Cloudera Enterprise 6.0.x | Other versions

Adding a Host to the Cluster

Minimum Required Role: Full Administrator

You can add one or more hosts to your cluster using the Add Hosts wizard, which installs the Oracle JDK, CDH, and Cloudera Manager Agent software. After the software is installed and the Cloudera Manager Agent is started, the Agent connects to the Cloudera Manager Server and you can use the Cloudera Manager Admin Console to manage and monitor CDH on the new host.

The Add Hosts wizard does not create roles on the new host; once you have successfully added the host(s) you can either add roles, one service at a time, or apply a host template, which can define role configurations for multiple roles.

  Important:
  • All hosts in a single cluster must be running the same version of CDH.
  • When you add a new host, you must install the same version of CDH to enable the new host to work with the other hosts in the cluster. The installation wizard lets you select the version of CDH to install, and you can choose a custom repository to ensure that the version you install matches the version on the other hosts.
  • If you are managing multiple clusters, select the version of CDH that matches the version in use on the cluster where you plan to add the new host.
  • When you add a new host, the following occurs:
    • YARN topology.map is updated to include the new host
    • Any service that includes topology.map in its configuration—Flume, Hive, Hue, Oozie, Solr, Spark, Sqoop 2, YARN—is marked stale
    At a convenient point after adding the host you should restart the stale services to pick up the new configuration.

Use one of the following methods to add a new host:

Using the Add Hosts Wizard to Add Hosts

You can use the Add Hosts wizard to install CDH, Impala, and the Cloudera Manager Agent on a host.

  1. Disable TLS Encryption or Authentication
  2. Alternate Method of installing Cloudera Manager Agent without Disabling TLS
  3. Using the Add Hosts Wizard
  4. Enable TLS Encryption or Authentication
  5. Enable TLS/SSL for CDH Components
  6. Enable Kerberos

Disable TLS Encryption or Authentication

If you have enabled TLS encryption or authentication for the Cloudera Manager Agents, you must disable both of them before starting the Add Hosts wizard. Otherwise, skip to the next step.
  Important: This step temporarily puts the existing cluster hosts in an unmanageable state; they are still configured to use TLS and so cannot communicate with the Cloudera Manager Server. Roles on these hosts continue to operate normally, but Cloudera Manager is unable to detect errors and issues in the cluster and reports all hosts as being in bad health. To work around this issue, you can manually install the Cloudera Manager Agent on the new host. See Alternate Method of installing Cloudera Manager Agent without Disabling TLS.
  1. From the Administration tab, select Settings.
  2. Select the Security category.
  3. Disable TLS by clearing the following options: Use TLS Encryption for Agents, and Use TLS Authentication of Agents to Server.
  4. Click Save Changes to save the settings.
  5. Log in to the Cloudera Manager Server host.
  6. Restart the Cloudera Manager Server with the following command:
    sudo service cloudera-scm-server restart

    The changes take effect after the restart.

Alternate Method of installing Cloudera Manager Agent without Disabling TLS

If you have TLS encryption or authentication enabled in your cluster, you must either disable TLS during the installation, or install the Cloudera Manager Agent manually using the following procedure:
  1. Copy the repository configuration file from an existing host in the cluster to the new host. For example:
    OS Command
    RHEL
    $ sudo scp mynode.example.com:/etc/yum.repos.d/cloudera-manager.repo /etc/yum.repos.d/cloudera-manager.repo
    
    SLES
    $ sudo scp mynode.example.com:/etc/zypp/zypper.conf/cloudera-cm.repo /etc/zypp/zypper.conf/cloudera-cm.repo
    Ubuntu or Debian
    $ sudo scp mynode.example.com:/etc/apt/sources.list.d/cloudera.list /etc/apt/sources.list.d/cloudera.list
    
  2. Remove cached package lists and other transient data by running the following command:
    OS Command
    RHEL
    $ sudo yum clean all
    SLES
    $ sudo zypper clean --all
    Ubuntu or Debian
    $ sudo apt-get clean
  3. Install the Oracle JDK package from the Cloudera Manager repository. Install the same version as is used on other cluster hosts. Both JDK 1.7 and 1.8 are supported:
    Table 1. JDK 1.7
    OS Command
    RHEL
    $ sudo yum install oracle-j2sdk1.7
    SLES
    $ sudo zypper install oracle-j2sdk1.7
    Ubuntu or Debian
    $ sudo apt-get install oracle-j2sdk1.7
    Table 2. JDK 1.8
    OS Command
    RHEL
    $ sudo yum install jdk1.8.0_144-cloudera
    SLES
    $ sudo zypper install jdk1.8.0_144-cloudera
    Ubuntu or Debian
    $ sudo apt-get install jdk1.8.0_144-cloudera
      Note: If you need to install the JCE unlimited strength encryption policy files, these files are not included in the JDK package and Cloudera Manager does not install them. Copy the files from an existing host to the new host. For example:
    # scp mynode.example.com:/usr/java/jdk1.7.0_67-cloudera/jre/lib/security/*policy.jar /usr/java/jdk1.7.0_67-cloudera/jre/lib/security/
    
  4. Set up the TLS certificates using the same procedure that was used to set them up on other cluster hosts. See Configuring TLS Encryption for Cloudera Manager. If you have set up a custom truststore (For example, /usr/java/jdk1.7.0_67-cloudera/jre/lib/security/jssecacerts, copy that file from an existing host to the same location on the new host.
  5. Install the Cloudera Manager Agent:
    OS Command
    RHEL
    $ sudo yum install cloudera-manager-agent
    SLES
    $ sudo zypper install cloudera-manager-agent
    Ubuntu or Debian
    $ sudo apt-get install cloudera-manager-agent
  6. Copy the Cloudera Manager Agent configuration file from an existing cluster host that is already configured for TLS to the same location on the new host. For example:
    $ sudo scp mynode.example.com:/etc/cloudera-scm-agent/config.ini /etc/cloudera-scm-agent/config.ini
    
  7. Create and secure the file containing the password used to protect the private key of the Agent:
    1. Use a text editor to create a file called agentkey.pw that contains the password. Save the file in the /etc/cloudera-scm-agent directory.
    2. Change ownership of the file to root:
      $ sudo chown root:root /etc/cloudera-scm-agent/agentkey.pw
      
    3. Change the permissions of the file:
      $ sudo chmod 440 /etc/cloudera-scm-agent/agentkey.pw
      
  8. Start the Agent on the new host:
    $ sudo service cloudera-scm-agent start
  9. Log in to Cloudera Manager and go to Hosts > All Hosts page and verify that the new host is recognized by Cloudera Manager.

Using the Add Hosts Wizard

  1. Click the Hosts tab.
  2. Click the Add New Hosts button.
  3. Follow the instructions in the wizard to install the Oracle JDK and Cloudera Manager Agent packages and start the Agent.
  4. In the Specify hosts for your CDH Cluster installation page, you can search for new hosts to add under the New Hosts tab. However, if you have hosts that are already known to Cloudera Manager but have no roles assigned, (for example, a host that was previously in your cluster but was then removed) these will appear under the Currently Managed Hosts tab.
  5. You will have an opportunity to add (and start) role instances to your newly-added hosts using a host template.
    1. You can select an existing host template, or create a new one.
    2. To create a new host template, click the + Create... button. This will open the Create New Host Template pop-up. See Host Templates for details on how you select the role groups that define the roles that should run on a host. When you have created the template, it will appear in the list of host templates from which you can choose.
    3. Select the host template you want to use.
    4. By default Cloudera Manager will automatically start the roles specified in the host template on your newly added hosts. To prevent this, uncheck the option to start the newly-created roles.
  6. When the wizard is finished, you can verify the Agent is connecting properly with the Cloudera Manager Server by clicking the Hosts tab and checking the health status for the new host. If the Health Status is Good and the value for the Last Heartbeat is recent, then the Agent is connecting properly with the Cloudera Manager Server.

If you did not specify a host template during the Add Hosts wizard, then no roles will be present on your new hosts until you add them. You can do this by adding individual roles under the Instances tab for a specific service, or by using a host template. See Role Instances for information about adding roles for a specific service. See Host Templates to create a host template that specifies a set of roles (from different services) that should run on a host.

Enable TLS Encryption or Authentication

If you previously enabled TLS security on your cluster, you must re-enable the TLS options on the Administration page and also configure TLS on each new host after using the Add Hosts wizard. Otherwise, you can ignore this step. For instructions, see Configuring TLS Encryption for Cloudera Manager.

Enable TLS/SSL for CDH Components

If you have previously enabled TLS/SSL on your cluster, and you plan to start these roles on this new host, make sure you install a new host certificate to be configured from the same path and naming convention as the rest of your hosts. Since the new host and the roles configured on it are inheriting their configuration from the previous host, ensure that the keystore or truststore passwords and locations are the same on the new host. For instructions on configuring TLS/SSL, see Configuring TLS/SSL Encryption for CDH Services.

Enable Kerberos

If you have previously enabled Kerberos on your cluster:
  1. Install the packages required to kinit on the new host (see the list in Step 4: Enabling Kerberos Using the Wizard).
  2. If you have set up Cloudera Manager to manage krb5.conf, it will automatically deploy the file on the new host. Note that Cloudera Manager will deploy krb5.conf only if you use the Kerberos wizard. If you have used the API, you will need to manually perform the commands that the wizard calls.

    If Cloudera Manager does not manage krb5.conf, you must manually update the file at /etc/krb5.conf.

Adding a Host by Installing the Packages Using Your Own Method

If you used a different mechanism to install the Oracle JDK, CDH, Cloudera Manager Agent packages, you can use that same mechanism to install the Oracle JDK, CDH, Cloudera Manager Agent packages and then start the Cloudera Manager Agent.
  1. Install the Oracle JDK, CDH, and Cloudera Manager Agent packages using your own method. For instructions on installing these packages, see Installing Cloudera Manager, CDH, and Managed Services.
  2. After installation is complete, start the Cloudera Manager Agent. For instructions, see Starting, Stopping, and Restarting Cloudera Manager Agents.
  3. After the Agent is started, you can verify the Agent is connecting properly with the Cloudera Manager Server by clicking the Hosts tab and checking the health status for the new host. If the Health Status is Good and the value for the Last Heartbeat is recent, then the Agent is connecting properly with the Cloudera Manager Server.
  4. If you have enabled TLS security on your cluster, you must enable and configure TLS on each new host. Otherwise, ignore this step.
    1. Enable and configure TLS on each new host by specifying 1 for the use_tls property in the /etc/cloudera-scm-agent/config.ini configuration file.
    2. Configure TLS security on the new hosts by following the instructions in Configuring TLS Encryption for Cloudera Manager.
  5. If you have previously enabled TLS/SSL on your cluster, and you plan to start these roles on this new host, make sure you install a new host certificate to be configured from the same path and naming convention as the rest of your hosts. Since the new host and the roles configured on it are inheriting their configuration from the previous host, ensure that the keystore or truststore passwords and locations are the same on the new host. For instructions on configuring TLS/SSL, see Configuring TLS/SSL Encryption for CDH Services.

  6. If you have previously enabled Kerberos on your cluster:
    1. Install the packages required to kinit on the new host (see the list in Step 4: Enabling Kerberos Using the Wizard).
    2. If you have set up Cloudera Manager to manage krb5.conf, it will automatically deploy the file on the new host. Note that Cloudera Manager will deploy krb5.conf only if you use the Kerberos wizard. If you have used the API, you will need to manually perform the commands that the wizard calls.

      If Cloudera Manager does not manage krb5.conf, you must manually update the file at /etc/krb5.conf.

Page generated July 25, 2018.