Manually Creating and Deploying External Info for Compute Spaces

If you are either modifying or creating your own cluster info file, the properties described in the following sections must be set in the file. After creating the file, deploy the info into the Kubernetes environment as described later on this page.

Settings for External Cluster User Secret

You can either modify the sample mapr-external-info-secure.yaml file (for secure storage clusters) or mapr-external-info-unsecure.yaml file (for unsecure storage clusters) in the examples/secrettemplates directory to set values for the following properties. Or you can create your own custom file. The file must contain valid values for the following properties:
Property Description
name Specifies the name of the external cluster information.
namespace Specifies the namespace in which the information is deployed.
MAPR_USER Specifies the user that runs the Spark job. This must be Base64 encoded. The default value is mapr.
MAPR_PASSWORD Specifies the password of the user that runs the Spark job. This must be Base64 encoded. The default value is mapr.
MAPR_GROUP Specifies the group of the user that runs the Spark job. This must be Base64 encoded. The default value is mapr.
MAPR_UID Specifies the ID of the user that runs the Spark job. This must be Base64 encoded. The default value is 5000.
MAPR_GID Specifies the ID of the group of the user that runs the Spark job. This must be Base64 encoded. The default value is 5000.

Settings for External Server Secret

You can either modify the sample mapr-external-info-secure.yaml file (for secure storage clusters) or mapr-external-info-unsecure.yaml file (for unsecure storage clusters) in the examples/secrettemplates directory to set values for the following properties or create your own custom file. The file must contain valid values for the following properties:
Property Description
clusterid Specifies the ID of the external cluster. This must be Base64 encoded.
maprserverticket Specifies the value of the maprserverticket automatically generated and stored in /opt/mapr/conf directory on the secure storage cluster. This must be Base64 encoded.
ssl_keystore.p12 Specifies the value of the ssl_keystore.p12 automatically generated and stored in /opt/mapr/conf directory on the secure storage cluster. This must be Base64 encoded.
ssl_keystore.pem Specifies the value of the ssl_keystore.pem automatically generated and stored in /opt/mapr/conf directory on the secure storage cluster. This must be Base64 encoded.

Settings for the External Client Secret

You can either modify the sample mapr-external-info-secure.yaml file (for secure storage clusters) or mapr-external-info-unsecure.yaml file (for unsecure storage clusters) in the examples/secrettemplates directory to set values for the following properties or create your own custom file. The file must contain valid values for the following properties:
Property Description
ssl_truststore Specifies the value of the ssl_truststore automatically generated for a secure cluster and stored in /opt/mapr/conf directory on the secure storage cluster. This must be Base64 encoded.
ssl_truststore.p12 Specifies the value of the ssl_keystore.p12 automatically generated and stored in /opt/mapr/conf directory on the secure storage cluster. This must be Base64 encoded.
ssl_truststore.pem Specifies the value of the ssl_keystore.pem automatically generated and stored in /opt/mapr/conf directory on the secure storage cluster. This must be Base64 encoded.

Settings for the External Cluster Host Information

You can modify the mapr-external-info-secure.yaml file (for secure storage clusters) or mapr-external-info-unsecure.yaml file (for unsecure storage clusters) in the examples/secrettemplates directory to set values for service host locations on the external cluster. Or you can create your own custom file. The file must contain values for the following properties:
Property Description
clustername Specifies the name of the external cluster. This must be Base64 encoded.
disableSecurity Specifies whether or not security is disabled on the storage cluster. The value can be one of the following:
  • false – if security is enabled
  • true – if security is disabled
cldbLocations The comma-separated list of CLDB hosts on the external storage cluster. The list is in the following format:
hostname|IP[:port_no][,hostname|IP[:port_no]...]
This must be Base64 encoded.
zkLocations The comma-separated list of ZooKeeper hosts on the external storage cluster. The list is in the following format:
hostname|IP[:port_no][,hostname|IP[:port_no]...] 
This must be Base64 encoded.
esLocations The comma-separated list of Elasticsearch hosts on the external storage cluster. The list is in the following format:
hostname|IP[:port_no][,hostname|IP[:port_no]...] 
This must be Base64 encoded.
tsdbLocations The comma-separated list of openTSDB hosts on the external storage cluster. The list is in the following format:
hostname|IP[:port_no][,hostname|IP[:port_no]...] 
This must be Base64 encoded.
hivemetaLocations The comma-separated list of Hive Metastorage hosts on the external storage cluster. The list is in the following format:
hostname|IP[:port_no][,hostname|IP[:port_no]...] 
This must be Base64 encoded.

Deploying the External Cluster Secrets

After creating the files, deploy the info by running the following command:
kubectl apply -f <mapr-external-cluster-info-file.yaml>