintenance mode from the available
list and click the link to open the host details page.
- Copy the Host ID from the Details
section.
- Go to .
- Locate and click the
/hosts/{hostId}/commands/exitMaintenanceMode
endpoint for HostsResource API to view the API
parameters.
- Click Try it out.
- Enter the ID of your host in the hostId field.
- Click Execute.
- Verify that the maintenance mode status is cleared for the host by checking the
Server response code.
The operation is successful if the
API response code is 200.
If you need any guidance during this process, contact Cloudera support for further
assistance.
- OPSAPS-66021: Error message about an unsupported ciphersuite while
upgrading cluster with the latest FIPS compliance
-
When attempting to display the YARN Queue Manager interface, Cloudera Manager displays
the following error message:
HTTP ERROR 400 java.net.ConnectException: Unsupported ciphersuite
TLS_EDH_RSA_WITH_3DES_EDE_CBC_SHA
Ciphersuites supported by Query Manager and JVM are not matching with the ciphersuites
that are selected in Nmap, especially with ciphersuites that contain 3DES.
-
To avoid selecting ciphersuites that contains 3DES and to
address the exception:
- SSH into the Cloudera Manager server as a root user.
- In the /etc/default/cloudera-scm-server file, remove the
ciphers which contains 3DES from the
CMF_OVERRIDE_TLS_CIPHERS
line.
- You can uncomment and remove the ciphers which contains 3DES from the below
key-value pair
list:
#export CMF_OVERRIDE_TLS_CIPHERS="TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:TLS_DHE_RSA_WITH_AES_128_CBC_SHA:TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:TLS_DHE_RSA_WITH_AES_256_CBC_SHA:TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA:TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA:TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA:TLS_RSA_WITH_AES_128_GCM_SHA256:TLS_RSA_WITH_AES_256_GCM_SHA384:TLS_RSA_WITH_AES_128_CBC_SHA256:TLS_RSA_WITH_AES_256_CBC_SHA256:TLS_RSA_WITH_AES_128_CBC_SHA:TLS_RSA_WITH_AES_256_CBC_SHA:TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- The updated key-value pair list might display as
below:
export CMF_OVERRIDE_TLS_CIPHERS="TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:TLS_DHE_RSA_WITH_AES_128_CBC_SHA:TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:TLS_DHE_RSA_WITH_AES_256_CBC_SHA:TLS_RSA_WITH_AES_128_GCM_SHA256:TLS_RSA_WITH_AES_256_GCM_SHA384:TLS_RSA_WITH_AES_128_CBC_SHA256:TLS_RSA_WITH_AES_256_CBC_SHA256:TLS_RSA_WITH_AES_128_CBC_SHA:TLS_RSA_WITH_AES_256_CBC_SHA"
- Restart Cloudera Manager.
If you need any guidance during this process, contact Cloudera support.
- OPSAPS-66090: Error message while running
collect stack
traces (jstack)
command in an upgraded cluster
-
When running the collect stack traces (jstack)
command in an upgraded
cluster, Cloudera Manager displays the following error message:
Failed to execute jstack.
Run the Java jstack utility to capture Java thread stack
traces.
Process HDFS-DATANODE-jstack (id=251) on host
quasar-dasifj-1.quasar-dasifj.root.hwx.site (id=2) exited with 1 and expected
0
-
After you upgrade the cluster, restart the cluster. This
action should switch the re-parented processes to direct control and re-synchronization
process IDs to Cloudera Manager server.
If you need any guidance during this process, contact Cloudera support.
- OPSAPS-67152: Cloudera Manager does not allow you to update some
configuration parameters.
-
Cloudera Manager does not allow you to set to "0" for the
dfs_access_time_precision
and
dfs_namenode_accesstime_precision
configuration parameters.
You will not be able to update dfs_access_time_precision
and
dfs_namenode_accesstime_precision
to "0". If you try to enter "0" in
these configuration input fields, then the field gets cleared off and results in a
validation error: This field is required.
-
To fix this issue, perform the workaround steps as mentioned in the KB article.
If you need any guidance during this process, contact Cloudera support.
- OPSAPS-65104
- Replication Manager does not work as expected when you upgrade
from Cloudera Manager version 7.6.7 CHF2 to any Cloudera Manager version between 7.7.1 and
7.7.1 CHF13. If there were any Hive replication policies before the upgrade, Replication
Manager does not respond after the upgrade.
- If you are using Hive replication policies in Cloudera
Manager 7.6.7 CHF2 or higher versions, you must only upgrade to Cloudera Manager 7.7.1
CHF14 version or higher.