Preparing clusters for Ozone replication policies
You must prepare the clusters, create buckets in the target cluster, and configure additional configurations for OBS bucket replication before you create Ozone replication policies.
Have you added the source and target clusters on the
page? For more information, see Adding clusters to a CDP Private Cloud Data Services deployment.
Have you created the bucket on the target cluster of the same type as the
bucket on the source cluster from which the replication policy replicates
The following sample commands create a volume and an FSO bucket:
ozone sh volume create o3://ozone1/vol1 ozone sh bucket create o3://ozone1/vol1/buck1 --layout FILE_SYSTEM_OPTIMIZED
Are the additional configurations required for OBS bucket replication
configured when the source bucket is an OBS bucket?
For more information, see Configuring properties for OBS bucket replication.
- Do you need to replicate data securely? If so, ensure that the SSL/TLS certificate exchange between two Cloudera Manager instances that manage source and target clusters respectively is configured. For more information, see Configuring SSL/TLS certificate exchange between two Cloudera Manager instances.
Is Kerberos enabled on both the clusters? If so, perform the following
- Configure a user with permissions to access HDFS and Ozone.
- Run the following command to add the group name of the user
(For example, the group name bdr) to the Ozone
service configuration in target Cloudera Manager:
sudo usermod -a -G om bdr
Is Ranger enabled on the source cluster? If so, you must:
complete the following steps on the Ranger UI from source Cloudera
- Log into Ranger UI from source Cloudera Manager.
- Click cm_ozone on the Service Manager page.
- Add the user (that you configured in the previous step) to the all - volume, bucket, key policy name, and then set the groups for this policy as public.
complete the following steps for the Ranger service in source Cloudera
- Go to the tab.
- Locate the Ranger KMS Server with KTS Advanced Configuration Snippet (Safety Valve) for conf/kms-site.xml property.
- Add the following key-value pairs:
- Save the changes.
- Restart the Ranger service for the changes to take effect.
- complete the following steps on the Ranger UI from source Cloudera Manager: