# params from nifi-env nifi_user = config['configurations']['nifi-env']['nifi_user'] nifi_group = config['configurations']['nifi-env']['nifi_group'] nifi_node_log_dir = config['configurations']['nifi-env']['nifi_node_log_dir'] nifi_node_log_file = os.path.join(nifi_node_log_dir, 'nifi-setup.log') # limits related params limits_conf_dir = '/etc/security/limits.d' nifi_user_nofile_limit = config['configurations']['nifi-env'][ 'nifi_user_nofile_limit'] nifi_user_nproc_limit = config['configurations']['nifi-env'][ 'nifi_user_nproc_limit'] # params from nifi-boostrap nifi_env_content = config_utils.merge_env(config['configurations']['nifi-env']) # params from nifi-logback nifi_master_logback_content = config['configurations'][ 'nifi-master-logback-env']['content'] nifi_node_logback_content = config['configurations']['nifi-node-logback-env'][ 'content'] # params from nifi-properties-env nifi_master_properties_content = config['configurations'][ 'nifi-master-properties-env']['content'] nifi_properties = config['configurations']['nifi-properties'].copy() #kerberos params nifi_kerberos_authentication_expiration = config['configurations'][ 'nifi-properties']['nifi.kerberos.spnego.authentication.expiration']
streamline_log_template = streamline_log_template.replace( '{{streamline_log_maxbackupindex}}', streamline_log_maxbackupindex) streamline_log_template = streamline_log_template.replace( '{{streamline_log_maxfilesize}}', ("%sMB" % streamline_log_maxfilesize)) streamline_port = config['configurations']['streamline-common']['port'] streamline_admin_port = config['configurations']['streamline-common'][ 'adminPort'] # This is hardcoded on the streamline bash process lifecycle on which we have no control over streamline_managed_pid_dir = "/var/run/streamline" streamine_managed_log_dir = "/var/log/streamline" user_group = config['configurations']['cluster-env']['user_group'] java64_home = config['ambariLevelParams']['java_home'] streamline_env_sh_template = config_utils.merge_env( config['configurations']['streamline-env']) streamline_jaas_conf_template = default( "/configurations/streamline_jaas_conf/content", None) if security_enabled: smokeuser = config['configurations']['cluster-env']['smokeuser'] smokeuser_principal = config['configurations']['cluster-env'][ 'smokeuser_principal_name'] smoke_user_keytab = config['configurations']['cluster-env'][ 'smokeuser_keytab'] _hostname_lowercase = config['agentLevelParams']['hostname'].lower() _streamline_principal_name = config['configurations']['streamline-env'][ 'streamline_principal_name'] streamline_jaas_principal = _streamline_principal_name.replace( '_HOST', _hostname_lowercase) streamline_bare_principal = get_bare_principal(streamline_jaas_principal)
limits_conf_dir = "/etc/security/limits.d" registry_user_nofile_limit = default( '/configurations/registry-env/registry_user_nofile_limit', 1048576) registry_user_nproc_limit = default( '/configurations/registry-env/registry_user_nproc_limit', 65536) registry_user = config['configurations']['registry-env']['registry_user'] registry_log_dir = config['configurations']['registry-env']['registry_log_dir'] # This is hardcoded on the registry bash process lifecycle on which we have no control over registry_managed_pid_dir = "/var/run/registry" user_group = config['configurations']['cluster-env']['user_group'] java64_home = config['ambariLevelParams']['java_home'] registry_env_sh_template = config_utils.merge_env( config['configurations']['registry-env']) if security_enabled: _hostname_lowercase = config['agentLevelParams']['hostname'].lower() registry_ui_keytab_path = config['configurations']['registry-env'][ 'registry_ui_keytab'] _registry_ui_jaas_principal_name = config['configurations'][ 'registry-env']['registry_ui_principal_name'] registry_ui_jaas_principal = _registry_ui_jaas_principal_name.replace( '_HOST', _hostname_lowercase) registry_kerberos_params = "-Djava.security.auth.login.config=" + conf_dir + "/registry_jaas.conf" registry_servlet_filter = config['configurations']['registry-common'][ 'servlet.filter'] registry_servlet_kerberos_name_rules = config['configurations'][ 'registry-common']['kerberos.name.rules'] # registry_servlet_token_validity = (config['configurations']['registry-common']['token.validity'])