What's New in Cloudera Manager 7.11.3 Cumulative hotfix 7 (CDP Private Cloud Base 7.1.9 SP1)

You must be aware of the major enhancements or changes and additions or corrections for the Cloudera Manager 7.11.3 Cumulative hotfix 7 release. Learn how the new improvements benefit you.

New features

Kerberos (MIT and AD) authentication support for MariaDB

Adding Kerberos (MIT and AD) authentication support for MariaDB on Cloudera Manager clusters (includes TLS 1.2 and non-TLS 1.2 clusters). Kerberos is a network authentication protocol that provides security for your cluster.

Now you can enable Kerberos authentication on MariaDB Database Server in the database environment. See Enabling Kerberos (MIT and AD) autentication for MariaDB Database Server.

Adding Python 3.10 support on Ubuntu 22.04, SLES 15 SP4, and SLES 15 SP5

Adding Python 3.10 support on Ubuntu 22.04, SLES 15 SP4, and SLES 15 SP5 from Cloudera Manager 7.11.3 CHF7 release.

You must install Python 3.10 for SLES 15 SP4 and SLES 15 SP5 on all hosts before upgrading to Cloudera Manager 7.11.3 CHF7. See Installing Python 3.

For more information about the operating systems that are supported when using Python 3.x with the Cloudera Manager Agents, see Python support for Cloudera Manager 7.11.3 CHF7.

Replicate Atlas metadata and data lineage using replication policies in Replication Manager (technical preview)
You can use one of the following methods to replicate Atlas metadata and data lineage for Hive external tables and Iceberg tables:
  • Choose Replicate Atlas Metadata on the General tab during the Hive external table replication policy creation or edit process to replicate the metadata and data lineage associated with the chosen Hive external tables.
  • Choose Replicate Atlas Metadata on the General tab during the Iceberg replication policy creation or edit process to replicate the metadata and data lineage associated with the chosen Iceberg tables.
  • Create Atlas replication policy to replicate the metadata and data lineage of all the Hive external tables, Iceberg tables, and any other Atlas supported entities in the source cluster to the target cluster.
This is a technical preview feature. It is not recommended for production deployments. Cloudera recommends that you try this feature in development or test environments. To enable this feature, contact your Cloudera account team.
For more information, see Atlas replication policies.
Iceberg replication policy enhancements
During the Iceberg replication policy creation process you can:
  • replicate Iceberg tables residing in a custom directory using the General > Alternate target data root option.
  • enter a username to run the MapReduce job other than the hdfs user using the General > Run as Username option.
  • choose to copy the table column statistics associated with the chosen Iceberg tables using the General > Replicate Table Column Statistics option.
  • configure the following options on the Advanced tab:
    • Choose Use Batch Size, and then enter the maximum number of snapshots to process for an export batch.
    • Add one or more key-value pairs for the following properties:
      • Advanced Configuration Snippet (Safety Valve) for source hdfs-site.xml
      • Advanced Configuration Snippet (Safety Valve) for source core-site.xml
      • Advanced Configuration Snippet (Safety Valve) for destination hdfs-site.xml
      • Advanced Configuration Snippet (Safety Valve) for destination core-site.xml
For more information, see Creating Iceberg replication policies.
Ozone snapshot policy enhancements
On the Cloudera Manager > Clusters > Ozone service > Bucket Browser tab, you can
  • view and browse the list of volumes and buckets in the service.
  • view the list of snapshots for a bucket.
  • create a snapshot

Additionally, you can restore or delete a snapshot.

For more information, see Restoring Ozone snapshots in Cloudera Manager
Hive external table replication policy enhancement (technical preview)
You can accomplish metadata-only replication for Ozone storage-backed Hive external tables after you specify a valid Destination Staging Path during the Hive external table replication policy creation process. You must replicate the data using Ozone replication policies.

This is a technical preview feature. It is not recommended for production deployments. Cloudera recommends that you try this feature in development or test environments. To enable this feature, contact your Cloudera account team.

For more information, see Creating Hive external table replication policy
Replication Manager support for AWS temporary credentials (technical preview)
You can use temporary AWS credentials, through the IDBroker service, to replicate HDFS data, Hive external tables, and HBase data from 7.1.9 SP1 Kerberized CDP Private Cloud Base clusters using Cloudera Manager 7.11.3 CHF7 or higher versions to S3 buckets or CDP Public Cloud clusters on AWS. You can also use the temporary AWS credentials to replicate HDFS data from S3 buckets to 7.1.9 SP1 Kerberized CDP Private Cloud Base clusters or higher using Cloudera Manager 7.11.3 CHF7 or higher versions.

This is a technical preview feature. It is not recommended for production deployments. Cloudera recommends that you try this feature in development or test environments. To enable this feature, contact your Cloudera account team.

For more information, see Add IDBroker to use temporary AWS session credentials
High availability support for Impala
Impala High availability is now configurable through Cloudera Manager 7.11.3 CHF7 or higher versions.
Custom properties atlas.jaas.KafkaClient.option.password was available in a clear text format in CDP cluster services when Kerberos authentication was not present.
To provide a secured access, two new fields are introduced for username / password and a radio field for loginModule for Kerberos or Plain selection.

atlas.jaas.KafkaClient.option.username=username

atlas.jaas.KafkaClient.option.password=<password is in clear text>

atlas.jaas.KafkaClient.option.loginModuleName=KERBEROS(default)

Changed or updated features

Deploy client configuration command timed-out on larger node clusters

The Deploy Client Config command is improved now. Previously, it could take long and time-out on large clusters. It is now leveraging multithreading and optimized for parallel execution. The command is now expected to complete much faster and should not cause timeouts.

The performance of GenerateCredentials on MIT is improved now

Multi-threaded credential generation for MIT has been enabled, allowing principal generation scripts to run in parallel.

Python support for Cloudera Manager 7.11.3 CHF7

The following table provides the details about the operating systems that are supported when using Python 3.x with the Cloudera Manager Agents:
Python 3.9 Python 3.10
  • RHEL 9.4
  • RHEL 9.2 (LTS)
  • Oracle 9.2 UEK
  • Ubuntu 22.04
  • SLES 15 SP4
  • SLES 15 SP5