Prerequisites and exceptions for the example configuration
Review the prerequisites and exceptions before adding the example configuration to the sudoers file.
As a root user, you must create the repository file on the Cloudera Manager
Server. For instance, as a root user you can create the
/etc/yum.repos.d/cloudera-manager.repofile with the following content:
[cloudera-manager] name=Cloudera Manager 7.x.0 baseurl=https://archive.cloudera.com/p/cm6/7.x.0/redhat7/yum/ gpgkey=https://archive.cloudera.com/p/cm6/7.x.0/redhat7/yum/RPM-GPG-KEY-cloudera gpgcheck=1 enabled=1 autorefresh=0 type=rpm-md
To enable Auto-TLS, use the Cloudera Manager user interface:
- Administration > Security > Enable Auto-TLS wizard
- For information on how to generate an internal CA and corresponding certificates, see Use case 1: Use CM to generate an internal CA and corresponding certificates
To install the postgreSQL as the Cloudera Manager Database, the root
user must run the following commands for the user1:
i) user1@cmsudo-1 ~]$ echo 'LC_ALL="en_US.UTF-8"' >> /etc/locale.conf -bash: /etc/locale.conf file ii) sudo su -l postgres -c "postgresql-setup initdb"
To enable MD5 authentication, user1 must have root permission:
pg_hba.conf, which is usually found in
/var/lib/pgsql/data or /etc/postgresql/<version>/main. For more information, see step 2, Enable MD5 authentication.
- To install the postgreSQL as the Cloudera Manager Database, the root user must run the following commands for the user1:
- To install Ranger on any host and configure PostgreSQL database for Ranger, you need a new sudoers command list. For more information, see Configuring a PostgreSQL Database for Ranger or Ranger KMS
- For the KDC setup, you must manage the krb5.conf file through Cloudera Manager user interface. For more information, see Enable Kerberos using the wizard
Cloudera Manager Upgrade:
To set up the Cloudera Manager repository, user1 must have write access to the repository file. For more information, see Upgrading the Cloudera Manager Server
If you are setting up a KTS cluster, do the following as root user:
You must obtain root access to install a file under “/etc/systemd/system/”
as a prerequisite for installing rng-tools
package. After installing the “rng-tools” package, user1 will require root user to run the following commands:
i) cp /usr/lib/systemd/system/rngd.service /etc/systemd/system/ ii) sed -i -e 's/ExecStart=\ /sbin/rngd -f /ExecStart=\ /sbin\ /rngd -f -r \ / dev \ / urandom/'/etc/systemd/system/rngd.service
- You must obtain root access to install a file under “/etc/systemd/system/” as a prerequisite for installing rng-tools package. After installing the “rng-tools” package, user1 will require root user to run the following commands:
Run the rsync command to copy the Key Trustee Server keys.
rsync -zav --exclude .ssl /var/lib/keytrustee/ .keytrustee cmsudo-6.vpc.cloudera.com:/var/lib/keytrustee/