Cloudera Manager Server Properties
Advanced
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Command Eviction Age | Length of time after which inactive commands are evicted from the database. Default is two years. | 730 day(s) | command_eviction_age_hours | true | |
Cloudera Manager Server Local Data Storage Directory | Local path used by Cloudera Manager for storing data, including command result files. Note that changes to this configuration will only apply to commands started after the change. It is highly recommended that existing data be migrated over to the new location for the data to be accessible via and managed by Cloudera Manager. | /var/lib/cloudera-scm-server | command_storage_path | false | |
Enable Debugging of API | When enabled, the server log will contain traces of all API calls. | false | enable_api_debug | true | |
Agent Heartbeat Logging Directory | Specifies the location where Agent heartbeat requests and responses should be logged, for debugging purposes. If empty, logging is disabled. | heartbeat_logging_dir | false | ||
Single User Mode | Configure all clusters to run in single user mode where the Cloudera Manager agent and all service processes run as the same system user. Only supported for CDH 5.2 and above. | false | single_user_enabled | true | |
Single User Mode Group | System group to use for agent and service processes in single user mode. | cloudera-scm | single_user_group | true | |
Single User Mode User | System user to use for agent and service processes in single user mode. | cloudera-scm | single_user_name | true | |
Maximum Number of Time-Series Streams Returned Per Heatmap | The maximum number of time-series streams returned by a single time-series heatmap query. The default is 10,000 streams. This value can be set higher, but increasing it may negatively impact chart performance and may require more resources be given to the Cloudera Manager Server, Host Monitor, and Service Monitor. | 10000 | tsquery_heatmap_streams_limit | true | |
Maximum Number of Time-Series Streams Returned Per Scatter Plot | The maximum number of time-series streams returned by a single time-series scatter plot. The default is 1000 streams. This value can be set higher, but increasing it may negatively impact chart performance and may require more resources be given to the Cloudera Manager Server, Host Monitor, and Service Monitor. | 1000 | tsquery_scatter_streams_limit | true | |
Maximum Number Of Time-Series Streams Returned Per Line-Based Chart | The maximum number of time-series streams that will be returned by a single time-series query. The default is 250 streams. This value can be set higher, but increasing it may negatively impact chart performance and may require more resources be given to the Cloudera Manager Server, Host Monitor, and Service Monitor. | 250 | tsquery_streams_limit | true | |
Maximum Number of Time-Series Streams Returned Per Table | The maximum number of time-series streams returned in a single time-series table. The default is 2000 streams. This value can be set higher, but increasing it may negatively impact chart performance and may require more resources be given to the Cloudera Manager Server, Host Monitor, and Service Monitor. | 2000 | tsquery_table_streams_limit | true |
Custom Service Descriptors
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Enable Local Descriptor Repository | When enabled, the server will read custom service descriptors from the local filesystem. | true | csd_repo_enabled | true | |
Local Descriptor Repository Path | Path to the local repository where custom service descriptors are located. | /opt/cloudera/csd | csd_repo_path | true |
External Authentication
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Authentication Backend Order | The order in which authentication backends are used for authenticating a user. | DB_ONLY | auth_backend_order | true | |
External Authentication Program Path | An external program to use to authenticate users. Username is passed as the first command line argument. The password is passed over stdin. Program exit code should be 0 for successful authentication of a regular user, 1 for successful authentication of an admin user, 2 for successful authentication of a limited operator user, 3 for successful authentication of an operator user, 4 for successful authentication of a configurator user, 5 for successful authentication of a Cluster admin user, 6 for successful authentication of a BDR admin user, 7 for successful authentication of a Navigator admin user, 8 for successful authentication of a User admin user, 9 for successful authentication of an Auditor user, and a negative value for failure. A failure description can be printed to stderr. | auth_script | false | ||
LDAP Full Administrator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, they will be granted Full admin access upon logging in. | ldap_admin_groups | false | ||
LDAP Auditor Groups | A list of LDAP group names. If a user is a member of one of the configured groups, they will be granted Auditor access upon logging in. | ldap_auditor_groups | false | ||
LDAP BDR Administrator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted BDR admin access on login. | ldap_bdr_admin_groups | false | ||
LDAP Bind User Distinguished Name | Distinguished name of the user to bind as for searches. | ldap_bind_dn | false | ||
LDAP Bind Password | Password for the bind user | ldap_bind_pw | false | ||
LDAP Cluster Administrator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted Cluster admin access on login. | ldap_cluster_admin_groups | false | ||
LDAP Configurator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted configurator access on login. | ldap_configurator_groups | false | ||
LDAP Distinguished Name Pattern | For use with non-Active Directory LDAP systems. This is a pattern that will be used to search for the distinguished name of a user during authentication. Use "{0}" to specify where the username should go, e.g. "uid={0},ou=People". | ldap_dn_pattern | false | ||
LDAP Group Search Base | A base distinguished name for searching for groups. | ldap_group_search_base | false | ||
LDAP Group Search Filter | A search filter for finding groups. Typically, this will be (member={0}), where {0} will be replaced by the DN of a successfully authenticated user. | ldap_group_search_filter | false | ||
LDAP Limited Operator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted limited operator access on login. | ldap_limited_groups | false | ||
LDAP Navigator Administrator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted Navigator admin access on login. | ldap_navigator_admin_groups | false | ||
LDAP Operator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted operator access on login. | ldap_operator_groups | false | ||
External Authentication Type | The type of external authentication to use. | ACTIVE_DIRECTORY | ldap_type | true | |
LDAP URL | URL of the LDAP server to authenticate against | ldap_url | false | ||
LDAP User Administrator Groups | A list of LDAP group names. If a user is a member of one of the configured groups, that user is granted User admin access on login. | ldap_user_admin_groups | false | ||
LDAP User Groups | A list of LDAP group names. If a user is not a member of one of the configured groups, that user is prevented from logging into Cloudera Manager. If this is left empty, all LDAP users will be able to log in. | ldap_user_groups | false | ||
LDAP User Search Base | A base distinguished name for searching for users. This may be used as a fallback mechanism if the DN pattern does not match any user. | ldap_user_search_base | false | ||
LDAP User Search Filter | A search filter for finding users. Typically, this will be (uid={0}), where {0} will be replaced by the username that was used at the login screen. | ldap_user_search_filter | false | ||
Active Directory NT Domain | Active Directory NT Domain to authenticate against | nt_domain | false | ||
SAML Entity Base URL | The Base URL used to construct redirect URLs reported in this server's SP metadata. Leave this blank to let the server calculate the base URL itself. | saml_entity_base_url | false | ||
SAML Entity ID | The ID that Cloudera Manager will use to identify itself to the IDP. This value should be unique to this Cloudera Manager installation. | clouderaManager | saml_entity_id | true | |
Alias of SAML Sign/Encrypt Private Key | The alias used to identify the sign/encrypt private key in the SAML keystore. | saml_key_alias | false | ||
SAML Sign/Encrypt Private Key Password | The password for the sign/encrypt private key in the SAML keystore. | saml_key_password | false | ||
SAML Keystore Password | The password for the SAML keystore. | saml_keystore_password | false | ||
Path to SAML Keystore File | The filesystem path to the keystore file containing the SP private key and any necessary public certificates to validate the IDP. | saml_keystore_path | false | ||
SAML Login URL | If your IDP does not support SP-initiated SSO (very uncommon), you use a separate login URL, outside of Cloudera Manager. Provide that URL here so that Cloudera Manager can use it when a user needs to log in. | saml_login_url | false | ||
Path to SAML IDP Metadata File | The filesystem path to the IDP metadata XML file. | saml_metadata_path | false | ||
SAML Attribute Identifier for User Role | The URN OID that will identify the user's role in the SAML attributes. Only has an effect when 'Attribute' based role assignment is used. | urn:oid:2.5.4.11 | saml_oid_role | true | |
SAML Attribute Identifier for User ID | The URN OID that will identify the user's ID in the SAML attributes. | urn:oid:0.9.2342.19200300.100.1.1 | saml_oid_user | true | |
SAML Response Binding | The SAML Binding format that the IDP is asked to use when sending authentication responses. | ARTIFACT | saml_response_binding | true | |
SAML Attribute Values for Roles | The values that will appear in the SAML role attribute for each Cloudera Manager role. The first value corresponds to the Full Administrator role. The second value corresponds to the Read-Only role. The third value corresponds to the Limited Operator role. The fourth value corresponds to the Operator role. The fifth value corresponds to the Configurator role. | admin, user, limited, operator, configurator, clusterAdmin, bdrAdmin, navAdmin, userAdmin, auditor | saml_role_map | true | |
SAML Role Assignment Mechanism | The mechanism to use for assigning roles to users. 'Attribute' assigns roles based on a SAML attribute. 'Script' assigns roles based on the result of an external script. | ATTRIBUTE | saml_role_mapper | true | |
Path to SAML Role Assignment Script | An external script (or binary) to use to assign roles to SAML users. The username is passed as the first command-line argument. Program exit code should be: 0 for Full Administrator, 1 for Read-Only, 2 for Limited Operator, 3 for Operator, 4 for Configurator, 5 for successful authentication of a Cluster admin user, 6 for successful authentication of a BDR admin user, 7 for successful authentication of a Navigator admin user, 8 for successful authentication of a User admin user, 9 for successful authentication of an Auditor user, and a negative value for failure. | saml_role_script | false | ||
Source of User ID in SAML Response | Whether the user ID should be obtained from the SAML response's NameID field or from an attribute | ATTRIBUTE | saml_user_source | true |
Kerberos
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Active Directory Account Prefix | Prefix used in names while creating accounts in Active Directory. The prefix can be up to 10 characters long and can be set to identify accounts used for authentication by CDH processes. Used only if Active Directory KDC is used for authentication. | ad_account_prefix | true | ||
Active Directory Suffix | Active Directory suffix where all the accounts used by CDH daemons will be created. Used only if Active Directory KDC is being used for authentication. | ou=hadoop, DC=hadoop, DC=com | ad_kdc_domain | true | |
Active Directory LDAPS Port | Port to use for LDAP over SSL when using Active Directory for authentication. | 636 | ad_ldaps_port | true | |
Custom Kerberos Keytab Retrieval Script | Specify the path to a custom script (or executable) to retrieve a Kerberos keytab. The script should take two arguments: a destination file to write the keytab to, and the full principal name to retrieve the key for. If this property is specified, Cloudera Manager ignores all other properties specified for Kerberos setup. | gen_keytab_script | false | ||
Active Directory Domain Controller Override | If multiple Active Directory Domain Controllers are behind a load-balancer, Cloudera Manager should be provided with the address of one of them. Cloudera Manager then sends commands to create accounts to that Domain Controller only. Note: This setting is used only while creating accounts. CDH services use the value entered in the KDC Server Host field only while authenticating. | kdc_account_creation_host_override | false | ||
KDC Server Host | Host where the KDC server is located. | kdc | kdc_host | false | |
KDC Type | Type of KDC used for authentication in CDH clusters | MIT KDC | kdc_type | true | |
DNS Lookup KDC | Indicate whether DNS SRV records should be used to locate the KDCs and other servers for a realm, if they are not listed in the krb5.conf information for the realm. | dns_lookup_kdc | false | krb_dns_lookup_kdc | true |
Kerberos Encryption Types | Encryption types supported by KDC. Note: If you want to use AES encryption, make sure you have deployed JCE Unlimited Strength Policy File by following the instructions here. | rc4-hmac | krb_enc_types | false | |
Forwardable Tickets | If this flag is true, initial tickets will be forwardable by default, if allowed by the KDC. | forwardable | true | krb_forwardable | true |
Advanced Configuration Snippet (Safety Valve) for [libdefaults] section of krb5.conf | For advanced use only. Any text here will be emitted verbatim in the [libdefaults] section of krb5.conf. | krb_libdefaults_safety_valve | false | ||
Manage krb5.conf through Cloudera Manager | Whether Cloudera Manager should configure and deploy krb5.conf on secure clusters. If this property is not checked, then you must ensure that krb5.conf is deployed on hosts in a secure cluster as well as on Cloudera Manager Server's host. | false | krb_manage_krb5_conf | false | |
Advanced Configuration Snippet (Safety Valve) for remaining krb5.conf | For advanced use only. Cloudera Manager configures only the [libdefaults] and [realms] section of krb5.conf. Any text here will be emitted verbatim after them in krb5.conf. | krb_other_safety_valve | false | ||
Advanced Configuration Snippet (Safety Valve) for default realm in krb5.conf | For advanced use only. Any text here will be emitted verbatim in the [realms] section of krb5.conf for the specified security realm. If you want to add other realms besides the default one, they should be configured using Advanced Configuration Snippet (Safety Valve) for remaining krb5.conf. | krb_realms_safety_valve | false | ||
Kerberos Renewable Lifetime | Default renewable lifetime for initial ticket requests. | renew_lifetime | 7 day(s) | krb_renew_lifetime | true |
Kerberos Ticket Lifetime | Default lifetime for initial ticket requests. | ticket_lifetime | 1 day(s) | krb_ticket_lifetime | true |
Maximum Renewable Life for Principals | Maximum renewable lifetime for Kerberos principals generated by Cloudera Manager. This property is used only if MIT KDC is used. Set this property to zero if the KDC should provide the maximum renewable lifetime. Note: Principals with non-renewable tickets are not recommended because it can prevent Hadoop services from functioning. | 5 day(s) | max_renew_life | true | |
Kerberos Security Realm | The realm to use for Kerberos security. Note: Changing this setting would clear up all existing credentials and keytabs from Cloudera Manager. | default_realm | HADOOP.COM | security_realm | true |
Monitoring
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Set health status to Bad if the Agent heartbeats fail | If an Agent fails to send this number of expected consecutive heartbeats to the Server, a "Bad" health status is assigned to that Agent. | 10 time(s) | missed_hb_bad | true | |
Set health status to Concerning if the Agent heartbeats fail | If an Agent fails to send this number of expected consecutive heartbeats to the Server, a "Concerning" health status is assigned to that Agent. | 5 time(s) | missed_hb_concerning | true |
Network
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Proxy Password | The basic authentication password for the proxy. | parcel_proxy_password | false | ||
Proxy Port | The port for the proxy server to be used when the Cloudera Manager Server accesses the Internet, such as when downloading parcels and uploading diagnostic data. | parcel_proxy_port | false | ||
Proxy Protocol | The protocol to use for the proxy server when the Cloudera Manager Server accesses the Internet, such as when downloading parcels and uploading diagnostic data. | HTTP | parcel_proxy_protocol | true | |
Proxy Server | The proxy server to be used when the Cloudera Manager Server accesses the Internet, such as when downloading parcels and uploading diagnostic data. | parcel_proxy_server | false | ||
Proxy User | The basic authentication user name for the proxy. | parcel_proxy_user | false |
Other
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Allow Usage Data Collection | Allows Cloudera to collect usage data, including the use of Google Analytics. | true | allow_usage_data | true | |
Custom Banner Text | The custom banner is used to display a customer specific text in the header area. | custom_banner_html | false | ||
Custom Header Color | The custom header color is used to distinguish different instances of Cloudera Manager. | BLACK | custom_header_color | true | |
Custom Information Assurance Policy Text | An information assurance policy statement that must be agreed to in order for a user to login. | custom_ia_policy | false | ||
Enable Events Widget Auto-Search | When enabled, the Events widget at the bottom of many pages will auto-fire its default search on page load. | true | events_widget_search_on_load | true | |
Maximum Cluster Count Shown In Full | When the number of clusters exceeds this number, only the cluster summary information will be shown on the home page. | 2 | home_page_full_limit | true | |
System Identifier | An identifier for this system, to be included with diagnostic data bundles. | default | system_identifier | true |
Parcels
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Automatically Distribute Available Parcels | Whether available parcels should be automatically distributed to any cluster that already has parcels of the same product. | false | distribute_parcels_automatically | true | |
Automatically Download New Parcels | Whether new parcels discovered on the remote parcel repository should be automatically downloaded. | false | download_parcels_automatically | true | |
Cloudera Manager Manages Parcels | Whether Cloudera Manager should manage which parcels should be present on all managed hosts. | true | manages_parcels | true | |
Automatically Downloaded Products | If automatic parcel downloading is enabled, the list of products that will be downloaded. | CDH | parcel_autodownload_products | false | |
Automatically Remove Old Parcels | Whether parcels for old versions of an activated product should be removed from a cluster when they are no longer in use. | false | parcel_cleanup_automatically | true | |
Number of Old Parcel Versions to Retain | If automatic removal of old parcels is enabled, the number of old parcels to keep. Any old parcels beyond this value will any be removed. If this is set to zero, no old parcels will be retained. | 3 | parcel_cleanup_threshold | true | |
Parcel Distribution Rate Limit | Per-second rate limit for parcel distribution. The default of 50MiB/second allows for parcel distribution to saturate about half of a Gigabit link. | 50 MiB | parcel_distribute_rate_limit_kbs_per_second | true | |
Maximum Parcel Uploads | Maximum number of concurrent uploads allowed to distribute parcels to individual hosts. The maximum allowed number of concurrent uploads is 50. | 10 | parcel_max_upload | true | |
Validate Parcel Relations | Enforce that parcel dependencies are satisfied and conflicts are prevented when activating parcels. Parcel relations (Depends, Conflicts, and Replaces) can be defined the manifests of parcel repositories. Cloudera Manager can also enforce some default relations if none are defined in the manifest. | true | parcel_relation_validation | true | |
Local Parcel Repository Path | Path to the local package parcel repository from which binaries are served to the Agents. | /opt/cloudera/parcel-repo | parcel_repo_path | true | |
Create System-Wide Symlinks for Active Parcels | Whether system-wide symlinks should be created for the active parcels (for example, /usr/bin/hadoop). | true | parcel_symlinks | true | |
Parcel Update Frequency | How often to check local and remote parcel repositories for new parcels and if any old parcels should be cleaned up. | 1 hour(s) | parcel_update_freq | true | |
Create Users and Groups, and Apply File Permissions for Parcels | Whether a parcel's specified users, groups and file permissions should be applied. This may not be desired if custom users and groups are being used, or if they have to be created externally (eg: in LDAP) | true | parcel_users_groups_permissions | true | |
Remote Parcel Repository URLs | URLs of the remote parcel repositories where Cloudera Manager checks for new parcels. As part of checking for new parcels, the Cloudera Manager sends the ID of the server and the server version to the repository host. | https://archive.cloudera.com/cdh5/parcels/latest/, https://archive.cloudera.com/cdh4/parcels/latest/, https://archive.cloudera.com/impala/parcels/latest/, https://archive.cloudera.com/search/parcels/latest/ | remote_parcel_repo_urls | true | |
Retain Downloaded Parcel Files | Whether downloaded parcel files be kept by Agents after they have been unpacked. Keeping the parcel files consumes additional disk space but allows downloads to be avoided if the parcel ever needs to be unpacked again. | true | retain_parcels_in_cache | true |
Performance
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Send Agent heartbeat every | The interval between each heartbeat that is sent from Agents to the Server | 15 second(s) | heartbeat_interval | true |
Ports and Addresses
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Agent Port to connect to Server | Specify the port for Agents to use to connect to the Server. Must be 1024 or higher. | 7182 | agent_port | true | |
Cloudera Manager Hostname Override | Override to use for Cloudera Manager's hostname. Normally this is determined automatically, but this can be used if InetAddress.getLocalhost() is returning the loopback address. | cm_host_name | false | ||
HTTP Port for Admin Console | Specify the HTTP port to use to access the Server via the Admin Console. Must be 1024 or higher. | 7180 | http_port | true | |
HTTPS Port for Admin Console | Specify the HTTPS port to use to access the Server via the Admin Console. Must be 1024 or higher. | 7183 | https_port | true |
Security
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Use TLS Encryption for Agents | Select this option to enable TLS encryption between the Server and Agents. | false | agent_tls | true | |
Keystore Password | Specify the password for the keystore. | keystore_password | false | ||
Path to TLS Keystore File | Specify the filesystem path to the directory on the Server host where the keystore file is located. | keystore_path | false | ||
Use TLS Authentication of Agents to Server | Select this option to enable TLS Authentication of Agents to the Server. | false | need_agent_validation | true | |
HTTP Referer Check | Whether to verify "Referer" in HTTP header for state changing requests. This protects against cross-site request forgery, but may need to be turned off if browsers or proxies in your environment do not specify the header. | true | referer_check | true | |
Allow 'Remember Me' option | Whether to allow a user to select 'Remember Me' when logging in. If this is set, the user will not need to log in again for two weeks (unless the server is restarted during that time). If the user chooses 'Remember Me', then the session timeout is ignored. | true | session_remember_me | true | |
Session Timeout | The length of time a user's session can be idle for before the user must log in again. Note that currently logged in users will continue with their old timeout values. | 30 minute(s) | session_timeout | true | |
Show Stacktraces On Error Pages | Control whether stacktraces are shown on error pages. While stacktraces help with debugging, they can sometimes expose sensitive information to a potentially malicious user. | true | show_stacktraces | true | |
Truststore Password | The password for the truststore. | truststore_password | false | ||
Path to TLS Truststore File | The filesystem path to the directory on the Server host where the truststore file is located. | truststore_path | false | ||
Use TLS Encryption for Admin Console | Enable TLS encryption (HTTPS) between the user and the Cloudera Manager Admin Console. When checked, the HTTPS port will be used. | false | web_tls | true |
Support
Display Name | Description | Related Name | Default Value | API Name | Required |
---|---|---|---|---|---|
Number of Diagnostic Data Bundles to Keep | The maximum number of support bundles that will be stored in the diagnostic data bundle directory. A value of -1 indicates no limit. | 10 | cluster_stats_count | false | |
Scheduled Diagnostic Data Size (MB) | Approximate size in MB of scheduled diagnostic data bundle | 100 | cluster_stats_default_size_mb | false | |
Use HTTPS to Upload Diagnostic Data | Whether to use HTTPS to upload diagnostic data bundles instead of the now-deprecated SFTP. Uses proxy settings from the network setting. | true | cluster_stats_http | true | |
Diagnostic Data Bundle Directory | Local directory to store diagnostic data bundles. Leave blank to store bundles for 24 hours. This directory must be writable by the cloudera-scm user. | cluster_stats_path | false | ||
Scheduled Diagnostic Data Collection Frequency | Frequency of automatically collecting diagnostic data and sending to Cloudera support. | WEEKLY | cluster_stats_schedule | true | |
Scheduled Diagnostic Data Collection Time | Time of day to collect and send diagnostic data to Cloudera | cluster_stats_start | false | ||
Diagnostic Data Temp Directory | Local path to assemble diagnostic data bundles. Leave blank to assemble these bundles in your JVM's temp directory. Set this value if you run out of disk space while collecting diagnostic data. | cluster_stats_tmp_path | false | ||
Send Diagnostic Data to Cloudera Automatically | Allows the Server to automatically send diagnostic data when a collection is triggered. | true | phone_home | true | |
Open latest Help files from the Cloudera website | If this option is selected, the Help link opens the latest Help files from the Cloudera web site (requires Internet access from the browser). If not selected, the locally installed Help files, which are not updated after installation, are opened (no Internet access from the browser is required). | true | using_help_from_ccp | true |