Property type
|
Either Built-in or Repository
Built-in: No property data stored centrally.
Repository: Select the repository file in which the
properties are stored. The fields that follow are completed automatically using
the data retrieved.
|
Distribution
|
Select the cluster you are using from the drop-down list. The options in the
list vary depending on the component you are using. Among these options, the following
ones requires specific configuration:
-
If available in this Distribution drop-down
list, the Microsoft HD
Insight option allows you to use a Microsoft HD Insight
cluster. For this purpose, you need to configure the connections to the HD
Insightcluster and the Windows Azure Storage service of that cluster in the
areas that are displayed. For
detailed explanation about these parameters, search for configuring the
connection manually on Talend Help Center (https://help.talend.com).
-
If you select Amazon EMR, find more details about Amazon EMR getting started in
Talend Help Center (https://help.talend.com).
-
The Custom option
allows you to connect to a cluster different from any of the distributions
given in this list, that is to say, to connect to a cluster not officially
supported by
Talend
.
-
Select Import from existing
version to import an officially supported distribution as base
and then add other required jar files which the base distribution does not
provide.
-
Select Import from zip to
import the configuration zip for the custom distribution to be used. This zip
file should contain the libraries of the different Hadoop elements and the index
file of these libraries.
In
Talend
Exchange, members of
Talend
community have shared some ready-for-use configuration zip files
which you can download from this Hadoop configuration
list and directly use them in your connection accordingly. However, because of
the ongoing evolution of the different Hadoop-related projects, you might not be
able to find the configuration zip corresponding to your distribution from this
list; then it is recommended to use the Import from
existing version option to take an existing distribution as base
to add the jars required by your distribution.
Note that custom versions are not officially supported by
Talend
.
Talend
and its community provide you with the opportunity to connect to
custom versions from the Studio but cannot guarantee that the configuration of
whichever version you choose will be easy, due to the wide range of different
Hadoop distributions and versions that are available. As such, you should only
attempt to set up such a connection if you have sufficient Hadoop experience to
handle any issues on your own.
Note:
In this dialog box, the active check box must be kept
selected so as to import the jar files pertinent to the connection to be
created between the custom distribution and this component.
For a step-by-step example about how to connect to a custom
distribution and share this connection, see Hortonworks.
|
Version
|
Select the version of the Hadoop distribution you are using. The available
options vary depending on the component you are using.
|
Scheme
|
Select the URI scheme of the file system to be used from the
Scheme drop-down list. This scheme could be
- HDFS
- WebHDFS. WebHDFS with SSL is not supported yet.
- ADLS. Only Azure Data Lake Storage Gen1 is supported.
The schemes present on this list vary depending on the distribution you
are using and only the scheme that appears on this list with a given
distribution is officially supported by Talend.
Once a scheme is
selected, the corresponding syntax such as
webhdfs://localhost:50070/ for WebHDFS is displayed in the
field for the NameNode location of your cluster.
If you have selected
ADLS, the connection parameters to be defined become:
-
In the
Client ID and the Client
key fields, enter, respectively, the authentication
ID and the authentication key generated upon the registration of the
application that the current Job you are developing uses to access
Azure Data Lake Storage.
Ensure that the application to be used has appropriate
permissions to access Azure Data Lake. You can check this on the
Required permissions view of this application on Azure. For further
information, see Azure documentation Assign the Azure AD application to
the Azure Data Lake Storage account file or folder.
-
In the
Token endpoint field, copy-paste the
OAuth 2.0 token endpoint that you can obtain from the
Endpoints list accessible on the
App registrations page on your Azure
portal.
For a
video demonstration, see Configure and use Azure in a
Job.
|
NameNode URI
|
Type in the URI of the Hadoop NameNode, the master node of a
Hadoop system. For example, we assume that you have chosen a machine called masternode as the NameNode, then the location is
hdfs://masternode:portnumber. If you are using WebHDFS, the location should be
webhdfs://masternode:portnumber; WebHDFS with SSL is not
supported yet.
|
Inspect the classpath for configurations
|
Select this check box to allow the component to check the configuration
files in the directory you have set with the $HADOOP_CONF_DIR
variable and directly read parameters from these files in this directory. This
feature allows you to easily change the Hadoop configuration for the component to
switch between different environments, for example, from a test environment to a
production environment.
In this situation, the fields or options used to configure Hadoop
connection and/or Kerberos security are hidden.
If you want to use certain parameters such as the Kerberos parameters but
these parameters are not included in these Hadoop configuration files, you need to
create a file called talend-site.xml and put this file into the
same directory defined with $HADOOP_CONF_DIR. This talend-site.xml file should read as follows:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
|
<!-- Put site-specific property overrides in this file. --> <configuration> <property> <name>talend.kerberos.authentication </name> <value>kinit </value> <description> Set the Kerberos authentication method to use. Valid values are: kinit or keytab. </description> </property> <property> <name>talend.kerberos.keytab.principal </name> <value>user@BIGDATA.COM </value> <description> Set the keytab's principal name. </description> </property> <property> <name>talend.kerberos.keytab.path </name> <value>/kdc/user.keytab </value> <description> Set the keytab's path. </description> </property> <property> <name>talend.encryption </name> <value>none </value> <description> Set the encryption method to use. Valid values are: none or ssl. </description> </property> <property> <name>talend.ssl.trustStore.path </name> <value>ssl </value> <description> Set SSL trust store path. </description> </property> <property> <name>talend.ssl.trustStore.password </name> <value>ssl </value> <description> Set SSL trust store password. </description> </property> </configuration> |
The parameters read from these configuration files override the default
ones used by the Studio. When a parameter does not exist in these configuration
files, the default one is used.
|
Use kerberos authentication
|
If you are accessing the Hadoop cluster running
with Kerberos security, select this check box, then, enter the Kerberos
principal name for the NameNode in the field displayed. This enables you to use
your user name to authenticate against the credentials stored in Kerberos.
-
If this cluster is a MapR cluster of the version 5.0.0 or later, you can set the
MapR ticket authentication configuration in addition or as an alternative by following
the explanation in Connecting to a security-enabled MapR.
Keep in mind that this configuration generates a new MapR security ticket for the username
defined in the Job in each execution. If you need to reuse an existing ticket issued for the
same username, leave both the Force MapR ticket
authentication check box and the Use Kerberos
authentication check box clear, and then MapR should be able to automatically
find that ticket on the fly.
This check box is available depending on the Hadoop distribution you are
connecting to.
|
Use a keytab to authenticate
|
Select the Use a keytab to authenticate
check box to log into a Kerberos-enabled system using a given keytab file. A keytab
file contains pairs of Kerberos principals and encrypted keys. You need to enter the
principal to be used in the Principal field and
the access path to the keytab file itself in the Keytab field. This keytab file must be stored in the machine in
which your Job actually runs, for example, on a Talend Jobserver.
Note that the user that executes a keytab-enabled Job is not necessarily
the one a principal designates but must have the right to read the keytab file being
used. For example, the user name you are using to execute a Job is user1 and the principal to be used is guest; in this
situation, ensure that user1 has the right to read the keytab
file to be used.
|
User name
|
User authentication name of HDFS.
|
Group
|
Enter the membership including the authentication user under which the HDFS
instances were started. This field is available depending on the distribution
you are using.
|
Hadoop properties
|
Talend Studio
uses a default configuration for its engine to perform
operations in a Hadoop distribution. If you need to use a custom configuration in a specific
situation, complete this table with the property or properties to be customized. Then at
runtime, the customized property or properties will override those default ones.
For further information about the properties required by Hadoop and its related systems such
as HDFS and Hive, see the documentation of the Hadoop distribution you
are using or see Apache’s Hadoop documentation on http://hadoop.apache.org/docs and then select the version of the documentation you want. For demonstration purposes, the links to some properties are listed below:
|
Use datanode hostname
|
Select the Use datanode hostname check box
to allow the Job to access datanodes via their hostnames. This actually sets the dfs.client.use.datanode.hostname property to true.
|
Setup HDFS encryption configurations
|
If the HDFS transparent encryption has been enabled in your cluster, select
the Setup HDFS encryption configurations check
box and in the HDFS encryption key provider field
that is displayed, enter the location of the KMS proxy.
For further information about the HDFS transparent encryption and its KMS proxy, see Transparent Encryption in HDFS.
|