What's New in Cloudera Manager 7.6.2
New features and changed behavior for Cloudera Manager 7.6.2.
- Merged keytab with load balancer principal for Kafka service.
- Configuration options have been added to use load balancer in front of kafka brokers.
- Validate HBase replication setup after first time setup is done
-
- When an HBase replication policy is created then there is a new field available in the API body validateReplicationSetup:
- By default, its value is false, which doesn't make any difference: HBase replication policy creation will be the same as before.
- When it's set to true, then in the end of the HBase replication policy creation, additional steps will check if replication works properly between the source and destination. HBase policy creation will work the same way as before, no additional action is required by users.
- If you want to validate whether HBase replication works properly, use that new field in the API body: "validateReplicationSetup": true
- Enable JMX Authentication by default
- In Kafka, JMX authentication is enabled by default. Passwords for monitor and control users are generated by default, but if values are set, they will be the values used.
- Cloudera Manager client support for hadoop.security.group.mapping.ldap.bind.password in jceks
- With this change, the 'ldap.bind.password' parameter will be appended to core-site.xml. This will enable HDFS's clients (like YARN) to access LDAP functionalities.
- Automatically refresh metric filter and collection settings
- A new parameter 'metric_config_auto_refresh' has been added. By setting this parameter to true, Metric Collection and Metric Filter parameters will be set automatically if they are changed without a role restart or configuration refresh.
- Option for logout landing page in the Cloudera Manager Admin Console
- With SAML, the logout request re-initiates a new SAML authentication request, therefore the session wasn't terminated unless SAML SLO (Single-LogOut) is enabled. We added a logout success page to break the SAML logout loop which has a Return to Login Page button for new session creation.
- Configurations for Streams Replication Manager explicit topic creation
- Streams Replication Manager now supports user-configured values for partition count and/or replication factor of it's internal topics. The following configuration parameters were introduced: metrics.topic.partition.count, control.topic.replication.factor, streams.replication.manager.service.remote.advertisement.topic.replication.factor, streams.replication.manager.service.streams.replication.factor.
- HbaseReplicationFirstTimeSetupReset removes the HDFS files from both sides, and clears the aux entry.
- Introduced a new API endpoint:
hbaseReplicationFirstTimeSetupCleanAndReset
, which cleans up and resets the HBase replication first time setup between the given source and destination: - Add support for JSON schema type in the registry config template s
- Schema Registry now supports Avro and JSON schemas.\
- Add an optional "Cluster Alias" field to the existing Kafka external account type
- The Kafka External Account name no longer has to match the alias of the Kafka cluster this account is describing. A new "Cluster Alias" field has been introduced for Kafka External Accounts, providing users with freedom to name the accounts as they wish. This field is optional - if it is specified, its value will be used when connecting to the Kafka cluster, otherwise the account name will be used.
- Need to update default value for keystore alias in Ranger
- Default keystore alias is now configurable for Ranger Admin and is not set to the Hostname by default.
- Chive: add an option to ignore certain partitionParameters when comparing and improve location comparison
- When customer replicated Hive data, then the replication had poor performance because all partitions were recreated.
- OPSAPS-62697 Need to add property javax.security.auth.useSubjectCredsOnly to JVM args
- Users having issues with Atlas - Solr communication should add the required argument through the Atlas Service Environment Advanced Configuration Snippet (Safety Valve) configuration parameter. Use the following key and value:
- Kafka topic entity import into Atlas
- The Import Kafka Topics Into Atlas command has been introduced. It is available from the actions list of the Kafka service or any of the brokers in Cloudera Manager. The command can be used by users who have permissions to handle service configurations in the system. The Atlas service is required for the command, otherwise the process will fail. When "not Ranger" is preferred as default authorizer, then the "kafka" service user has to be defined in the selected authorizer service.
- Add "emit.consumer.metrics" config to SMM CSD, and remove (now) unused SMON host/port configs.
- The cm.metrics.service.monitor.host" and "cm.metrics.service.monitor.port" Streams Messaging Manger configuration properties have been removed. These properties are no longer required because Streams Messaging Manager automatically detects the ServiceMonitor's location.
- Allow HTTP Response Headers to be Configured for Kafka Connect
- When a request was made to Kafka connect, the response did not contain a HSTS header. With this, the HSTS header has been added as default to the Kafka Connect REST API response.
- Enable setting offset in Schema Registry database
- Schema Registry offset ranges can now be configured via Cloudera Manager: minimum and maximum value can be set.
- Cloudera Manager diagnostic bundle now includes Cloudera Manager database information
- A Cloudera Manager diagnostic bundle will now
include an additional file named
cm_db_dump_stats.txt
, in thecm_db_dump
directory of the generated bundle. This file contains statistical data of the Cloudera Manager database dump thread responsible for collecting table data. The purpose of this is to help tally the following:- Number of tables in the database
- Total collected tables - Number of records of each table and how many were collected
- Size of the records and size of the collection
- Status of the collection (in-progress or completed)
- Time taken to collect each table
- Introduce allowed nexus urls config for Kafka Connect
- Users are now able to configure which nexus URLs are allowed for Stateless Nifi connector configurations using the kafka.connect.allowed.nexus.urls property. By default, this is set to empty, which means to "allow everything". During connector creation / modification / validation, the nexus.url property will be validated against this list.
- Add custom Kerberos path to agent and Cloudera Manager
- Customers are facing the following issues when
modifying the default path of krb5.conf in Cloudera Manager :
- The credential generation for roles are failing because KDC authentication with Cloudera Manager server fails.
- Services are failing to authenticate with Cloudera Manager Agent once manually getting services up by applying hacks (i.e adding relevant JVM arguments or environment variables)
- A few services like HDFS, Livy, HiveServer and Knox are reportedly failing as they are unable to locate the new Kerberos path.
- Configuration property for enabling HTTP Strict Transport Security
- Fixed an issue where customers were unable to
configure Cruise Control to include Strict Transport Security headers
in the responses of the API. A new configuration property,
webserver.ssl.sts.enabled
has been added for Cruise Control in Cloudera Manager. Setting this value to true configures Cruise Control to include the Strict Transport Security header in the web server responses when SSL is enabled. - Add flags to force Connectors to override the JAAS, and restrict the usage of the Worker principal
- Kafka Connect now allows users to force Connectors to override the JAAS configuration of the Kafka connection, and also forbids using the same Kerberos credentials as the Connect Worker is using.
- Add OpDB Agent to Knox
- Configuration for autodiscovery of the OpDB Agent has been added to Knox. The OpDB Agent is a new service for CDP Operational Database that needs to be discovered by Knox.
- Ranger server work directory is now configurable
- Ranger Admin / KMS / KMS-KTS server work directory can now be
configured through the parameter
ranger.tomcat.work.dir
. - authzmigrator : Skipping policy item creation for {OWNER}
- After the Sentry migration to Ranger there
are lots of {OWNER} policies being created, which are very difficult
to administer. This occurs during CDH to CDP migration. If you want to
skip {OWNER} policies, add the following properties in
authorization-migration-site.xml
<property> <name>authorization.migration.skip.owner.policy</name> <value>true</value> </property>