diff options
Diffstat (limited to 'bigtop-deploy/puppet/modules/hadoop/manifests/init.pp')
-rw-r--r-- | bigtop-deploy/puppet/modules/hadoop/manifests/init.pp | 48 |
1 files changed, 24 insertions, 24 deletions
diff --git a/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp b/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp index 430e3416..69e26bb6 100644 --- a/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp +++ b/bigtop-deploy/puppet/modules/hadoop/manifests/init.pp @@ -49,7 +49,7 @@ class hadoop ($hadoop_security_authentication = "simple", } if ("mapred-app" in $roles) { - include hadoop::mapred-app + include hadoop::mapred_app } if ("nodemanager" in $roles) { @@ -153,7 +153,7 @@ class hadoop ($hadoop_security_authentication = "simple", $kerberos_realm = $hadoop::kerberos_realm, ) inherits hadoop { - include common + include hadoop::common package { "hadoop-yarn": ensure => latest, @@ -234,7 +234,7 @@ class hadoop ($hadoop_security_authentication = "simple", $sshfence_keydir = "$hadoop_ha_sshfence_user_home/.ssh" $sshfence_keypath = "$sshfence_keydir/id_sshfence" - include common + include hadoop::common # Check if test mode is enforced, so we can install hdfs ssh-keys for passwordless if ($testonly_hdfs_sshkeys == "yes") { @@ -378,7 +378,7 @@ class hadoop ($hadoop_security_authentication = "simple", $hadoop_security_authentication = $hadoop::hadoop_security_authentication, $kerberos_realm = $hadoop::kerberos_realm, ) inherits hadoop { - include common_hdfs + include hadoop::common_hdfs package { "hadoop-mapreduce": ensure => latest, @@ -413,7 +413,7 @@ class hadoop ($hadoop_security_authentication = "simple", class datanode ( $hadoop_security_authentication = $hadoop::hadoop_security_authentication, ) inherits hadoop { - include common_hdfs + include hadoop::common_hdfs package { "hadoop-hdfs-datanode": ensure => latest, @@ -440,7 +440,7 @@ class hadoop ($hadoop_security_authentication = "simple", ensure => directory, owner => hdfs, group => hdfs, - mode => 755, + mode => '755', require => [ Package["hadoop-hdfs"] ], } } @@ -452,7 +452,7 @@ class hadoop ($hadoop_security_authentication = "simple", $hadoop_security_authentcation = $hadoop::hadoop_security_authentication, $kerberos_realm = $hadoop::kerberos_realm, ) inherits hadoop { - include common_hdfs + include hadoop::common_hdfs if ($hadoop_security_authentication == "kerberos") { kerberos::host_keytab { "httpfs": @@ -503,7 +503,7 @@ class hadoop ($hadoop_security_authentication = "simple", } class kinit { - include common_hdfs + include hadoop::common_hdfs exec { "HDFS kinit": command => "/usr/bin/kinit -kt /etc/hdfs.keytab hdfs/$fqdn && /usr/bin/kinit -R", @@ -551,7 +551,7 @@ class hadoop ($hadoop_security_authentication = "simple", $standby_bootstrap_retries = 10, # milliseconds $standby_bootstrap_retry_interval = 30000) { - include common_hdfs + include hadoop::common_hdfs if ($hadoop::common_hdfs::ha != 'disabled') { file { $hadoop::common_hdfs::sshfence_keydir: @@ -697,7 +697,7 @@ class hadoop ($hadoop_security_authentication = "simple", ensure => directory, owner => hdfs, group => hdfs, - mode => 700, + mode => '700', require => [Package["hadoop-hdfs"]], } } @@ -720,7 +720,7 @@ class hadoop ($hadoop_security_authentication = "simple", } class secondarynamenode { - include common_hdfs + include hadoop::common_hdfs package { "hadoop-hdfs-secondarynamenode": ensure => latest, @@ -743,7 +743,7 @@ class hadoop ($hadoop_security_authentication = "simple", } class journalnode { - include common_hdfs + include hadoop::common_hdfs package { "hadoop-hdfs-journalnode": ensure => latest, @@ -765,14 +765,14 @@ class hadoop ($hadoop_security_authentication = "simple", ensure => directory, owner => 'hdfs', group => 'hdfs', - mode => 755, + mode => '755', require => [Package["hadoop-hdfs"]], } } class resourcemanager { - include common_yarn + include hadoop::common_yarn package { "hadoop-yarn-resourcemanager": ensure => latest, @@ -790,7 +790,7 @@ class hadoop ($hadoop_security_authentication = "simple", } class proxyserver { - include common_yarn + include hadoop::common_yarn package { "hadoop-yarn-proxyserver": ensure => latest, @@ -808,7 +808,7 @@ class hadoop ($hadoop_security_authentication = "simple", } class historyserver { - include common_mapred_app + include hadoop::common_mapred_app package { "hadoop-mapreduce-historyserver": ensure => latest, @@ -827,8 +827,8 @@ class hadoop ($hadoop_security_authentication = "simple", class nodemanager { - include common_mapred_app - include common_yarn + include hadoop::common_mapred_app + include hadoop::common_yarn package { "hadoop-yarn-nodemanager": ensure => latest, @@ -849,27 +849,27 @@ class hadoop ($hadoop_security_authentication = "simple", ensure => directory, owner => yarn, group => yarn, - mode => 755, + mode => '755', require => [Package["hadoop-yarn"]], } } - class mapred-app { - include common_mapred_app + class mapred_app { + include hadoop::common_mapred_app hadoop::create_storage_dir { $hadoop::common_mapred_app::mapred_data_dirs: } -> file { $hadoop::common_mapred_app::mapred_data_dirs: ensure => directory, owner => yarn, group => yarn, - mode => 755, + mode => '755', require => [Package["hadoop-mapreduce"]], } } class client { - include common_mapred_app - include common_yarn + include hadoop::common_mapred_app + include hadoop::common_yarn $hadoop_client_packages = $operatingsystem ? { /(OracleLinux|CentOS|RedHat|Fedora)/ => [ "hadoop-doc", "hadoop-hdfs-fuse", "hadoop-client", "hadoop-libhdfs", "hadoop-debuginfo" ], |