B bds-config.json Configuration Examples

These examples demonstrate some of the available configuration parameters and values.

Example Configuration File: Implicit Default Values

The values that this example shows for the parameters in this group are the implicit default values, which do not need to be specified in the configuration file. If you want to set non-default values, then include the hadoop_ids parameters in the configuration file.

{
    "cluster": {
        "name": "cluster",
         "database_compatibility" : [ "12.1", "19" ]
    },
    "object_store_support" : {
        "enabled" : "true",
        "cell_http_proxy"     : "http://proxy1.server.com:80",
        "cell_no_proxy"       : "localhost,127.0.0.1,.my.<domain>.com,my.<domain>.com",
        "database_http_proxy" : "http://proxy2.server.com:80",
        "database_no_proxy"   : "localhost,127.0.0.1,.my.<domain>.com,my.<domain>.com"
    },
    "api" : {     
        "hostname"            : "admin.server.com",
        "skip_health_check"   : "true",
        "port" : 5050,
        "restart_stale" : "false"
    },
    "repositories" : {
        "url" : [
            "http://repo1.<domain>.com/loc/hadoop",
            "http://repo2.<domain>.com/loc",
            "http://alternate.<domain>.com/backup/repo"
        ],
        "dir" : [ "/root/hadooprepo" ]
    },
    "network" : {
        "use_infiniband"   : "false",
        "selection_subnet" : "5.32.128.10/21",
        "http_proxy"     : "http://my.proxy.server.com:80",
        "https_proxy"    : "http://mysecure.proxy.server.com:80"
	 "excluded_nodes" : [ "edge.node1.<domain>.com", "edge.node2.<domain>.com" ] 
		},
    "security" : {
        "database_auth_enabled"   : "true",
        "impersonation_enabled"   : "true",
        "impersonation_usehosts"  : "true",
        "impersonation_blacklist" : "hdfs,hive"
    },
    "kerberos" : {
        "principal"   : "oracle/mycluster@MY.<DOMAIN>.COM",
        "keytab"      : "/home/oracle/security/oracle.keytab",
        "hdfs-principal" : "hdfs/mycluster@MY.<DOMAIN>.COM",
        "hdfs-keytab"    : "/home/hdfs/security/hdfs.keytab",
        "db-service-principal" : "oracle/dbnode.<domain>.com@MY.<DOMAIN>.COM",
        "db-service-keytab"    : "/home/edgedb/edgedb.keytab"

    },
    "edgedb": {
        "node"    : "dbnode.<domain>.com",  
        "enabled" : "true",  
        "sync_hive_db_list" : "my_hive_db_1,my_hive_db2"  
    },
    "memory" : {
        "min_hard_limit" : 16384,
        "max_percentage" : 30
    },
    "hadoop_ids" : {
        "hdfs_user"  : "hdfs",
        "hdfs_group" : "hdfs",
        "hive_user"  : "hive",
        "hive_group" : "hive"
    }  
}

Example Configuration File: Database Authentication with Required databaseack Operation

The following is an example configuration file that uses database authentication and requires a databaseack operation.
{
  "security" : {
    "database_auth_enabled" : "true"
  },
  "network" : {
    "use_infiniband" : "false"
  }
}

Example Configuration File: Database Authentication with Object Store Access

The following example uses Database Authentication with object store access.
{
    "cluster": {
        "database_compatibility" : [ "19" ]
    },
    "network" : {
        "use_infiniband"   : "false"
    },
    "security" : {
        "database_auth_enabled"   : "true",
        "impersonation_enabled"   : "true",
        "impersonation_usehosts"  : "true"
    },
    "kerberos" : {
        "principal" : "oracle/bdshive@BDAVMSERVICE.ORACLE.COM",
        "keytab" : "/root/oracle.keytab",
        "hdfs-principal" : "hdfs/bdshive@BDAVMSERVICE.ORACLE.COM",
        "hdfs-keytab" : "/root/hdfs.keytab"
    },

    "object_store_support" : {
        "enabled"             : "true",
        "cell_http_proxy"     : "http://www-proxy-hqdc.us.oracle.com:80",
        "cell_no_proxy"       : "",
        "database_http_proxy" : "http://www-proxy-hqdc.us.oracle.com:80",
        "database_no_proxy"   : ""
    }
}