You can review the changes in certain features or functionalities of Cloudera Manager that have resulted in a change in behavior from the previously
released version to this version of Cloudera Manager 7.13.2.
Cloudera Manager 7.13.2 introduces functional adjustments, behavioral
updates, and includes all cumulative hotfixes from 7.13.1.100 through 7.13.1.700. For a
comprehensive record of all functional adjustments in Cloudera Manager
7.13.1.x, see Behavioral Changes 7.13.1.x.
Cloudera Manager 7.13.2
Summary: Enhanced the security of Spark by implementing new default configuration settings
Previous behavior:
spark.ui.enabled=true: possible initiation of an HTTP service that can be accessed from external hosts.
spark.io.encryption.keySizeBits=128: the default Spark keySizeBits
New behavior:
spark.ui.enabled=false: preventing initiation of an HTTP service that can be accessed from external hosts.
spark.io.encryption.keySizeBits=256: the default Spark keySizeBits has been increased from 128 to 256
Summary: Cloudera Manager 7.13.2 introduces changes to its
underlying SAML library, impacting Service Provider (SP) metadata signing, response
binding options, and message signing algorithms.
Previous behavior:
Metadata Signing: The SAML library supported the signing of the Service
Provider’s (Cloudera Manager) metadata.
Response Binding: SAML Response Binding supported only
POST & ARTIFACT, with the default set to
POST.
Message Signing Algorithm: You could select the Message Signing
Algorithm from a list: RSA_SHA1, RSA_SHA256,
RSA_SHA384, RSA_SHA512.
New behavior:
Metadata Signing: The SAML library no longer supports the signing of
the Service Provider’s (Cloudera Manager) metadata.
Response Binding: SAML Response Binding will now support only
POST & REDIRECT, with the default set to
POST.
Message Signing Algorithm: The Message Signing Algorithm defaults to
RSA_SHA256 (which is secure), and Cloudera Manager will provide no options to select from the
UI.
Summary: When Cloudera Manager runs in
FIPS-enabled mode, it does not use the JVM’s default cacerts
truststore, as it is in a non-FIPS JKS format.
Previous behavior:
In standard (non-FIPS) mode, Cloudera Manager relies on the JVM’s
default cacerts truststore, which is in JKS format. This allows Cloudera Manager to automatically trust the default CA certificates
shipped with the JDK and establish secure connections to external endpoints such as
S3 or Cloudera repositories.
New behavior:
In FIPS mode, only FIPS-compliant keystore formats (such as BCFKS)
are permitted. Because the default cacerts is in JKS format, Cloudera Manager skips loading it to prevent startup failures and
instead uses the Cloudera Manager-provided truststore exclusively.
This ensures consistent and reliable operation under FIPS compliance, but means that
Cloudera Manager does not automatically trust certificates
present only in the JVM's default cacerts.
As a result, connections to certain external endpoints (for example, public cloud
services, S3, Cloudera download URLs) might fail
unless their certificates are also present in the Cloudera Manager-provided truststore.
Summary: Removed the
hbase.secure.rpc.engine configuration property
Previous behavior:
The hbase.secure.rpc.engine configuration property is obsolete
because HBase performs replication securely by default.
New behavior:
The hbase.secure.rpc.engine configuration property is removed
from the Cloudera Manager because it is obsolete and no longer
needed.
The default value of the Region Mover Threads configuration is
updated
Previous behavior:
The current default value for the configuration > HBase > Configuration > Region Mover Threads is set to 1
New behavior:
As only a single thread is utilized for region movement, the overall operation
exhibits poor performance. The default value is updated 20, which is proposed to
leverage 20 region mover threads and is expected to yield substantial performance
improvements.
HBase BucketCache configuration names and descriptions are incorrect in Cloudera Manager
Previous behavior:
The display names and descriptions of the BucketCache configuration names are as
follows:
hbase.rs.evictblocksonclose = HBase region server cache
data blocks on read (Cache data blocks on read)
hbase.block.data.cacheonread = HBase region server evict
blocks of a file cache when the file is closed (Evict all blocks of a given file
from the block cache when the file is closed)
New behavior:
The display names and descriptions are corrected in Cloudera Manager for the following configuration items:
hbase.rs.evictblocksonclose = HBase RegionServer evict
blocks on closed (Evict all blocks of a given file from the block cache when the
region is closed)
hbase.block.data.cacheonread = HBase RegionServer cache
data blocks on read (Cache data blocks on read)
HBOSS related configuration items are removed from Cloudera Manager
Previous behavior:
Cloudera Manager contains the following HBOSS related
configuration items.
fs.hboss.fs.s3a.impl
fs.hboss.sync.impl
fs.s3a.connection.maximum
fs.s3a.threads.max
New behavior:
The above items are removed from HBase Cloudera Manager
configuration because HBOSS support is deprecated.
The BucketCache related configuration items are dynamically configurable in Cloudera Manager
Previous behavior:
The following HBase BucketCache related configuration items were previously not
dynamically configurable in Cloudera Manager, and users had to
configure them using the advanced configuration snippet (safety valve).
hbase.bucketcache.acceptfactor
hbase.bucketcache.minfactor
New behavior:
You can now configure these items dynamically in Cloudera Manager.
The change takes effect immediately without requiring an HBase service restart.
HBase supports Log4J2 for logging
Previous behavior:
HBase used Log4j 1.x for its logging framework.
New behavior:
HBase now uses Log4j2 due to its enhanced performance, improved features, and
ongoing security support.
Summary: Allowing configurable File Descriptor (FD)
limits in supervisord
Previous behavior:
Each service role ran with the File Descriptor (FD) limit you explicitly configured
in Cloudera Manager, or with the default limit if you set none.
New behavior:
The new behavior allows
administrators to increase the FD limit globally across all managed services by
modifying the relevant supervisord service file or
system.conf, regardless of individual role settings.
Configuration Rules: The FD limit you define in
/usr/lib/systemd/system/cloudera-scm-supervisord.service or
/etc/systemd/system.conf (depending on the Cloudera Manager
version) applies to the supervisord daemon itself.
supervisord inherits this limit for service roles only when you
configure no explicit FD limit for that role.
Summary: Apache Ranger policies for Kafka topics and the
consumer group used by Atlas asynchronous import
Previous behavior:
Cloudera Manager did not add default Apache Ranger policies that grant the atlas
user permission to create, edit, or delete Kafka topics with the
ATLAS_IMPORT_ prefix or to access the atlas_import consumer
group.
New behavior:
Cloudera Manager adds default Apache Ranger policies so the atlas user can create,
configure, alter, publish, and delete Kafka topics with the
ATLAS_IMPORT_ prefix and can use the atlas_import consumer group
for Atlas asynchronous import.
Summary: Removed EventCounter from Hadoop
Previous behavior:
The EventCounter functionality was deprecated and later removed by Apache
Hadoop.
New behavior:
The occurrences of EventCounter have been removed from the Java code and log4j
configuration files.
Summary: Component-level custom Java home configuration
removed for Kafka, Schema Registry, SMM, and SRM
Previous behavior:
You could configure a component-specific Java home for Kafka, Schema Registry,
Streams Messaging Manager (SMM), and Streams Replication Manager (SRM).
New behavior:
The component-level custom Java home configuration options are removed for Kafka,
Schema Registry, SMM, and SRM. These services now use the host-level
java_home configuration. If you previously set a
component-specific Java home for any of these services, verify the host-level
java_home setting after upgrading.
In a Cloudera Manager 7.13.2.0 Cluster
Effective FD Limit
You configure HDFS roles with an FD limit of 72K.
They run with 72K.
You configure Ozone roles with an FD limit of 48K.
They run with 48K.
The supervisord service file sets an FD limit of 64K.
supervisord itself uses 64K.
You do not configure Hive roles explicitly.
Hive inherits the 64K limit from supervisord.
If you want to increase the File Descriptor (FD) limit across all services managed by
Cloudera Manager, you should perform the following steps:
Option A: If Cloudera Manager version is 7.13.2 or higher
Go to
/usr/lib/systemd/system/cloudera-scm-supervisord.service.
Make the change that is prescribed in the
cloudera-scm-supervisord.service file to increase the FD
limit across services.
Then run systemctl daemon-reload followed by
systemctl restart cloudera-scm-supervisord.
Option B: If Cloudera Manager version is lower than 7.13.2
Go to /etc/systemd/system.conf.
This file will contain #DefaultLimitNOFILE=. You need to
uncomment this line (if it is commented) and set an FD value of your
choice.
Then run systemctl daemon-reload followed by
systemctl restart cloudera-scm-supervisord.
After you implement this change, the FD limit will apply across all services managed by
Cloudera Manager.