B bds-config.json Configuration Examples
These examples demonstrate some of the available configuration parameters and values.
Example Configuration File: Implicit Default Values
The values that this example shows for the parameters in this group are
the implicit default values, which do not need to be specified in the configuration
file. If you want to set non-default values, then include the
hadoop_ids
parameters in the configuration file.
{
"cluster": {
"name": "cluster",
"database_compatibility" : [ "12.1", "19" ]
},
"object_store_support" : {
"enabled" : "true",
"cell_http_proxy" : "http://proxy1.server.com:80",
"cell_no_proxy" : "localhost,127.0.0.1,.my.<domain>.com,my.<domain>.com",
"database_http_proxy" : "http://proxy2.server.com:80",
"database_no_proxy" : "localhost,127.0.0.1,.my.<domain>.com,my.<domain>.com"
},
"api" : {
"hostname" : "admin.server.com",
"skip_health_check" : "true",
"port" : 5050,
"restart_stale" : "false"
},
"repositories" : {
"url" : [
"http://repo1.<domain>.com/loc/hadoop",
"http://repo2.<domain>.com/loc",
"http://alternate.<domain>.com/backup/repo"
],
"dir" : [ "/root/hadooprepo" ]
},
"network" : {
"use_infiniband" : "false",
"selection_subnet" : "5.32.128.10/21",
"http_proxy" : "http://my.proxy.server.com:80",
"https_proxy" : "http://mysecure.proxy.server.com:80"
"excluded_nodes" : [ "edge.node1.<domain>.com", "edge.node2.<domain>.com" ]
},
"security" : {
"database_auth_enabled" : "true",
"impersonation_enabled" : "true",
"impersonation_usehosts" : "true",
"impersonation_blacklist" : "hdfs,hive"
},
"kerberos" : {
"principal" : "oracle/mycluster@MY.<DOMAIN>.COM",
"keytab" : "/home/oracle/security/oracle.keytab",
"hdfs-principal" : "hdfs/mycluster@MY.<DOMAIN>.COM",
"hdfs-keytab" : "/home/hdfs/security/hdfs.keytab",
"db-service-principal" : "oracle/dbnode.<domain>.com@MY.<DOMAIN>.COM",
"db-service-keytab" : "/home/edgedb/edgedb.keytab"
},
"edgedb": {
"node" : "dbnode.<domain>.com",
"enabled" : "true",
"sync_hive_db_list" : "my_hive_db_1,my_hive_db2"
},
"memory" : {
"min_hard_limit" : 16384,
"max_percentage" : 30
},
"hadoop_ids" : {
"hdfs_user" : "hdfs",
"hdfs_group" : "hdfs",
"hive_user" : "hive",
"hive_group" : "hive"
}
}
Example Configuration File: Database Authentication with Required databaseack Operation
The following is an example configuration file that uses database authentication and
requires a databaseack
operation.
{
"security" : {
"database_auth_enabled" : "true"
},
"network" : {
"use_infiniband" : "false"
}
}
Example Configuration File: Database Authentication with Object Store Access
The following example uses Database Authentication with object store
access.
{
"cluster": {
"database_compatibility" : [ "19" ]
},
"network" : {
"use_infiniband" : "false"
},
"security" : {
"database_auth_enabled" : "true",
"impersonation_enabled" : "true",
"impersonation_usehosts" : "true"
},
"kerberos" : {
"principal" : "oracle/bdshive@BDAVMSERVICE.ORACLE.COM",
"keytab" : "/root/oracle.keytab",
"hdfs-principal" : "hdfs/bdshive@BDAVMSERVICE.ORACLE.COM",
"hdfs-keytab" : "/root/hdfs.keytab"
},
"object_store_support" : {
"enabled" : "true",
"cell_http_proxy" : "http://www-proxy-hqdc.us.oracle.com:80",
"cell_no_proxy" : "",
"database_http_proxy" : "http://www-proxy-hqdc.us.oracle.com:80",
"database_no_proxy" : ""
}
}