https://FUSION_HOST:FUSION_PORT/conf/
(on Unix or macOS) or fusion\4.2.x\conf\
(on Windows). The contents of this directory are as follows:
fusion.properties | Fusion’s main configuration file, which defines the common environment variables used by the Fusion run scripts. Many of the values in this file can be set using environment variables, enabling you to set them using systemd , Docker, and so on. Default values are also provided. For example, in api.port = ${API_PORT:-8765} , the value is 8765 unless API_PORT is defined.NOTE: ZOOKEEPER_PORT cannot not be used, and value of zookeeper.port in fusion.properties must be the same as the value of clientPort in conf/zookeeper/zoo.cfg .Many of the values in this file can be set using environment variables, enabling you to set them using systemd , Docker, and so on. Default values are also provided. For example, in api.port = ${API_PORT:-8765} , the value is 8765 unless API_PORT is defined.NOTE: ZOOKEEPER_PORT cannot not be used, and value of zookeeper.port in fusion.cors must be the same as the value of clientPort in conf/zookeeper/zoo.cfg . |
zookeeper/commons-logging.properties zookeeper/zoo.cfg | ZooKeeper configuration files. |
agent-log4j2.xml api-log4j2.xml connectors-log4j2.xml solr-log4j2.xml spark-driver-log4j2.xml spark-master-agent-log4j2.xml spark-master-log4j2.xml spark-worker-agent-log4j2.xml spark-worker-log4j2.xml sql-agent-log4j2.xml sql-log4j2.xml ui-log4j2.xml zk-log4j2.xml zookeeper/log4j2.xml zookeeper/log4j.properties | Logging configuration files. Fusion uses the Apache Log4j 2 logging framework with Jetty. Log levels, frequencies, and log rotation policy can be configured by changing these configuration files. See the Log4j2 Configuration guide. |
hive-site.xml | Configuration for Fusion to Import Data with Hive. |
Import Data with Hive
lucidworks-hive-serde-v2.2.6.jar
in $FUSION_HOME/apps/connectors/resources/lucid.hadoop/jobs
.helm
as it is required to install Fusion for any K8s platform.
On MacOS, you can do:3.0.0
; check your Helm version by running helm version --short
.install-roles
directory.kubectl
, e.g.:role.yaml
and cluster-role.yaml
files to that namespacehelm install
command as the <install_user>
fusion-cloud-native-master
directory.helm
as it is required to install Fusion for any K8s platform.
On MacOS, you can do:3.0.0
; check your Helm version by running helm version --short
.install-roles
directory.kubectl
, e.g.:role.yaml
and cluster-role.yaml
files to that namespacehelm install
command as the <install_user>
fusion-cloud-native-master
directory.hive-solr
supports Hive 3.0.0. For support for Hive 1.x, see the hive_1x
branch.hive-solr
should only be used with Solr 5.0 and higher.solr-hadoop-common
submodule (contained in a separate GitHub repository, https://github.com/lucidworks/solr-hadoop-common). This submodule must be initialized before building the SerDe .jar.git submodule update
will fetch all the data from that project and check out the appropriate commit listed in the superproject. You must initialize and update the submodule before attempting to build the SerDe jar.solr-hadoop-common
is pointing to the correct SHA.
(See https://github.com/blog/2104-working-with-submodules for more details.)
solr-hive-serde/build/libs/{packageUser}-hive-serde-{connectorVersion}.jar
, which can be used with Hive v3.0. Other Hive versions (such as v2.x) may work with this jar, but have not been tested.hive.aux.jars.path
capability. There are several options for this, described below.It’s considered a best practice to use a single directory for all auxiliary jars you may want to add to Hive so you only need to define a single path. However, you must then copy any jars you want to use to that path./usr/hive/auxlib
; if you use another path, update the path in the examples accordingly.HIVE_AUX_JARS_PATH
is defined, and add the path to each line which starts with export
. What you want will end up looking like:hive/conf/hive-site.xml
:auxpath
variable:
hive —auxpath /usr/hive/auxlibThere are also other approaches that could be used. Keep in mind, though, that the jar must be loaded into the classpath, adding it with the ADD JAR
function is not sufficient.<1>
In this example, we have created an external table named “solr”, and defined a set of fields and types for the data we will store in the table. See the section <<Defining Fields for Solr>>
below for best practices when naming fields.<2>
This defines a custom storage handler (STORED BY 'com.lucidworks.hadoop.hive.LWStorageHandler'
), which is one of the classes included with the Hive SerDe jar.<3>
The LOCATION indicates the location in HDFS where the table data will be stored. In this example, we have chosen to use /tmp/solr
.<4>
In the section TBLPROPERTIES, we define several parameters for Solr so the data can be indexed to the right Solr installation and collection. See the section <<Table Properties>>
below for details about these parameters.If the table needs to be dropped at a later time, you can use the DROP TABLE command in Hive. This will remove the metadata stored in the table in Hive, but will not modify the underlying data (in this case, the Solr index).ClassCastException
in response to queries.To avoid this problem, you can use a Solr feature called dynamic fields. These direct Solr to use specific field types based on a prefix or suffix found on an incoming field name, which overrides Solr guessing at the type. Solr includes by default dynamic field rules for nearly all types it supports, so you only need to use the same suffix on your field names in your Hive tables for the correct type to be defined.To illustrate this, note the field names in the table example above:CREATE EXTERNAL TABLE solr (id string, field1_s string, field2_i int)In this example, we have defined the id
field as a string, field1_s
as a string, and field2_i
as an integer. In Solr’s default schema, there is a dynamic field rule that any field with a _s
suffix should be a string. Similarly, there is another rule that any field with _i
as a suffix should be an integer. This allows us to make sure the field types match.An alternative to this is to disable Solr’s field guessing altogether, but this would require you to create all of your fields in Solr before indexing any content from Hive.For more information about these features and options, please see the following sections of the Apache Solr Reference Guide:solr.zkhost
:
The location of the ZooKeeper quorum if using LucidWorks in SolrCloud mode. If this property is set along with the solr.server.url
property, the solr.server.url
property will take precedence.solr.server.url
:
The location of the Solr instance if not using LucidWorks in SolrCloud mode. If this property is set along with the solr.zkhost
property, this property will take precedence.solr.collection
:
The Solr collection for this table. If not defined, an exception will be thrown.solr.query
:
The specific Solr query to execute to read this table. If not defined, a default of \*:*
will be used. This property is not needed when loading data to a table, but is needed when defining the table so Hive can later read the table.lww.commit.on.close
:
If true, inserts will be automatically committed when the connection is closed. True is the default.lww.jaas.file
:
Used only when indexing to or reading from a Solr cluster secured with Kerberos.
This property defines the path to a JAAS file that contains a service principal and keytab location for a user who is authorized to read from and write to Solr and Hive.
The JAAS configuration file must be copied to the same path on every node where a Node Manager is running (i.e., every node where map/reduce tasks are executed). Here is a sample section of a JAAS file:<1>
The name of this section of the JAAS file. This name will be used with the lww.jaas.appname
parameter.
<2>
The location of the keytab file.
<3>
The service principal name. This should be a different principal than the one used for Solr, but must have access to both Solr and Hive.lww.jaas.appname
:
Used only when indexing to or reading from a Solr cluster secured with Kerberos.
This property provides the name of the section in the JAAS file that includes the correct service principal and keytab path../apps/connectors/resources/lucid.hadoop/jobs
directory. The SerDe jar that supports Fusion is v2.2.4 or higher. This was released with Fusion 3.0.If you are using Fusion 3.1.x and higher, you will need to download the Hive SerDe from http://lucidworks.com/connectors/. Choose the proper Hadoop distribution and the resulting .zip file will include the Hive SerDe.A 2.2.4 or higher jar built from this repository will also work with Fusion 2.4.x releases.STORED BY 'com.lucidworks.hadoop.hive.FusionStorageHandler'
) that a class included with the Hive SerDe jar designed for use with Fusion.Note that all of the same caveats about field types discussed in the section <<Defining Fields for Solr>>
apply to Fusion as well. In Fusion, however, you have the option of using an index pipeline to perform specific field mapping instead of using dynamic fields.The LOCATION indicates the location in HDFS where the table data will be stored. In this example, we have chosen to use /tmp/fusion
.In the section TBLPROPERTIES, we define several properties for Fusion so the data can be indexed to the right Fusion installation and collection:fusion.endpoints
:
The full URL to the index pipeline in Fusion. The URL should include the pipeline name and the collection data will be indexed to.fusion.fail.on.error
:
If true
, when an error is encountered, such as if a row could not be parsed, indexing will stop. This is false
by default.fusion.buffer.timeoutms
:
The amount of time, in milliseconds, to buffer documents before sending them to Fusion. The default is 1000. Documents will be sent to Fusion when either this value or fusion.batchSize
is met.fusion.batchSize
:
The number of documents to batch before sending the batch to Fusion. The default is 500. Documents will be sent to Fusion when either this value or fusion.buffer.timeoutms
is met.fusion.realm
:
This is used with fusion.user
and fusion.password
to authenticate to Fusion for indexing data. Two options are supported, KERBEROS
or NATIVE
.
Kerberos authentication is supported with the additional definition of a JAAS file. The properties java.security.auth.login.config
and fusion.jaas.appname
are used to define the location of the JAAS file and the section of the file to use.
Native authentication uses a Fusion-defined username and password. This user must exist in Fusion, and have the proper permissions to index documents.fusion.user
:
The Fusion username or Kerberos principal to use for authentication to Fusion. If a Fusion username is used ('fusion.realm' = 'NATIVE'
), the fusion.password
must also be supplied.fusion.password
:
This property is not shown in the example above. The password for the fusion.user
when the fusion.realm
is NATIVE
.java.security.auth.login.config
:
This property defines the path to a JAAS file that contains a service principal and keytab location for a user who is authorized to read from and write to Fusion and Hive.
The JAAS configuration file must be copied to the same path on every node where a Node Manager is running (i.e., every node where map/reduce tasks are executed). Here is a sample section of a JAAS file:<1>
The name of this section of the JAAS file. This name will be used with the fusion.jaas.appname
parameter.
<2>
The location of the keytab file.
<3>
The service principal name. This should be a different principal than the one used for Fusion, but must have access to both Fusion and Hive. This name is used with the fusion.user
parameter described above.fusion.jaas.appname
:
Used only when indexing to or reading from Fusion when it is secured with Kerberos.
This property provides the name of the section in the JAAS file that includes the correct service principal and keytab path.fusion.query.endpoints
:
The full URL to a query pipeline in Fusion. The URL should include the pipeline name and the collection data will be read from. You should also specify the request handler to be used.
If you do not intend to query your Fusion data from Hive, you can skip this parameter.fusion.query
:
The query to run in Fusion to select records to be read into Hive. This is \*:*
by default, which selects all records in the index.
If you do not intend to query your Fusion data from Hive, you can skip this parameter.$SOLR_HOME/example/exampledocs/books.csv
.Using the sample books.csv
file, we can see a detailed example of creating a table, loading data to it, and indexing that data to Solr.<1>
Define the table books
, and provide the field names and field types that will make up the table.
<2>
Load the data from the books.csv
file.
<3>
Create an external table named solr
, and provide the field names and field types that will make up the table. These will be the same field names as in your local Hive table, so we can index all of the same data to Solr.
<4>
Define the custom storage handler provided by the {packageUser}-hive-serde-{connectorVersion}.jar
.
<5>
Define storage location in HDFS.
<6>
The query to run in Solr to read records from Solr for use in Hive.
<7>
Define the location of Solr (or ZooKeeper if using SolrCloud), the collection in Solr to index the data to, and the query to use when reading the table. This example also refers to a JAAS configuration file that will be used to authenticate to the Kerberized Solr cluster.:fusion.properties
file in https://FUSION_HOST:FUSION_PORT/conf/
(on Unix or macOS) or fusion\4.2.x\conf\
(on Windows).
Port | Service |
---|---|
8091 | Fusion agent |
8763 | Fusion UI service (use port 8764 to access the Fusion UI) |
8764 | Fusion proxy This service includes the Fusion Authorization Proxy. |
8765 | Fusion API Services |
8766 | Spark Master |
8769 | Spark Worker |
8771 | Connectors RPC Service This service can distribute connector jobs to as many Fusion nodes as you want. It uses HTTP/2 and has an SDK that you can use to build your own connectors. |
8780 | Web Apps This service delivers the UIs of Fusion apps. |
8781 | Log shipper Monitoring port that agent uses to check the health of the log shipper process. This port does not need to be accessible from other nodes. |
8983 | Solr This is the embedded Solr instance included in the Fusion distribution. |
8984 | Connectors Classic Service This service runs nondistributed connector jobs. It uses HTTP/1.1 and has no SDK. |
9983 | ZooKeeper The embedded ZooKeeper used by Fusion services. Important The ZooKeeper port is also defined in the configuration file for the embedded ZooKeeper, https://FUSION_HOST:FUSION_PORT/conf/zookeeper/zoo.cfg (on Unix or macOS) or fusion\4.2.x\conf\zookeeper\zoo.cfg (on Windows). Look for clientPort . If you run Fusion with the embedded ZooKeeper, remember to change the port number in both places. |
47100-48099 | Apache Ignite TCP communication port range (used by the API, Connectors Classic, Connectors RPC, and Proxy services) |
48100-48199 | Apache Ignite shared memory port range (used by the API, Connectors Classic, Connectors RPC, and Proxy services) |
49200-49299 | Apache Ignite discovery port range (used by API, Connectors Classic, Connectors RPC, and Proxy services) |
fusion.properties
defines pairs of ports for components running on Jetty, such as:
Port number | Process |
---|---|
4040 | SparkContext web UI |
7337 | Shuffle port for Apache Spark worker |
8767 | Spark master web UI |
8770 | Spark worker web UI |
8766 | Spark master listening port |
8769 | Spark worker listening port |
8772 (spark.driver.port ) | Spark driver listening port |
8788 (spark.blockManager.port ) | Spark BlockManager port |
1
to the assigned port number.
For example, if 4040 is not available, Spark uses 4041 (if available, or 4042, and so forth).
Ensure that the ports in the above table are accessible, as well as a range of up to 16 subsequent ports.
For example, open ports 8772 through 8787, and 8788 through 8804, because a single node can have more than one Spark driver and Spark BlockManager.
4.2.2
)
below the directory fusion
.
This installation strategy lets you install multiple versions of Fusion and switch between them.
The directories found in the Fusion home directory in https://FUSION_HOST:FUSION_PORT/
(on Unix or macOS) or fusion\4.2\
(on Windows) are:
Name | Description |
---|---|
apps | Fusion components 3rd-party distributions used by Fusion, including jar files and plugins |
bin | Master script to run Fusion, and per-component run scripts |
conf | Configuration files for Fusion and ZooKeeper that contain parameters settings tuned for common use cases |
data | Default location of data stores used by Fusion apps |
docs | License information |
examples | Fusion signals example |
init | systemd and upstart scripts and configurations for Linux |
scripts | Developer utilities, including diagnostic scripts, for Linux and Windows. See scripts/diag/linux/README and scripts/diag/win64/README.txt for details. |
var | Log files and system files created by Fusion components, as well as .pid files for each running process |
bin
, conf
, and var
directories, Fusion creates a symbolic link latest
to the latest version and symbolic links bin
, conf
, and var
to latest/bin
, latest/conf
, and latest/var
respectively.
For example, if latest
is 4.2.1
, then instead of entering this command to change to the bin
directory:
fusion
directory.
From the fusion
directory, you can view the symbolic links by typing:
latest
. For example:
https://FUSION_HOST:FUSION_PORT/var/log/
(on Unix or macOS) or fusion\4.2.x\var\log\
(on Windows).
Because the Fusion components run in separate JVMs, each component has its own set of log files
and files that monitor all garbage-collection events for that process.
Name | Description |
---|---|
admin-ui , webapps | Fusion UI messages. Messages are logged to jetty-<date>.stderrout.log . |
agent | Fusion agent logging and error messages |
api | Fusion REST API services logging and error messages. This log shows the result of service requests submitted to the REST API directly via HTTP and indirectly via the Fusion UI. |
connectors | Fusion connector services logging and error messages. Fusion index pipeline logging stages write to this file. |
log-shipper | See Configure Fusion logging |
proxy | Messages from the Fusion proxy, responsible for authentication and HTTP load balancing. |
solr | Messages from Solr |
spark-master | Spark-master logs |
spark-worker | Spark-worker logs |
sql | SQL logs |
zookeeper | ZooKeeper messages |
<component>.log
. For example, the full path to the log file for the connectors services is https://FUSION_HOST:FUSION_PORT/var/log/connectors/connectors.log
(on Unix or macOS) or fusion\4.2.x\var\log\connectors\connectors.log
(on Windows).
In addition to component log files, every component maintains a set of garbage-collection log files that are used for resource tuning.
The garbage-collection log files are named gc_<YYYYMMDD>_<PID>.log.<CT>
. In addition, the current garbage-collection log file has suffix .current
.
The Fusion API, Fusion UI, Connectors Classic, Proxy, Web Apps, and Solr services all run inside a Jetty server. The Jetty server logs are also written to each component’s log file directory. The Jetty server logs are named:
jetty-YYYY_MM_DD.request.log
jetty-YYYY_MM_DD.stderrout.log