NetBackup™ for Hadoop Administrator's Guide
- Introduction
- Verifying the pre-requisites and best practices for the Hadoop plug-in for NetBackup
- Configuring NetBackup for Hadoop
- About configuring NetBackup for Hadoop
- Managing backup hosts
- Adding Hadoop credentials in NetBackup
- Configuring the Hadoop plug-in using the Hadoop configuration file
- Configuration for a Hadoop cluster that uses Kerberos
- Configuring NetBackup policies for Hadoop plug-in
- Disaster recovery of a Hadoop cluster
- Performing backups and restores of Hadoop
- Troubleshooting
- About troubleshooting NetBackup for Hadoop issues
- About NetBackup for Hadoop debug logging
- Troubleshooting backup issues for Hadoop data
- Backup operation fails with error 6609
- Backup operation failed with error 6618
- Backup operation fails with error 6647
- Extended attributes (xattrs) and Access Control Lists (ACLs) are not backed up or restored for Hadoop
- Backup operation fails with error 6654
- Backup operation fails with bpbrm error 8857
- Backup operation fails with error 6617
- Backup operation fails with error 6616
- Backup operation fails with error 84
- NetBackup configuration and certificate files do not persist after the container-based NetBackup appliance restarts
- Unable to see incremental backup images during restore even though the images are seen in the backup image selection
- One of the child backup jobs goes in a queued state
- Troubleshooting restore issues for Hadoop data
- Restore fails with error code 2850
- NetBackup restore job for Hadoop completes partially
- Extended attributes (xattrs) and Access Control Lists (ACLs) are not backed up or restored for Hadoop
- Restore operation fails when Hadoop plug-in files are missing on the backup host
- Restore fails with bpbrm error 54932
- Restore operation fails with bpbrm error 21296
- Configuration file is not recovered after a disaster recovery
- Index
Configuring communication between NetBackup and Hadoop clusters that are SSL-enabled (HTTPS)
To enable communication between NetBackup and Hadoop clusters that are SSL-enabled (HTTPS), complete the following steps:
Update the hadoop.conf file that is located in the
/usr/openv/var/global/directory on the backup host using the use_ssl parameter in the following format:{ "application_servers": { "hostname_of_namenode1": { "use_ssl":true } } }Configuration file format for SSL and HA:
{ "application_servers": { "primary.host.com": { "use_ssl":true, "failover_namenodes": [ { "hostname":"secondary.host.com", "use_ssl":true, "port":11111 } ] } } }By default, the value is set to false.
If you use multiple backup hosts, the backup host in that has defined the use_ssl parameter in the hadoop.conf file is used for communication.
You must define the use_ssl parameter in the hadoop.conf file for every Hadoop cluster.
Use the nbsetconfig command to configure the following NetBackup configuration options on the access host:
For more information on the configuration options, refer to the NetBackup Administrator's Guide.
ECA_TRUST_STORE_PATH
Specifies the file path to the certificate bundle file that contains all trusted root CA certificates.
If you have already configured this external CA option, append the Hadoop CA certificates to the existing external certificate trust store.
If you have not configured the option, add all the required Hadoop server CA certificates to the trust store and set the option.
ECA_CRL_PATH
Specifies the path to the directory where the certificate revocation lists (CRL) of the external CA are located.
If you have already configured this external CA option, append the Hadoop server CRLs to the CRL cache.
If you have not configured the option, add all the required CRLs to the CRL cache and then set the option.
HADOOP_SECURE_CONNECT_ENABLED
This option affects Hadoop secure communication.
Set this value to YES when you have set the use_ssl as true in the hadoop.conf file. The single value is applicable to all Hadoop clusters when use_ssl is set to true.
For Hadoop, secure communication is enabled by default.
This option lets you skip the security certificate validation.
HADOOP_CRL_CHECK
Lets you validate the revocation status of the Hadoop server certificate against the CRLs.
The single value is applicable to all Hadoop clusters when use_ssl is set to true.
By default, the option is disabled.