####Table of Contents
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with Zookeeper
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Development - Guide for contributing to the module
This module installs and configures Apache Zookeeper quorum cluster. It expects list of hostnames, where zookeeper should be running. Zookeeper IDs will be generated according to the ordering of these hostnames.
Optionally the security based on Kerberos can be enabled.
Tested on:
- Debian 7/wheezy: Cloudera distribution (tested with CDH 5.3.0/5.5.1/5.7.1, Zookeeper 3.4.5)
- Debian 8/jessie: BigTop distribution (BigTop 1.2.0, Zookeeper 3.4.6)
- Ubuntu 14/trusty
- RHEL 6/7 and clones: Cloudera distribution (tested with CDH 5.4.2, Zookeeper 3.4.5)
###What cesnet-zookeeper module affects
- Packages: zookeeper server package
- Alternatives:
- alternatives are used for /etc/zookeeper/conf in Cloudera
- this module switches to the new alternative by default on Debian, so the Cloudera original configuration can be kept intact
- Files modified:
- /etc/zookeeper/conf*
- /var/lib/zookeeper/*
- Secret files (keytab): ownerships and permissions modified
- Java system properties set for Zookeeper:
- java.security.auth.login.config
- zookeeper.security.auth_to_local
There are several known or intended limitations in this module.
Be aware of:
-
Repositories - see cesnet-hadoop module Setup Requirements for details
-
Secure mode: keytab must be prepared in /etc/security/keytabs/zookeeper.service.keytab (see realm parameter)
Example: one-machine zookeeper quorum without security:
class{'zookeeper':
hostnames => [ $::fqdn ],
}
include ::zookeeper::server
It is recommended to have at least three or more (odd-numbered) zookeeper machines. All zookeeper hostnames must be specified in hostnames and the order must be the same across all the nodes.
Example: Setup with security:
class{'zookeeper':
hostnames => [ $::fqdn ],
realm => 'MY.REALM',
}
include ::zookeeper::server
The keytab file must be available at /etc/security/keytabs/zookeeper.service.keytab.
Note: you can consider removing or changing property zookeeper.security.auth_to_local:
properties => {
'zookeeper.security.auth_to_local' => '::undef',
}
Default value is valid for principal names according to Hadoop documentation at http://hadoop.apache.org/docs/stable/hadoop-project-dist/hadoop-common/SecureMode.html and it is needed only with cross-realm authentication.
It is recommended to set super user credentials (for example to be able to restore bad ACLs).
####Get the digest string: (replace $PASSWORD by real password)
export ZK_HOME=/usr/lib/zookeeper
java -cp $ZK_HOME/lib/*:$ZK_HOME/zookeeper.jar org.apache.zookeeper.server.auth.DigestAuthenticationProvider super:$PASSWORD
####Use the digest in properties:
class{'zookeeper':
hostnames => [ $::fqdn ],
realm => 'MY.REALM',
properties => {
zookeeper.DigestAuthenticationProvider.superDigest => 'super:XXXXX',
},
}
include ::zookeeper::server
####Using in the client:
zooclient-cli
addauth digest super:PASSWORD
zookeeper
: Configuration class for Zookeeperzookeeper::client
: Zookeeper clientzookeeper::client::config
: Zookeeper client configurationzookeeper::client::install
: Zookeeper client installationzookeeper::client::service
: Stub classzookeeper::common::config
: Zookeeper common configurationzookeeper::common::postinstall
: Preparation steps after installationzookeeper::params
: Zookeeper module parameterszookeeper::server
: Zookeeper nodezookeeper::server::config
: Zookeeper server configurationzookeeper::server::install
: Zookeeper node installationzookeeper::server::service
: Launch zookeeper service
####alternatives
Switches the alternatives used for the configuration. Default: 'cluster' (Debian) or undef.
It can be used only when supported (for example with Cloudera distribution).
####hostnames
Array of zookeeper nodes hostnames. Default: undef.
####myid
ID of zookeeper server in the quorum. Default: undef (=autodetect).
myid is the ID number of the zookeeper server in the quorum. It's the number starting from 1 and it must be unique for each node.
By default, the ID is generated automatically as order of the node hostname (::fqdn) in the hostnames array.
####properties
Generic properties to be set for the zookeeper cluster. Default: undef.
Some properties are set automatically, "::undef" string explicitly removes given property. Empty string sets the empty value.
####keytab
Server keytab file. Default: '/etc/security/keytab/zookeeper.service.keytab'.
####principal
Server principal. Default: "zookeeper/${::fqdn}@${realm}".
####realm
Enables security and specifies Kerberos realm to use. Default: ''.
Empty string disables the security.
With enabled security there are required:
- configured Kerberos (/etc/krb5.conf)
- /etc/security/keytab/zookeeper.service.keytab (on zookeeper nodes)
- Repository: https://github.com/MetaCenterCloudPuppet/cesnet-zookeeper
- Tests:
- basic: see .travis.yml
- vagrant: https://github.com/MetaCenterCloudPuppet/hadoop-tests
- Email: František Dvořák <[email protected]>