Fixed issues in 7.1.9 SP1 CHF 15
Know more about the list of fixes that are shipped for CDP Private Cloud Base version 7.1.9 SP1 CHF 15.
- CDPD-69213: Export/Import, Incremental Export: Tags fail to propagate to target child entities when the source entity is deleted
- Previously, when creating tables with multiple levels of depth, a tag applied to the first table was propagated along the lineage. However, after dropping the first table and exporting the entire lineage, child tables did not have the propagated tag after import on the target cluster. This occurred because of a task ordering issue in the deferred actions flow: when deferred actions were enabled during import, the add-propagation task was created before the parent entity was deleted, but ran after the deletion. This caused the system to find the edge between the parent entity and the classification in a deleted state, preventing tag propagation to child entities.
- CDPD-96779: Spark
ORCtable column name does not support special characters - Spark
threw an error when creating
ORCtables with column names containing special characters, such as$, which was compatible with Hive but not with Spark. This issue is now fixed. Special characters can now be used with Spark.Apache Jira: SPARK-32889
- CDPD-87921: Oozie SSH action port is not configurable
- The Oozie SSH action port always uses the default port
number 22. The default behaviour is still the same. But, you can change the port number
using the following methods:
- Use the new 0.4 schema version for your SSH action in your
workflow.xml and add the
portXML element with the new value.Example<port>11100</port> - Set the port number globally by adding the following
oozie-site.xml safety-valvein Cloudera Manager with the new value.Example,"11100" : "oozie.action.ssh.action.port"
If you set both the options, then the value set in the workflow.xml takes precedence and the port with the new port number should open in the target host.
- Use the new 0.4 schema version for your SSH action in your
workflow.xml and add the
- CDPD-93325:
Hive2Main.javacan print out passwords - Previously, Hive2Main was printing full Beeline command arguments to standard output, which might unintentionally expose LDAP credentials and the truststore password. This issue is now fixed.
- CDPD-77768: Oozie log parameters are not substituted correctly
- Previously, Oozie log parameters, for example,
{0}, were not substituted when log messages contained apostrophes. The formatting engine treated the text following a single quote as a literal block, preventing parameter replacement. This issue is now fixed. Oozie now automatically escapes single quotes in log messages, ensuring that all parameters are substituted correctly. - CDPD-97100: Zeppelin fails after updating Zookeeper and Hadoop components
- Previously, updating
Zookeeper and Hadoop components caused Zepplin to fail. This occurred because the updates
introduced
conflicting versions
of the
io.netty:netty-transport-native-epolldependency. The issue is now resolved. - CDPD-94957: Broken lineage on Atlas when calling
.cache()or.persist()method - Previously,
lineage reporting issues
occurred
when using the
.cache()or.persist()methods on Spark DataFrames, which caused lineage to not be correctly reported into Atlas. This issue is now fixed. The Atlas lineage is no longer wrong in case of cached Dataframes. - CDPD-96543: Missing timeline items for partition delta updaters
- Previously, the Catalog Server Operation section in the DDL profile incorrectly displayed that delays in metadata loading were caused by fetching the latest Metastore event ID.
- CDPD-96540: Unnecessary metadata reloads for Metastore ALTER_TABLE events
- Previously, the catalog service incorrectly triggered file metadata reloads for certain trivial Metastore ALTER_TABLE events.
- CDPD-96529: Slow metadata operations for wide tables
- Previously, when using Ranger authorization, Impala checked column masking policies using the column list. This required loading the table metadata, which triggered unnecessary loading delays, even when running the INVALIDATE or REFRESH command.
- CDPD-92930: Impala daemon crashes with analytic functions and collections
- Previously, running a query with an analytic function on unnested collection columns caused the Impala daemon to crash.
- CDPD-91994: Stale query IDs in catalog logs
- Previously, Catalog logs for
getPartialCatalogObjectrequests displayed incorrect query IDs. - CDPD-93504: NullPointerException when hive.acid.key.index is missing in ORC files
- Previously, a NullPointerException (NPE) error occurred when the hive.acid.key.index property was missing from an Optimized Row Columnar (ORC) file.
- CDPD-94206: Partition column statistics corruption during concurrent updates
- Previously, a concurrency issue existed when multiple processes updated partition column statistics at the same time.
- CDPD-94205: Database inconsistency during partition deletion failures
- Previously, when a direct SQL processing failure occurred during operations such as dropping partitions, the partial changes made to the database were not reverted before the system attempted an alternative processing method.
- CDPD-93503: Incorrect row order after query-based minor compaction
- Previously, query-based minor compaction used an incorrect sorting order for rows in its inner query. This resulted in duplicated rows when you ran the compaction after multiple MERGE statements.
- CDPD-93502: Query-based major compaction failure after multiple merge statements
- Previously, query-based major compaction failed with a Wrong sort order error when processing tables with multiple Atomicity, Consistency, Isolation, and Durability (ACID) delta directories, such as those created after multiple MERGE statements.
- CDPD-93427: Data loss in insert-only tables during query-based minor compaction
- Previously, query-based minor compaction produced empty delta files when a table had both aborted and open transactions.
- CDPD-92365: Unsupported removal of SerDe properties
- Previously, you could not remove specific serialization or deserialization (SerDe) properties from an existing Hive table because the UNSET SERDEPROPERTIES clause was not supported.
- CDPD-93500: Multiple YARN UI navigation issues when accessed through Knox
- Previously, several issues prevented users from properly accessing
YARN-related pages through Knox. This issue is now fixed. The following UI elements and
API functions now resolve correctly when proxied through Knox:
- Tracking URL link for running Flink jobs in the YARN UI and YARN UI v2.
- Query parameters in the YARN REST API, such as filtering applications by state.
- Spark History Server links on finished jobs page.
- CDPD-92941: Knox Gateway logging configuration cannot be customized through Cloudera Manager
- The Knox Gateway Logging Configuration (Safety Valve) advanced configuration snippet did not apply properly to Knox Gateway. This issue is now resolved by allowing individual logger configurations to be set and modified through the Cloudera Manager UI.
- COMPX-14637: Incorrect permissions on NodeManager local directories cause container failuers
- The NodeManager creates the configured local directories with 755 permissions on startup if the directories did not exist. However, if these permissions were changed after startup or if an administrator created the directories with incorrect permissions before starting YARN, the NodeManager would not reset the permissions, resulting in container failures. This issue is now resolved.
- CDPD-89478: Oozie UI displays start and end times incorrectly after upgrade
- Previously, the Oozie UI intermittently displayed the start time and end time fields in reverse order. Additionally, the Run button remained inactive until you clicked Save, even if you made no changes. This issue is resolved by correcting the field display order and ensuring that the Run button is active for schedules without requiring an unnecessary save action.
- CDPD-92510: Inaccurate table update timestamps in Hue
- Previously, the Data last updated on
timestamp for Iceberg tables in Hue displayed incorrect information when tables were
altered using Spark. This occurred because the timestamp was sourced from the
transient_lastDdlTimetable property, which does not update correctly during Spark operations. This issue is now fixed by updating the metadata source to use Iceberg snapshot timestamps. - CDPD-94739: Audit logging dependency on debug mode in Hue
- Previously, audit logging in Hue only functioned when debug
logging was enabled by setting the
DJANGO_DEBUG_MODEproperty totrue. This caused audit logging to be disabled by default. This issue is now resolved by ensuring audit events are always captured regardless of the debug mode settings. This change ensures Hue compliance and security requirements by maintaining audit logs in all environments. - CDPD-92857:
Export Allfailures in secured multi-tenant clusters - Previously, the Export All feature in Hue failed in secured multi-tenant clusters that used tenant colocation policies. This resulted in access errors during the export process. This issue is now resolved. The Export All functionality now follows tenant boundaries and cluster security policies. However, other known limitations exist. For more information, see Export All failure in secured multi-tenant clusters
- CDPD-95855: TLS truststore initialization with FIPS-compliant crypto providers
- Previously, in some environments using FIPS-compliant crypto providers, TLS truststore initialization failed. This occurred because of incompatible handling of empty keystore initialization. This issue is now resolved by updating the truststore initialization logic to ensure compatibility with FIPS-compliant providers. This allows the TLS setup to complete successfully.
- CDPD-96618: Race condition when registering or unregistering Exception Handling frames
- A race condition in libgcc could occur during concurrent registration and EH frames by the memory manager, leading to instability during multi-threaded code generation. This issue is now resolved by ensuring proper padding so that a null-terminated list of FDEs is always provided, eliminating the race condition.
- CDPD-93290: Open Keys summary is not displaying proper data
- Previously, the Open Keys summary response was not rendering properly and was not displaying proper data. This issue is now fixed.
- CDPD-92660: Recon UI fails to load Disk Usage view with large number of nested directories and keys
- Previously, with a large number of entries, the Recon UI Disk Usage page failed to load or took an excessive amount of time to populate the tree. This issue is now fixed now. The Disk Usage page no longer loads the root path by default. You also get a warning if you try to submit a root path DU request. The root path DU can only be fetched after an explicit submission.
- CDPD-93580: Ozone Manager retains native ACL metadata for incoming keys
- Previously, if the Ozone client was not updated to the latest version in the user's environment, it sent unwanted ACL metadata during key or file creation . This issue is now fixed. A new server-side configuration ensures that the Ozone Manager removes all native ACL information from the keys before persisting them.
- CDPD-94895/CDPD-93951/CDPD-93469: Do not know how many DataNodes cannot accept new writes in a container
- Previously, you did not know how many DataNodes were
actually readable from the perspective of container allocation and metadata operations.
This issue is now fixed and a new metric named
NonWritableNodesis added which shows the number of DataNodes that cannot accept new writes because they are either not inIN_SERVICEandHEALTHYstate, cannot allocate new containers or cannot write to existing containers. - CDPD-93860: SpaceUsageSource implementation class Fixed is missing toString()
- Previously, the
toString()method was missing inSpaceUsageSource.Fixedimplementation. ThetoString()method inSpaceUsageSource.Fixedimplementation is used for logging and debugging purposes to display volume space usage information such as capacity, used and available space. This issue is now fixed. - CDPD-93609: Ozone Usage is going beyond 100 percentage
- Previously, the Ozone Datanode was using more disk space than allowed for Ozone. This issue is now fixed.
- CDPD-88335: DataNode decommissioning fails when other DataNodes are offline due to invalid affinity node in Ratis replication
- Previously, DataNode decommissioning failed if one or more DataNodes holding Ratis replicas were already offline. During decommissioning, the Storage Container Manager (SCM) attempts to replicate Ratis container data to maintain redundancy. However, SCM’s placement logic still references an affinity node that was previously part of the network topology but has since been removed due to the DataNode going offline. This resulted in repeated placement errors and prevented the decommissioning process from completing successfully. This issue is now fixed.
- CDPD-93901: Not able to track Ozone Storage Container Manager (SCM) safemode rules and exit
- In large clusters, the Ozone SCM safemode might take a lot of time to exit. Previously, the you were not able to track the Ozone SCM Manager safemode rules and exit. This issue is not fixed and a new dashboard named "SCM Safemode" is introduced in Grafana which contains a chart for each safemode rule displaying its target and actual value. It also displays if the SCM is in safemode or not by showing "In Safemode" in red and "Exited safemode" in green respectively.
- CDPD-93793: Storage Container Manager (SCM) does not log safemode exit rules at regular intervals
- Previously, SCM logged rule statuses at arbitrary time intervals instead of logging them at regular intervals. This issue is now fixed and SCM logs safemode exit rule status at regular intervals while in safemode. The logging interval is configurable through hdds.scm.safemode.log.interval. Default value is 1 minute. Each log entry includes overall safemode state, precheck completion status, and current progress of each exit rule.
Common Vulnerabilities and Exposures (CVE) that is fixed in this CHF:
- CVE-2023-33202 - Bouncy Castle
- CVE-2025-48734 - commons-beanutils
- CVE-2024-25710 - commons-compress
- CVE-2024-26308 - commons-compress
- CVE-2025-48976 - commons-fileupload
- CVE-2024-47554 - commons-io
- CVE-2021-29425 - commons-io
- CVE-2024-25638 - dnsjava
- CVE-2023-52428 - nimbus-jose-jwt
