forked from docs/doc-exports
Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com> Co-authored-by: Yang, Tong <yangtong2@huawei.com> Co-committed-by: Yang, Tong <yangtong2@huawei.com>
24 lines
3.6 KiB
HTML
24 lines
3.6 KiB
HTML
<a name="mrs_01_2317"></a><a name="mrs_01_2317"></a>
|
|
|
|
<h1 class="topictitle1">Adapting to the Third-party JDK When Ranger Is Used</h1>
|
|
<div id="body1601024181827"><div class="section" id="mrs_01_2317__section10411113113617"><h4 class="sectiontitle">Scenarios</h4><p id="mrs_01_2317__p10893165811599">When Ranger is used as the permission management service of Spark SQL, the certificate in the cluster is required for accessing RangerAdmin. If you use a third-party JDK instead of the JDK or JRE in the cluster, RangerAdmin fails to be accessed. As a result, the Spark application fails to be started.</p>
|
|
<p id="mrs_01_2317__p198494765817">In this scenario, you need to perform the following operations to import the certificate in the cluster to the third-party JDK or JRE.</p>
|
|
</div>
|
|
<div class="section" id="mrs_01_2317__section733135635616"><h4 class="sectiontitle">Configuration Method</h4><ol id="mrs_01_2317__ol468712267618"><li id="mrs_01_2317__li1868718267616"><a name="mrs_01_2317__li1868718267616"></a><a name="li1868718267616"></a><span>Run the following command to export the certificate from the cluster:</span><p><ol type="a" id="mrs_01_2317__ol169795441279"><li id="mrs_01_2317__li69797440713">Install the cluster client. Assume that the installation path is <strong id="mrs_01_2317__b1082765311205">/opt</strong><strong id="mrs_01_2317__b1082795310207"></strong><strong id="mrs_01_2317__b78271453102012">/client</strong>.</li><li id="mrs_01_2317__li1273336486">Run the following command to go to the client installation directory.<p id="mrs_01_2317__p157311361288"><a name="mrs_01_2317__li1273336486"></a><a name="li1273336486"></a><strong id="mrs_01_2317__b37313613815">cd /opt/client</strong></p>
|
|
</li><li id="mrs_01_2317__li10731336784">Run the following command to configure environment variables:<p id="mrs_01_2317__p19731364818"><a name="mrs_01_2317__li10731336784"></a><a name="li10731336784"></a><strong id="mrs_01_2317__b19731336487">source bigdata_env</strong></p>
|
|
</li><li id="mrs_01_2317__li7493449687">Generate the certificate file.<p id="mrs_01_2317__p6704956594"><a name="mrs_01_2317__li7493449687"></a><a name="li7493449687"></a><strong id="mrs_01_2317__b156382525911">keytool -export -alias fusioninsightsubroot -storepass changeit -keystore /opt/client/JRE/jre/lib/security/cacerts -file fusioninsightsubroot.crt</strong></p>
|
|
</li></ol>
|
|
</p></li><li id="mrs_01_2317__li103351561370"><span>Import the certificate in the cluster to the third-party JDK or JRE.</span><p><p id="mrs_01_2317__p2029033951318">Copy the <strong id="mrs_01_2317__b11842691668">fusioninsightsubroot.crt</strong> file generated in <a href="#mrs_01_2317__li1868718267616">1</a> to the third-party JRE node, set the <strong id="mrs_01_2317__b19930221266">JAVA_HOME</strong> environment variable of the node, and run the following command to import the certificate:</p>
|
|
<p id="mrs_01_2317__p9113412191418"><strong id="mrs_01_2317__b8310415121417">keytool -import -trustcacerts -alias fusioninsightsubroot -storepass changeit -file fusioninsightsubroot.crt -keystore MY_JRE/lib/security/cacerts</strong></p>
|
|
<div class="note" id="mrs_01_2317__note268220510190"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="mrs_01_2317__p10683165171913"><strong id="mrs_01_2317__b9641628115715">MY_JRE</strong> indicates the installation path of the third-party JRE. Change it based on the site requirements.</p>
|
|
</div></div>
|
|
</p></li></ol>
|
|
</div>
|
|
</div>
|
|
<div>
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="mrs_01_1928.html">Basic Operation</a></div>
|
|
</div>
|
|
</div>
|
|
|