aboutsummaryrefslogtreecommitdiff
path: root/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp
diff options
context:
space:
mode:
Diffstat (limited to 'bigtop-deploy/puppet/modules/hadoop/manifests/init.pp')
-rw-r--r--bigtop-deploy/puppet/modules/hadoop/manifests/init.pp48
1 files changed, 24 insertions, 24 deletions
diff --git a/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp b/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp
index 430e3416..69e26bb6 100644
--- a/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp
+++ b/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp
@@ -49,7 +49,7 @@ class hadoop ($hadoop_security_authentication = "simple",
}
if ("mapred-app" in $roles) {
- include hadoop::mapred-app
+ include hadoop::mapred_app
}
if ("nodemanager" in $roles) {
@@ -153,7 +153,7 @@ class hadoop ($hadoop_security_authentication = "simple",
$kerberos_realm = $hadoop::kerberos_realm,
) inherits hadoop {
- include common
+ include hadoop::common
package { "hadoop-yarn":
ensure => latest,
@@ -234,7 +234,7 @@ class hadoop ($hadoop_security_authentication = "simple",
$sshfence_keydir = "$hadoop_ha_sshfence_user_home/.ssh"
$sshfence_keypath = "$sshfence_keydir/id_sshfence"
- include common
+ include hadoop::common
# Check if test mode is enforced, so we can install hdfs ssh-keys for passwordless
if ($testonly_hdfs_sshkeys == "yes") {
@@ -378,7 +378,7 @@ class hadoop ($hadoop_security_authentication = "simple",
$hadoop_security_authentication = $hadoop::hadoop_security_authentication,
$kerberos_realm = $hadoop::kerberos_realm,
) inherits hadoop {
- include common_hdfs
+ include hadoop::common_hdfs
package { "hadoop-mapreduce":
ensure => latest,
@@ -413,7 +413,7 @@ class hadoop ($hadoop_security_authentication = "simple",
class datanode (
$hadoop_security_authentication = $hadoop::hadoop_security_authentication,
) inherits hadoop {
- include common_hdfs
+ include hadoop::common_hdfs
package { "hadoop-hdfs-datanode":
ensure => latest,
@@ -440,7 +440,7 @@ class hadoop ($hadoop_security_authentication = "simple",
ensure => directory,
owner => hdfs,
group => hdfs,
- mode => 755,
+ mode => '755',
require => [ Package["hadoop-hdfs"] ],
}
}
@@ -452,7 +452,7 @@ class hadoop ($hadoop_security_authentication = "simple",
$hadoop_security_authentcation = $hadoop::hadoop_security_authentication,
$kerberos_realm = $hadoop::kerberos_realm,
) inherits hadoop {
- include common_hdfs
+ include hadoop::common_hdfs
if ($hadoop_security_authentication == "kerberos") {
kerberos::host_keytab { "httpfs":
@@ -503,7 +503,7 @@ class hadoop ($hadoop_security_authentication = "simple",
}
class kinit {
- include common_hdfs
+ include hadoop::common_hdfs
exec { "HDFS kinit":
command => "/usr/bin/kinit -kt /etc/hdfs.keytab hdfs/$fqdn && /usr/bin/kinit -R",
@@ -551,7 +551,7 @@ class hadoop ($hadoop_security_authentication = "simple",
$standby_bootstrap_retries = 10,
# milliseconds
$standby_bootstrap_retry_interval = 30000) {
- include common_hdfs
+ include hadoop::common_hdfs
if ($hadoop::common_hdfs::ha != 'disabled') {
file { $hadoop::common_hdfs::sshfence_keydir:
@@ -697,7 +697,7 @@ class hadoop ($hadoop_security_authentication = "simple",
ensure => directory,
owner => hdfs,
group => hdfs,
- mode => 700,
+ mode => '700',
require => [Package["hadoop-hdfs"]],
}
}
@@ -720,7 +720,7 @@ class hadoop ($hadoop_security_authentication = "simple",
}
class secondarynamenode {
- include common_hdfs
+ include hadoop::common_hdfs
package { "hadoop-hdfs-secondarynamenode":
ensure => latest,
@@ -743,7 +743,7 @@ class hadoop ($hadoop_security_authentication = "simple",
}
class journalnode {
- include common_hdfs
+ include hadoop::common_hdfs
package { "hadoop-hdfs-journalnode":
ensure => latest,
@@ -765,14 +765,14 @@ class hadoop ($hadoop_security_authentication = "simple",
ensure => directory,
owner => 'hdfs',
group => 'hdfs',
- mode => 755,
+ mode => '755',
require => [Package["hadoop-hdfs"]],
}
}
class resourcemanager {
- include common_yarn
+ include hadoop::common_yarn
package { "hadoop-yarn-resourcemanager":
ensure => latest,
@@ -790,7 +790,7 @@ class hadoop ($hadoop_security_authentication = "simple",
}
class proxyserver {
- include common_yarn
+ include hadoop::common_yarn
package { "hadoop-yarn-proxyserver":
ensure => latest,
@@ -808,7 +808,7 @@ class hadoop ($hadoop_security_authentication = "simple",
}
class historyserver {
- include common_mapred_app
+ include hadoop::common_mapred_app
package { "hadoop-mapreduce-historyserver":
ensure => latest,
@@ -827,8 +827,8 @@ class hadoop ($hadoop_security_authentication = "simple",
class nodemanager {
- include common_mapred_app
- include common_yarn
+ include hadoop::common_mapred_app
+ include hadoop::common_yarn
package { "hadoop-yarn-nodemanager":
ensure => latest,
@@ -849,27 +849,27 @@ class hadoop ($hadoop_security_authentication = "simple",
ensure => directory,
owner => yarn,
group => yarn,
- mode => 755,
+ mode => '755',
require => [Package["hadoop-yarn"]],
}
}
- class mapred-app {
- include common_mapred_app
+ class mapred_app {
+ include hadoop::common_mapred_app
hadoop::create_storage_dir { $hadoop::common_mapred_app::mapred_data_dirs: } ->
file { $hadoop::common_mapred_app::mapred_data_dirs:
ensure => directory,
owner => yarn,
group => yarn,
- mode => 755,
+ mode => '755',
require => [Package["hadoop-mapreduce"]],
}
}
class client {
- include common_mapred_app
- include common_yarn
+ include hadoop::common_mapred_app
+ include hadoop::common_yarn
$hadoop_client_packages = $operatingsystem ? {
/(OracleLinux|CentOS|RedHat|Fedora)/ => [ "hadoop-doc", "hadoop-hdfs-fuse", "hadoop-client", "hadoop-libhdfs", "hadoop-debuginfo" ],