ambari-server 安装

ambari-server 安装

centos6.5 :

cd /etc/yum.repo.d/

yum -y install ambari-server
setup
  1. [root@hadoop-server01 yum.repos.d]# ambari-server setup
  2. Using python /usr/bin/python2.6
  3. Setup ambari-server
  4. Checking SELinux...
  5. SELinux status is 'enabled'
  6. SELinux mode is 'enforcing'
  7. Temporarily disabling SELinux
  8. WARNING: SELinux is set to 'permissive' mode and temporarily disabled.
  9. OK to continue [y/n] (y)? y
  10. Customize user account for ambari-server daemon [y/n] (n)? y
  11. Enter user account for ambari-server daemon (root):y
  12. Invalid username.
  13. Enter user account for ambari-server daemon (root):root
  14. Adjusting ambari-server permissions and ownership...
  15. Checking iptables...
  16. WARNING: iptables is running. Confirm the necessary Ambari ports are accessible. Refer to the Ambari documentation for more details on ports.
  17. OK to continue [y/n] (y)? y
  18. Checking JDK...
  19. [1] Oracle JDK 1.7
  20. [2] Oracle JDK 1.6
  21. [3] - Custom JDK
  22. ==============================================================================
  23. Enter choice (1): 3
  24. WARNING: JDK must be installed on all hosts and JAVA_HOME must be valid on all hosts.
  25. WARNING: JCE Policy files are required for configuring Kerberos security. If you plan to use Kerberos,please make sure JCE Unlimited Strength Jurisdiction Policy Files are valid on all hosts.
  26. Path to JAVA_HOME: /home/app/jdk/bin/java
  27. ERROR: Exiting with exit code 1.
  28. REASON: Downloading or installing JDK failed: 'Fatal exception: Java home path or java binary file is unavailable. Please put correct path to java home., exit code 1'. Exiting.
  29. [root@hadoop-server01 yum.repos.d]# ambari-server setup
  30. Using python /usr/bin/python2.6
  31. Setup ambari-server
  32. Checking SELinux...
  33. SELinux status is 'enabled'
  34. SELinux mode is 'permissive'
  35. WARNING: SELinux is set to 'permissive' mode and temporarily disabled.
  36. OK to continue [y/n] (y)? y
  37. Ambari-server daemon is configured to run under user 'root'. Change this setting [y/n] (n)? y
  38. Enter user account for ambari-server daemon (root):root
  39. Adjusting ambari-server permissions and ownership...
  40. Checking iptables...
  41. WARNING: iptables is running. Confirm the necessary Ambari ports are accessible. Refer to the Ambari documentation for more details on ports.
  42. OK to continue [y/n] (y)? y
  43. Checking JDK...
  44. [1] Oracle JDK 1.7
  45. [2] Oracle JDK 1.6
  46. [3] - Custom JDK
  47. ==============================================================================
  48. Enter choice (1): 3
  49. WARNING: JDK must be installed on all hosts and JAVA_HOME must be valid on all hosts.
  50. WARNING: JCE Policy files are required for configuring Kerberos security. If you plan to use Kerberos,please make sure JCE Unlimited Strength Jurisdiction Policy Files are valid on all hosts.
  51. Path to JAVA_HOME: /home/hadoop/app/jdk
  52. Validating JDK on Ambari Server...done.
  53. Completing setup...
  54. Configuring database...
  55. Enter advanced database configuration [y/n] (n)? Y
  56. Configuring database...
  57. ==============================================================================
  58. Choose one of the following options:
  59. [1] - PostgreSQL (Embedded)
  60. [2] - Oracle
  61. [3] - MySQL
  62. [4] - PostgreSQL
  63. ==============================================================================
  64. Enter choice (1): 3
  65. Hostname (localhost): 192.168.32.201
  66. Port (3306):
  67. Database name (ambari):
  68. Username (ambari):
  69. Enter Database Password (bigdata):
  70. Configuring ambari database...
  71. WARNING: Before starting Ambari Server, you must copy the MySQL JDBC driver JAR file to /usr/share/java.
  72. Press <enter> to continue.
  73. Copying JDBC drivers to server resources...
  74. Configuring remote database connection properties...
  75. WARNING: Before starting Ambari Server, you must run the following DDL against the database to create the schema: /var/lib/ambari-server/resources/Ambari-DDL-MySQL-CREATE.sql
  76. Proceed with configuring remote database connection properties [y/n] (y)? y
  77. Extracting system views...
  78. ambari-admin-2.0.1.45.jar
  79. ...
  80. Adjusting ambari-server permissions and ownership...
  81. Ambari Server 'setup' completed successfully.
  82. [root@hadoop-server01 yum.repos.d]# ambari-server start
  83. Using python /usr/bin/python2.6
  84. Starting ambari-server
  85. Ambari Server running with administrator privileges.
  86. Organizing resource files at /var/lib/ambari-server/resources...
  87. Server PID at: /var/run/ambari-server/ambari-server.pid
  88. Server out at: /var/log/ambari-server/ambari-server.out
  89. Server log at: /var/log/ambari-server/ambari-server.log
  90. Waiting for server start....................
  91. Ambari Server 'start' completed successfully.
  92. [root@hadoop-server01 yum.repos.d]# nnmap
  93. bash: nnmap: command not found
  94. [root@hadoop-server01 yum.repos.d]# nmap
  95. Nmap 5.51 ( http://nmap.org )
  96. Usage: nmap [Scan Type(s)] [Options] {target specification}
  97. TARGET SPECIFICATION:
  98. Can pass hostnames, IP addresses, networks, etc.
  99. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
  100. -iL <inputfilename>: Input from list of hosts/networks
  101. -iR <num hosts>: Choose random targets
  102. --exclude <host1[,host2][,host3],...>: Exclude hosts/networks
  103. --excludefile <exclude_file>: Exclude list from file
  104. HOST DISCOVERY:
  105. -sL: List Scan - simply list targets to scan
  106. -sn: Ping Scan - disable port scan
  107. -Pn: Treat all hosts as online -- skip host discovery
  108. -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
  109. -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
  110. -PO[protocol list]: IP Protocol Ping
  111. -PR: ARP ping - does not need HW address -> IP translation
  112. -n/-R: Never do DNS resolution/Always resolve [default: sometimes]
  113. --dns-servers <serv1[,serv2],...>: Specify custom DNS servers
  114. --system-dns: Use OS's DNS resolver
  115. --traceroute: Trace hop path to each host
  116. SCAN TECHNIQUES:
  117. -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
  118. -sU: UDP Scan
  119. -sN/sF/sX: TCP Null, FIN, and Xmas scans
  120. --scanflags <flags>: Customize TCP scan flags
  121. -sI <zombie host[:probeport]>: Idle scan
  122. -sY/sZ: SCTP INIT/COOKIE-ECHO scans
  123. -sO: IP protocol scan
  124. -b <FTP relay host>: FTP bounce scan
  125. PORT SPECIFICATION AND SCAN ORDER:
  126. -p <port ranges>: Only scan specified ports
  127. Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080,S:9
  128. -F: Fast mode - Scan fewer ports than the default scan
  129. -r: Scan ports consecutively - don't randomize
  130. --top-ports <number>: Scan <number> most common ports
  131. --port-ratio <ratio>: Scan ports more common than <ratio>
  132. SERVICE/VERSION DETECTION:
  133. -sV: Probe open ports to determine service/version info
  134. -sR: Check what service uses opened ports using RPC scan
  135. --version-intensity <level>: Set from 0 (light) to 9 (try all probes)
  136. --version-light: Limit to most likely probes (intensity 2)
  137. --version-all: Try every single probe (intensity 9)
  138. --version-trace: Show detailed version scan activity (for debugging)
  139. SCRIPT SCAN:
  140. -sC: equivalent to --script=default
  141. --script=<Lua scripts>: <Lua scripts> is a comma separated list of
  142. directories, script-files or script-categories
  143. --script-args=<n1=v1,[n2=v2,...]>: provide arguments to scripts
  144. --script-trace: Show all data sent and received
  145. --script-updatedb: Update the script database.
  146. OS DETECTION:
  147. -O: Enable OS detection
  148. --osscan-limit: Limit OS detection to promising targets
  149. --osscan-guess: Guess OS more aggressively
  150. TIMING AND PERFORMANCE:
  151. Options which take <time> are in seconds, or append 'ms' (milliseconds),
  152. 's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
  153. -T<0-5>: Set timing template (higher is faster)
  154. --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes
  155. --min-parallelism/max-parallelism <numprobes>: Probe parallelization
  156. --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies
  157. probe round trip time.
  158. --max-retries <tries>: Caps number of port scan probe retransmissions.
  159. --host-timeout <time>: Give up on target after this long
  160. --scan-delay/--max-scan-delay <time>: Adjust delay between probes
  161. --min-rate <number>: Send packets no slower than <number> per second
  162. --max-rate <number>: Send packets no faster than <number> per second
  163. FIREWALL/IDS EVASION AND SPOOFING:
  164. -f; --mtu <val>: fragment packets (optionally w/given MTU)
  165. -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
  166. -S <IP_Address>: Spoof source address
  167. -e <iface>: Use specified interface
  168. -g/--source-port <portnum>: Use given port number
  169. --data-length <num>: Append random data to sent packets
  170. --ip-options <options>: Send packets with specified ip options
  171. --ttl <val>: Set IP time-to-live field
  172. --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address
  173. --badsum: Send packets with a bogus TCP/UDP/SCTP checksum
  174. OUTPUT:
  175. -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,
  176. and Grepable format, respectively, to the given filename.
  177. -oA <basename>: Output in the three major formats at once
  178. -v: Increase verbosity level (use -vv or more for greater effect)
  179. -d: Increase debugging level (use -dd or more for greater effect)
  180. --reason: Display the reason a port is in a particular state
  181. --open: Only show open (or possibly open) ports
  182. --packet-trace: Show all packets sent and received
  183. --iflist: Print host interfaces and routes (for debugging)
  184. --log-errors: Log errors/warnings to the normal-format output file
  185. --append-output: Append to rather than clobber specified output files
  186. --resume <filename>: Resume an aborted scan
  187. --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML
  188. --webxml: Reference stylesheet from Nmap.Org for more portable XML
  189. --no-stylesheet: Prevent associating of XSL stylesheet w/XML output
  190. MISC:
  191. -6: Enable IPv6 scanning
  192. -A: Enable OS detection, version detection, script scanning, and traceroute
  193. --datadir <dirname>: Specify custom Nmap data file location
  194. --send-eth/--send-ip: Send using raw ethernet frames or IP packets
  195. --privileged: Assume that the user is fully privileged
  196. --unprivileged: Assume the user lacks raw socket privileges
  197. -V: Print version number
  198. -h: Print this help summary page.
  199. EXAMPLES:
  200. nmap -v -A scanme.nmap.org
  201. nmap -v -sn 192.168.0.0/16 10.0.0.0/8
  202. nmap -v -iR 10000 -Pn -p 80
  203. SEE THE MAN PAGE (http://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES
  204. [root@hadoop-server01 yum.repos.d]# ^C
  205. [root@hadoop-server01 yum.repos.d]# nmap -traceroute localhost
  206. Starting Nmap 5.51 ( http://nmap.org ) at 2015-06-28 16:51 PDT
  207. Nmap scan report for localhost (127.0.0.1)
  208. Host is up (0.000016s latency).
  209. Not shown: 996 closed ports
  210. PORT STATE SERVICE
  211. 22/tcp open ssh
  212. 25/tcp open smtp
  213. 631/tcp open ipp
  214. 3306/tcp open mysql
  215. Nmap done: 1 IP address (1 host up) scanned in 0.48 seconds

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注