This topic describes the upgrade-related known issues for Cloudera Data Warehouse (CDW)
Private Cloud.
DWX-8525 and DWX-8526: CDW supports upgrades from previous releases to
1.5.0 release with listed limitations
You may encounter issues while creating a new Virtual Warehouse on an
existing Database Catalog (for example version 1.4.1) in an environment that is upgraded from,
say 1.4.1 to 1.5.0.
The existing Virtual Warehouses continue to operate. But to
create a new Virtual Warehouse, you must reactivate the CDW environment after upgrading the
Private Cloud data services from a previous release to a newer release (for example from 1.4.1
to 1.5.0.)
DWX-14192: Atlas entities not created after upgrading from 1.4.0-H1 to
1.5.0
After upgrading from 1.4.0-H1 to 1.5.0, you may notice that Atlas
entities are not created and you may see the following error in the metastore pod logs:
java.security.UnrecoverableKeyException: Password verification
failed
Log in to the Data Warehouse service as DWAdmin.
Go to the Database Catalog tile and note the Database Catalog namespace.
Get the Kubernetes configuration for accessing the cluster using the kubectl
command.
On
ECS deployments, log into the nodes as a root user. Login into the master node, which is
usually the first node, and check access to the cluster with the following kubectl
command:
/var/lib/rancher/rke2/bin/kubectl --kubeconfig=/etc/rancher/rke2/rke2.yaml get nodes
Run the following command to get the
jceks-secret:
kubectl get secret jceks-secret -n [***DBC-NAMESPACE***] -o yaml --kubeconfig=/path/to/kubeconfig
Create a backup of the jceks-secret file as
follows:
This
creates a copy of the secrets.jceks file, removes the
truststore.password key from the tmp/secrets.jceks
file, creates a new /tmp/secrets.jceks.b64 file on the filesystem of
the metastore-0 pod, and finally removes the /tmp/secrets.jceks file
from the filesystem of the metastore-0 pod.
The
/tmp/secrets.jceks.b64 file is used for creating a patch file in the
next step.
The
jceks-secret.patch.yaml patch file is required for modifying the jceks
secret that is stored in the Kubernetes environment.
Run the following command to append data from the
/tmp/secrets.jceks.b64 file (present on the metastore-0 pod) to the
jceks-secret.patch.yaml file (present on the local
filesystem):