Skip to main content

Cloudera manager Installation on Ubuntu

Steps followed : 

1. change hosts file
2.sudo apt-get install ssh
3. save public keys as 'authorized_keys'
   ssh-keygen
   cd ~/.ssh
   cat id_rsa.pub  >  authorized_keys

4. download cloudera repo from "wget http://archive-primary.cloudera.com/cdh5/one-click-install/precise/amd64/cdh5-repository_1.0_all.deb"
5. install this file using "sudo dpkg -i cdh5-repository_1.0_all.deb"
6. download cloudera install manager from "wget http://archive-primary.cloudera.com/cm5/installer/latest/cloudera-manager-installer.bin"
7. change permission on file "chmod +x cloudera-manager-installer.bin"
8. start the installer "sudo ./cloudera-manager-installer.bin"
9. follow steps and your install is complete.

Errors faced while installtion :

1. After step 8 Errors faced as I had previous Cloudera  installations on my system .
Resolution :
unsinstall the previous installation if any .

-->sudo  /usr/share/cmf/uninstall-cloudera-manager.sh

-->sudo rm /etc/cloudera-scm-server/db.properties

2. While adding cluster through cloud manager(CDH 4) I got installation failed error.  Exhausted available authentication methods.

Resolution :
Follow :https://community.cloudera.com/t5/Cloudera-Manager-Installation/Exhausted-available-authentication-methods/td-p/24518

Edit the sudoer file sudo nano /etc/sudoers ...

root  ALL=(ALL:ALL) ALL

%admin  ALL=(ALL) ALL

%sudo   ALL=(ALL:ALL) ALL

userid   ALL=(ALL)NOPASSWD:ALL  ---(I added this line e-g. ubuntu   ALL=(ALL)NOPASSWD:ALL)

Note - userid is the id through which you are logging to your linux box


You have to login as "another user -e.g ubuntu" by giving your id and password and yes you are done. It won't fail again with the error "Exhausted available......" . I mean that's what happened with me.

Video I followed for the set up :
https://www.youtube.com/watch?v=z0l87tArUDk

Comments

Popular posts from this blog

Should we allow our staff to use social networking sites? Some people say they are dangerous but I can't see how. Can you explain the dangers? > EXPERT RESPONSE There's nothing wrong with using Facebook, other than the potential impact on working time, but that's not a security matter! The issue is in how your staff configures Facebook, and what information they place on it. A few tips to pass on to your staff: Don't allow anyone that isn't part of your network of 'friends' to see your profile. Don't allow non-friends to see your friends. Why? I could easily impersonate one of your friends, fake a new profile, and send you an invite. You accept, thinking a genuine friend has created a new profile, then I'm in your network of friends and can see your profile. Think about what information is in your profile. What would be useful in stealing your identity? Date of birth, address, email address, employer, interests. why does this type of information n...

How to Use Chisanbop (Korean Finger Math) for Basic Addition and Counting | eHow.com

How to Use Chisanbop (Korean Finger Math) for Basic Addition and Counting eHow.com Difficulty: Easy Instructions Step 1 In Chisanbop you'll be using your two hands and ten fingers to represent numbers from 0 to 99. Start out with your hands out in front of you with closed fists. This represents 0. Each finger (not thumb) on your right hand represents 1. To represent 3, just press down three right hand fingers. Your right thumb represents 5. To represent 7, press down your right thumb and 2 right hand fingers. Think of your right hand as the ones or units place (column). Step 2 Your left hand represents the tens place (column). Each finger on your left hand is worth 10. For example, to represent 30, press down three left hand fingers. To represent 38, do the same, but also use your right hand to represent 8 as described above. Your left thumb represents 50. To represent 86, press down your left thumb and three left hand fingers for the 80, and your right thumb and one righ...

Back to roots ....

While surfing came across this , back to basics : A programming language such as C , FORTRAN , or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer . Such languages are considered high-level because they are closer to human languages and further from machine languages . In contrast, assembly languages are considered low-level because they are very close to machine languages. The main advantage of high-level languages over low-level languages is that they are easier to read, write, and maintain. Ultimately, programs written in a high-level language must be translated into machine language by a compiler or interpreter . The first high-level programming languages were designed in the 1950s. Now there are dozens of different languages, including Ada , Algol, BASIC , COBOL , C, C++ , FORTRAN, LISP , Pascal, and Prolog SOURCE : http://www.webopedia.com/TERM/H/high_level_language.html