Escolar Documentos
Profissional Documentos
Cultura Documentos
Teradata QueryGrid
Teradata, Active Data Warehousing, Active Enterprise Intelligence, Applications-Within, Aprimo Marketing Studio, Aster, BYNET, Claraview,
DecisionCast, Gridscale, MyCommerce, QueryGrid, SQL-MapReduce, Teradata Decision Experts, "Teradata Labs" logo, Teradata
ServiceConnect, Teradata Source Experts, WebAnalyst, and Xkoto are trademarks or registered trademarks of Teradata Corporation or its
affiliates in the United States and other countries.
Adaptec and SCSISelect are trademarks or registered trademarks of Adaptec, Inc.
AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc.
Apache, Apache Avro, Apache Hadoop, Apache Hive, Hadoop, and the yellow elephant logo are either registered trademarks or trademarks of the
Apache Software Foundation in the United States and/or other countries.
Apple, Mac, and OS X all are registered trademarks of Apple Inc.
Axeda is a registered trademark of Axeda Corporation. Axeda Agents, Axeda Applications, Axeda Policy Manager, Axeda Enterprise, Axeda
Access, Axeda Software Management, Axeda Service, Axeda ServiceLink, and Firewall-Friendly are trademarks and Maximum Results and
Maximum Support are servicemarks of Axeda Corporation.
Data Domain, EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation.
GoldenGate is a trademark of Oracle.
Hewlett-Packard and HP are registered trademarks of Hewlett-Packard Company.
Hortonworks, the Hortonworks logo and other Hortonworks trademarks are trademarks of Hortonworks Inc. in the United States and other
countries.
Intel, Pentium, and XEON are registered trademarks of Intel Corporation.
IBM, CICS, RACF, Tivoli, and z/OS are registered trademarks of International Business Machines Corporation.
Linux is a registered trademark of Linus Torvalds.
LSI is a registered trademark of LSI Corporation.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are registered trademarks of Microsoft Corporation in the United
States and other countries.
NetVault is a trademark or registered trademark of Dell Inc. in the United States and/or other countries.
Novell and SUSE are registered trademarks of Novell, Inc., in the United States and other countries.
Oracle, Java, and Solaris are registered trademarks of Oracle and/or its affiliates.
QLogic and SANbox are trademarks or registered trademarks of QLogic Corporation.
Quantum and the Quantum logo are trademarks of Quantum Corporation, registered in the U.S.A. and other countries.
Red Hat is a trademark of Red Hat, Inc., registered in the U.S. and other countries. Used under license.
SAP is the trademark or registered trademark of SAP AG in Germany and in several other countries.
SAS and SAS/C are trademarks or registered trademarks of SAS Institute Inc.
Simba, the Simba logo, SimbaEngine, SimbaEngine C/S, SimbaExpress and SimbaLib are registered trademarks of Simba Technologies Inc.
SPARC is a registered trademark of SPARC International, Inc.
Symantec, NetBackup, and VERITAS are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and
other countries.
Unicode is a registered trademark of Unicode, Inc. in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other product and company names mentioned herein may be the trademarks of their respective owners.
The information contained in this document is provided on an "as-is" basis, without warranty of any kind, either express or implied,
including the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. Some jurisdictions do not allow
the exclusion of implied warranties, so the above exclusion may not apply to you. In no event will Teradata Corporation be liable for any
indirect, direct, special, incidental, or consequential damages, including lost profits or lost savings, even if expressly advised of the
possibility of such damages.
The information contained in this document may contain references or cross-references to features, functions, products, or services that are not
announced or available in your country. Such references do not imply that Teradata Corporation intends to announce such features, functions,
products, or services in your country. Please consult your local Teradata Corporation representative for those features, functions, products, or
services available in your country.
Information contained in this document may contain technical inaccuracies or typographical errors. Information may be changed or updated
without notice. Teradata Corporation may also make improvements or changes in the products or services described in this information at any
time without notice.
To maintain the quality of our products and services, we would like your comments on the accuracy, clarity, organization, and value of this
document. Please e-mail: teradata-books@lists.teradata.com
Any comments or materials (collectively referred to as "Feedback") sent to Teradata Corporation will be deemed non-confidential. Teradata
Corporation will have no obligation of any kind with respect to Feedback and will be free to use, reproduce, disclose, exhibit, display, transform,
create derivative works of, and distribute the Feedback and derivative works thereof without limitation on a royalty-free basis. Further, Teradata
Corporation will be free to use any ideas, concepts, know-how, or techniques contained in such Feedback for any purpose whatsoever, including
developing, manufacturing, or marketing products or services incorporating Feedback.
Copyright 2015 - 2016 by Teradata. All Rights Reserved.
Table of Contents
Preface.............................................................................................................................................................5
Purpose.................................................................................................................................................................. 5
Audience................................................................................................................................................................ 5
Revision History................................................................................................................................................... 5
Supported Releases............................................................................................................................................... 6
Additional Information........................................................................................................................................6
Related Documents....................................................................................................................................... 6
Related Links..................................................................................................................................................6
Product Safety Information.................................................................................................................................6
Chapter 1:
Overview........................................................................................................................................................7
Chapter 2:
Preparing for Installation............................................................................................................ 9
Pre-Installation Checklist.................................................................................................................................... 9
Obtaining a Change Control Number............................................................................................................. 10
Obtaining Required Patches..............................................................................................................................10
Acquiring Remote Proxy User Information....................................................................................................10
Identifying the HCatalog Server.......................................................................................................................11
Obtaining and Running the System Validation Script.................................................................................. 11
Resolving Hostname Conflicts..........................................................................................................................12
Setting Up Hadoop Cluster for LDAP............................................................................................................. 12
Setting Up Kerberos........................................................................................................................................... 13
Port Requirements..............................................................................................................................................15
Chapter 3:
Installing Software............................................................................................................................ 17
Chapter 4:
Post Software Installation Activities...............................................................................29
Appendix A:
Manual Installation of Teradata QueryGrid Packages................................... 35
Purpose
This guide explains how to install Teradata QueryGrid.
Audience
This guide is intended for use by the following personnel:
System administrators
Database administrators
Hadoop administrators
Customers
Teradata Customer Support
Revision History
Date Description
March 2016 Maintenance release
January 2016 Added related links information in Preface
Added links to Knowledge Article on performing JVM and FSG cache
memory calculations
December 2015 Added support for Teradata QueryGrid 15.01
October 2015 Added support for Teradata Open Distribution for Hadoop (TDH) 2.3
and Hortonworks Data Platform (HDP) 2.3
August 2015 Initial Release
Note: This book is a combination of the previously released Teradata QueryGrid Teradata
Database-to-Teradata Open Distribution for Hadoop and Teradata QueryGrid Teradata
Database-to-Hortonworks Data Platform books.
Supported Releases
For information on Teradata QueryGrid supported releases, see Knowledge Article
KAP314E23E, accessed through https://tays.teradata.com.
Additional Information
Related Documents
Documents are located at http://www.info.teradata.com.
Title Publication ID
Teradata QueryGrid: Teradata Database-to-Hadoop User Guide B035-1203 (Release 15.01)
Describes the Teradata QueryGrid: Teradata Database-to-Hadoop B035-1185 (Release 15.00)
SQL interface for transferring data between Teradata Database and
remote Hadoop hosts.
SQL Functions, Operators, Expressions, and Predicates B035-1145 (Release 14.10)
The topic titled LOAD_FROM_HCATALOG describes use of
Teradata QueryGrid 14.10 (referred to as Teradata SQL-H).
Parallel Upgrade Tool (PUT) Reference B035-5716
Describes how to install application software using PUT.
Related Links
URL Description
Notice: Improper use of the Reconfiguration utility can result in data loss.
Overview
Dependencies
The following minimum requirements must exist prior to installing Teradata QueryGrid:
Component Requirement
Hardware Network connectivity between the Teradata nodes and Hadoop
master node, and all data nodes through customer LAN, BYNET,
or Infiniband.
Firmware None
Package tdsqlh, the license/base package
Component Requirement
Package versions are intended to match specific Teradata
database versions. Versions of tdsqlh_td may be older than
the current Teradata Database version to allow backwards
compatibility only. Later packages support older grammar.
For example:
The tdsqlh_td_15.0.xx.xx package must be used with
Teradata Database 15.00.
Teradata Database 14.10 grammar works with the
tdsqlh_td_15.0.xx.xx package.
tdsqlh_hdp, the vendor package
Security
The physical security of data as it resides on disk or is transferred across the network is not
addressed by Teradata QueryGrid. Teradata QueryGrid does not support encryption across
networks.
Teradata QueryGrid 15.x security includes grammar that supports INSERT and SELECT
privileges on the foreign server. Granting EXECUTE privileges is not recommended for
Teradata QueryGrid 15.x.
Teradata QueryGrid 14.10 includes execution mapping security and user mapping
security:
Execution Mapping Security: The user can use any IP or host name to reach any
remote destination. Only the Database Administrator can execute and revoke user
execution privileges.
User Mapping Security: Limits the user to only reading data, preventing the user from
making changes to the accessed table.
Pre-Installation Checklist
Later versions of the tdsqlh_td connector support the syntax of earlier versions. However,
certain features and, therefore, installation tasks are version specific, as noted below and in
the corresponding topics of this documentation.
1. Confirm network connectivity is in place, consulting with a Solution Architect as
necessary.
2. Obtain the Teradata QueryGrid base package or media as directed by your sales
representative.
3. If using Kerberos, and the Kerberos Client is not installed on the Teradata Database
system, download krb5-client from Teradata Software Server (accessed by clicking
Software Downloads at https://tays.teradata.com), and use PUT to install it on the
Teradata master node.
Note: Teradata QueryGrid supports Kerberos starting with connector package
tdsqlh_td 15.00.03.xx.
4. Obtain a Change Control number.
5. Obtain the latest required patches.
6. Obtain remote proxy user information, consulting with a Solution Architect as
necessary.
Note: This task applies only to versions of the connector prior to tdsqlh_td
15.00.02.
7. Obtain the Teradata configuration for FSGCache, Java Heap, and Perm space.
To do the memory calculations, see Knowledge Article KAC13BA1A, accessed through
https://tays.teradata.com), or contact your Customer Support Representative.
8. Identify the HCatalog server.
9. Obtain and run the system validation script.
10. Resolve Hostname conflicts.
11. If using LDAP, update the storage format in the LDAP directory. See Setting Up a
Hadoop Cluster for LDAP.
Note: Teradata QueryGrid supports LDAP starting with connector package tdsqlh_td
15.00.02.01 and through connector package tdsqlh_td 15.00.04.xx.
12. If using Kerberos, set up the Kerberos security feature. See Setting Up Kerberos.
Note: Teradata QueryGrid supports Kerberos starting with connector package
tdsqlh_td 15.00.03.xx.
b Determine the hosts and nodes from where the tdatuser user may access the HDFS.
These configurations must be present, otherwise impersonation is not allowed and
Teradata queries fail with a security error.
a Log on to https://tays.teradata.com.
c Click Search.
f Click Submit.
g Select the teradata-gsctools check box.
hive.server2 Description
hive.server2.authentication LDAP
hive.server2.authentication.ldap.base Matches the directory location where the
DN authenticated users are stored on the LDAP server
hive.server2.authentication.ldap.url Matches the correct LDAP server
Note: HiveServer2 requires the schema for user Distinguished Names (DN) to follow the
format uid=<username>,baseDN where:
username is the name of the user being added
baseDN is the directory where the authenticated usernames are stored
For example:
Setting Up Kerberos
Teradata QueryGrid supports Kerberos starting with connector package tdsqlh_td
15.00.03.xx.
The Kerberos Security feature permits Teradata QueryGrid to provide connectivity when the
Hadoop cluster is protected with Kerberos security. The connector accesses the services of
HCatalog, Hive, HDFS, and JDBC. Each of these resources is protected in a Kerberos system.
1 Verify the Kerberos client is installed on all nodes of the Teradata Database and Hadoop
systems.
2 Copy the krb5.conf file from /etc/ on the Hadoop system to /etc/ on all Teradata
nodes.
3 Navigate to the krb5.conf files in /etc/ on all nodes in both systems and set up
communication between the Teradata Database and the Kerberos authentication server
or realm.
The following example is for a Hadoop master node 1 named
spiral1.mydivision.mycompany.com; be sure to replace values shown in bold with actual
values for your environment.
[libdefaults]
default_realm = MYCLUSTER.HADOOP.MYCOMPANY.COM
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
forwardable = yes
udp_preference_limit = 1
[realms]
EXAMPLE.COM = {
kdc = kerberos.example.com
admin_server = kerberos.example.com
}
MYCLUSTER.HADOOP.MYCOMPANY.COM = {
kdc = spiral1.mydivision.mycompany.com:88
admin_server = spiral1.mydivision.mycompany.com:749
default_domain = hadoop.com }
[domain_realm]
spiral1.mydivision.mycompany.com = MYCLUSTER.HADOOP.MYCOMPANY.COM
[logging]
kdc = FILE:/var/log/krb5/krb5kdc.log
admin_server = FILE:/var/log/krb5/kadmind.log
default = SYSLOG:NOTICE:DAEMON
4 Verify that the krb5.conf file is readable by all users on both systems.
For example: chmod 744 /etc/krb5.conf
Permissions can change during the copy process.
5 After updating the krb5.conf file on the Teradata nodes, restart the database.
6 For each Hadoop cluster protected by Kerberos, configure the required JAR file:
a Create a directory named for the cluster that will be referenced in the CREATE
FOREIGN SERVER statement.
For example, for a cluster named mycluster:
mkdir mycluster
b Copy the required configuration files to the directory created in the previous step:
cp /etc/hadoop/conf/hdfs-site.xml ./mycluster
cp /etc/hadoop/conf/core-site.xml ./mycluster
cp /etc/hadoop/conf/mapred-site.xml ./mycluster
cp /etc/hadoop/conf/yarn-site.xml ./mycluster
cp /etc/hive/conf/hive-site.xml ./mycluster
c In the same directory, create a JAR file named for the directory and containing the
configuration files:
Teradata QueryGrid Connector Package Directory
Version
15.00.04.xx or later /opt/teradata/jvm64/jdk8/bin/jar
cvf mycluster.jar mycluster
Port Requirements
Teradata QueryGrid requires specific ports to be open for specific services. Certain ports
and services vary depending on whether you intend to configure queries using ECA
operators or pre-ECA operators.
Teradata QueryGrid Operator Type Ports Sevices
ECA (available beginning with tdsqlh_td 5002 DataNode
15.01.xx.xx)
10000 HiveServer2
11000 OozieServer
Pre-ECA (available with all versions of 8020 NameNode
tdsqlh_td)
9083 Metastore
10000 HiveServer2
50010 DataNode
Installing Software
Configuring Teradata Proxy Setup with Hadoop 2.1 or Later Systems Using
Ambari
This task applies only to versions of the connector prior to tdsqlh_td 15.00.02.
Use Ambari to edit the core-site.xml file. Note the following:
Property value changes made in Ambari appear in the core-site.xml file.
Property value changes made in core-site.xml through manual editing do not appear
in Ambari.
If Ambari is used for cluster management, then also use Ambari for modifying service
property values.
1 Verify the customer has provided the following information needed for the
configuration.
Ambari server login and password
The default Ambari server username and password is admin/admin. If the customer
has changed the Ambari server password, it must be provided prior to the installation.
Network access to Hadoop Master Node 1
The values to complete the Add Property field have been obtained
b Click Add Property and add a property with the key value
hadoop.proxyuser.tdatuser.hosts and value *.
8 Click Save.
9 When the Restart button appears, restart HDFS by clicking Restart > Restart All >
Confirm Restart All.
Configuring Hadoop for Teradata Proxy Setup for Hadoop 1.3.2 Systems
This task applies only to versions of the connector prior to tdsqlh_td 15.00.02.
For Hadoop 1.3.2 systems, Ambari is disabled and you must edit the core-site.xml file
manually.
1 Navigate to the Hadoop NameNode configuration file:
/etc/hadoop/conf/core-site.xml
2 Add the following properties to the file: and properties to the file.
hadoop.proxyuser.tdatuser.groups
hadoop.proxyuser.tdatuser.hosts
<property>
<name>hadoop.proxyuser.tdatuser.groups</name>
<value>users</value>
<description>
Allow the proxy user tdatuser to impersonate any members of
HDFS group(s). For example, users is used as HDFS group that
tdatuser is allowed to impersonate users belonged to this group.
</description>
</property>
<property>
<name>hadoop.proxyuser.tdatuser.hosts</name>
<value>host1,host2</value>
<description>
The proxy user can connect only from host1 and host2 to
impersonate a user. Here host1 and host2 represents Teradata nodes.
All nodes of the Teradata system need to be listed here in order
for SQL-H query to be processed. It is recommended to use the IP
addresses of the Teradata nodes.
</description>
</property>
The property values are based on the Teradata and Hadoop environment setup
requirements.
3 Save the core-site.xml file.
4 Restart the NameNode:
hcli system restart
a In the Select Nodes step, select the host nodes that have connectivity for Teradata
QueryGrid.
This may not be all nodes.
b When prompted, enter the paths to the packages locations.
e Click Continue.
5 If prompted for the DBS Login Information page, enter it and click Continue.
PUT must proceed until finished.
su hdfs
xst -k /etc/security/keytabs/hdfs.headless.keytab hdfs/
<fully.qualified.domain.name>
b Retrieve tickets from the Key Distribution Center (KDC) for users hdfs and hive,
replacing hdfs-HDP23TEST1@HDP23TEST1.HADOOP.TERADATA.COM with the
values for the primary, instance, and realm of the actual system:
su hdfs
kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs-
HDP23TEST1@HDP23TEST1.HADOOP.TERADATA.COM
#must use hdfs to execute this
exit
2 On the Hadoop Master node, install the Teradata QueryGrid connector package:
The installation creates /apps/querygrid/ on HDFS and deploys the required UDF
JAR files and libraries.
3 Verify deployment of workflow.xml to /apps/querygrid/, being sure to run su hdfs
before ls on hdfs if the Hadoop cluster is protected by Kerberos:
Found 16 items
-rwxr-xr-x 3 hdfs hdfs 294335 2015-11-25 14:28 /apps/querygrid/lib/
hive-common-1.2.1.2.3.0.0-2557.jar
-rwxr-xr-x 3 hdfs hdfs 20593816 2015-11-25 14:28 /apps/
querygrid/lib/hive-exec-1.2.1.2.3.0.0-2557.jar
-rwxr-xr-x 3 hdfs hdfs 257645 2015-11-25 14:28 /apps/querygrid/lib/
hive-hcat-core-1.2.1.2.3.0.0-2557.jar
-rwxr-xr-x 3 hdfs hdfs 5505267 2015-11-25 14:28 /apps/querygrid/lib/
hive-metastore-1.2.1.2.3.0.0-2557.jar
-rwxr-xr-x 3 hdfs hdfs 916936 2015-11-25 14:28 /apps/querygrid/lib/
hive-serde-1.2.1.2.3.0.0-2557.jar
-rw-r--r-- 3 hdfs hdfs 19097 2015-11-25 14:28 /apps/querygrid/lib/
hive-site.xml
-rwxr-xr-x 3 hdfs hdfs 15998 2015-11-25 14:28 /apps/querygrid/lib/
hiveudf.jar
-rwxr-xr-x 3 hdfs hdfs 543044 2015-11-25 14:28 /apps/querygrid/lib/
joda-time-1.6.2.jar
-rwxr-xr-x 3 hdfs hdfs 275186 2015-11-25 14:28 /apps/querygrid/lib/
libfb303-0.9.0.jar
-rwxr-xr-x 3 hdfs hdfs 50417 2015-11-25 14:28 /apps/querygrid/lib/
mapper.jar
-rwxr-xr-x 3 hdfs hdfs 21866 2015-11-25 14:28 /apps/querygrid/lib/
tdefssp.jar
-rwxr-xr-x 3 hdfs hdfs 2455 2015-11-25 14:28 /apps/querygrid/lib/
tdgssconfig.jar
-rwxr-xr-x 3 hdfs hdfs 143712 2015-11-25 14:28 /apps/querygrid/lib/
tdptl.jar
-rwxr-xr-x 3 hdfs hdfs 89609 2015-11-25 14:28 /apps/querygrid/lib/
tdrowconverter.jar
-rwxr-xr-x 3 hdfs hdfs 21 2015-11-25 14:28 /apps/querygrid/lib/
tdsqlh_td.properties
-rwxr-xr-x 3 hdfs hdfs 968653 2015-11-25 14:28 /apps/querygrid/lib/
terajdbc4.jar
su hive
kinit -kt /etc/security/keytabs/hive.service.keytab hive/
tdh123m1.labs.teradata.com@HDP23TEST1.HADOOP.TERADATA.COM
hive
b On another console, open the Teradata QueryGrid connector installation file (for
example, tdsqlh_td-15.01.00.00-1.x86_64.rpm) in vim, copy its creating
function statement, and execute it.
For tdsqlh_td 15.01.01.xx:
SET hive.execution.engine = mr;use default;CREATE FUNCTION
INDICFMT AS
'com.teradata.dynaload.hcatalog.hiveudf.TDIndicRowTbl' USING JAR
'hdfs:///apps/querygrid/lib/tdptl.jar',JAR 'hdfs:///apps/
querygrid/lib/tdefssp.jar', JAR 'hdfs:///apps/querygrid/lib/
tdgssconfig.jar', JAR 'hdfs:///apps/querygrid/lib/terajdbc4.jar',
JAR 'hdfs:///apps/querygrid/lib/tdrowconverter.jar', JAR 'hdfs:///
apps/querygrid/lib/joda-time-2.5.jar', JAR 'hdfs:///apps/
querygrid/lib/hiveudf.jar';
a Add the following lines into tdsqlh_hdp.bteq near similar lines of code:
CALL sqlj.install_jar('cj!myjar.jar','mycluster',0);
CALL sqlj.replace_jar('cj!myjar.jar','mycluster');
CALL sqlj.alter_java_path('tdefssp_t2h','(*,mycluster)(*,jr_terajdbc4)
(*,jr_tdgssconfig)(*,avro_HDP2_3_0)(*,commons_cli_HDP2_3_0)
(*,commons_codec_HDP2_3_0)(*,commons_configuration_HDP2_3_0)
(*,commons_lang_HDP2_3_0)(*,commons_logging_HDP2_3_0)
(*,datanucleus_core_HDP2_3_0)(*,guava_HDP2_3_0)(*,hadoop_auth_HDP2_3_0)
(*,hadoop_common_HDP2_3_0)(*,hadoop_hdfs_HDP2_3_0)
(*,hadoop_mr_common_HDP2_3_0)(*,hadoop_mr_core_HDP2_3_0)
(*,hive_common_HDP2_3_0)(*,hive_exec_HDP2_3_0)
(*,hive_hcat_core_HDP2_3_0)(*,hive_jdbc_HDP2_3_0)
(*,hive_metastore_HDP2_3_0)(*,hive_serde_HDP2_3_0)
(*,hive_service_HDP2_3_0)(*,httpclient_HDP2_3_0)(*,httpcore_HDP2_3_0)
(*,jackson_core_asl_HDP2_3_0)(*,jetty_HDP2_3_0)(*,jetty_util_HDP2_3_0)
(*,libfb303_HDP2_3_0)(*,log4j_HDP2_3_0)(*,pig_HDP2_3_0)
(*,slf4j_api_HDP2_3_0)(*,slf4j_log4j12_HDP2_3_0)(*,snappy_java_HDP2_3_0)
(*,common_collection2_3_0)(*,htrace_core2_3_0)(*,yarn_common2_3_0)
(*,yarn_api2_3_0)(*,commons_io_HDP2_3_0)(*,servlet_api_HDP2_3_0)');
CALL sqlj.alter_java_path('SQLH_NO_VER','(*,tdsqlh_hdp_HDP2_1_2)
(*,avro_HDP2_1_2)(*,commons-cli_HDP2_1_2)(*,commons-codec_HDP2_1_2)
(*,commons-configuration_HDP2_1_2)(*,commons-lang_HDP2_1_2)(*,commons-
logging_HDP2_1_2)(*,datanucleus-core_HDP2_1_2)(*,guava_HDP2_1_2)
(*,hadoop-auth_HDP2_1_2)(*,hadoop-common_HDP2_1_2)(*,hadoop-
hdfs_HDP2_1_2)(*,hadoop-mr-common_HDP2_1_2)(*,hadoop-mr-core_HDP2_1_2)
(*,hive-common_HDP2_1_2)(*,hive-exec_HDP2_1_2)(*,hive-hcat-
core_HDP2_1_2)(*,hive-jdbc_HDP2_1_2)(*,hive-metastore_HDP2_1_2)(*,hive-
serde_HDP2_1_2)(*,hive-service_HDP2_1_2)(*,httpclient_HDP2_1_2)
(*,httpcore_HDP2_1_2)(*,jackson-core-asl_HDP2_1_2)(*,jetty_HDP2_1_2)
(*,jetty-util_HDP2_1_2)(*,libfb303_HDP2_1_2)(*,log4j_HDP2_1_2)
(*,pig_HDP2_1_2)(*,slf4j-api_HDP2_1_2)(*,slf4j-log4j12_HDP2_1_2)
(*,snappy-java_HDP2_1_2)(*,mycluster)');
The script installs the Hadoop vendor libraries and links them with the objects created in
the previous step.
2 Review /var/opt/teradata/tdtemp/
sqlh_hdp_postinstall_<timestamp>.log for errors.
The following table outlines the most common errors:
Error Type Example Cause Action
SYSLIB call During installation, Increase the
database sqlj.install_jar('cj!pig- Hadoop JARs require 40 SYSLIB
withouthadoop.jar','pig', megabytes of space. database size.
0); *** Failure 2644 No There is not enough
more room in database available space in the
SYSLIB. SYSLIB database.
SQL Failure Example 1: Running the setup script These errors are
for the first time benign and can
DROP FUNCTION
sometimes returns these be ignored.
SYSLIB.load_from_hcatalog
messages.
; *** Failure 5589
Function
'load_from_hcatalog' does
not exist.
Example 2:
call
sqlj.remove_jar('SQLH',
0); *** Failure 7972 Jar
'SYSLIB.SQLH' does not
exist.
Example 3:
*** Warning: 9241 Check
output for possible
warnings encountered in
Installing or Replacing a
JAR.
This task applies only to Teradata QueryGrid connector versions before tdsqlh_td
15.01.xx.xx with Teradata Database 15.00 installations.
cufconfig was enhanced for Teradata QueryGrid 15.0. A new option, JVMOptions, was
added so that the environment file does not have to be placed on all nodes. The options
needed can be added using cufconfig and are automatically replicated to all nodes.
1 If upgrading, before beginning the upgrade process remove any existing JVM options:
c Run cufconfig o.
The JavaEnvFile field value must be empty.
2 Calculate the Java Heap values.
To do the memory calculations, see Knowledge Article KAC13BA1A, accessed through
https://tays.teradata.com), or contact your Customer Support Representative.
3 In the /tmp directory of the primary Teradata node, create a new jvmopt.txt file with
the following options:
-server
-XX:UseParallelGC
-XX:+UseParallelOldGC
Xms7100m -Xmx7100m
-XX:NewSize=2370m
-XX:MaxNewSize=2370m
-XX:MaxPermSize=864m
This task applies only to Teradata QueryGrid connector versions before tdsqlh_td
15.01.xx.xx with Teradata Database 14.10 installations. During upgrades, remove the
previous JVM heap size settings and reset them.
1 If upgrading, before beginning the upgrade process remove any existing JVM options:
6 In the /tmp directory of the primary Teradata node, create the jvm_base.txt file and
add JavaEnvFile:/tmp/jvmopt.txt.
7 Run cufconfig f /tmp/jvm_base.txt.
8 Run cufconfig o.
The JavaEnvFile field value must be empty.
9 Restart the Teradata Database:
tpareset -y restart-with-sqlh
This task applies only to Teradata QueryGrid connector versions before tdsqlh_td
15.01.xx.xx with Teradata Database 14.10 or Teradata Database 15.00 installations.
Teradata QueryGrid query concurrency depends on FSGCache settings and JVM Heap size
being configured. The desired concurrency level dictates the FSG cache setting and the JVM
Heap and Perm space.
To do the memory calculations, see Knowledge Article KAC13BA1A, accessed through
https://tays.teradata.com), or contact your Customer Support Representative.
3 Use SQL Assistant or BTEQ to log into the Teradata primary node as user dbc.
4 Run the Teradata-to-Hadoop query to import rows from the tdsqlh_test table.
5 Run the query to count the rows in the tdsqlh_test table, being sure to first replace all
variable placeholder values indicated by italics with the actual values for your
environment.
Note: In the following query examples, MYHCATALOGSERVER represents the defined
Metastore host name.
For Hadoop 2.3 or Hadoop 2.1 systems with one master node and without Kerberos
security or Hadoop 1.3.2 systems:
For Hadoop 2.3 or Hadoop 2.1 systems with multiple master nodes and Kerberos
security:
Note: Each master node in the system must have an entry.
For Hadoop 2.3 or Hadoop 2.1 systems with multiple master nodes and without
Kerberos security:
Note: Each master node in the system must have an entry.
If the query returns an error instead of row count 805 then the Teradata-to-Hadoop
setup requires manual troubleshooting to isolate the problem.
cd package_location
3 Review /var/opt/teradata/tdtemp/sqlh_postinstall_<timestamp>.log
and /var/opt/teradata/tdtemp/sqlh_hdp_postinstall_<timestamp>.log
for errors.
The following table outlines the most common errors:
Error Type Example Cause Action
SYSLIB call During installation, Increase the
database sqlj.install_jar('cj!pig- Hadoop JARs require 40 SYSLIB
withouthadoop.jar','pig', megabytes of space. database size.
0); *** Failure 2644 No There is not enough
more room in database available space in the
SYSLIB. SYSLIB database.
SQL Failure Example 1: Running the setup script These errors are
for the first time benign and can
DROP FUNCTION
sometimes returns these be ignored.
SYSLIB.load_from_hcatalog
messages.
; *** Failure 5589
Function
'load_from_hcatalog' does
not exist.
Example 2:
call
sqlj.remove_jar('SQLH',
0); *** Failure 7972 Jar
'SYSLIB.SQLH' does not
exist.
Example 3:
*** Warning: 9241 Check
output for possible
warnings encountered in
Installing or Replacing a
JAR.