core-default.xml 90 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726
  1. <?xml version="1.0"?>
  2. <?xml-stylesheet type="text/xsl" href="configuration.xsl"?>
  3. <!--
  4. Licensed to the Apache Software Foundation (ASF) under one or more
  5. contributor license agreements. See the NOTICE file distributed with
  6. this work for additional information regarding copyright ownership.
  7. The ASF licenses this file to You under the Apache License, Version 2.0
  8. (the "License"); you may not use this file except in compliance with
  9. the License. You may obtain a copy of the License at
  10. http://www.apache.org/licenses/LICENSE-2.0
  11. Unless required by applicable law or agreed to in writing, software
  12. distributed under the License is distributed on an "AS IS" BASIS,
  13. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. See the License for the specific language governing permissions and
  15. limitations under the License.
  16. -->
  17. <!-- Do not modify this file directly. Instead, copy entries that you -->
  18. <!-- wish to modify from this file into core-site.xml and change them -->
  19. <!-- there. If core-site.xml does not already exist, create it. -->
  20. <configuration>
  21. <!--- global properties -->
  22. <property>
  23. <name>hadoop.common.configuration.version</name>
  24. <value>3.0.0</value>
  25. <description>version of this configuration file</description>
  26. </property>
  27. <property>
  28. <name>hadoop.tmp.dir</name>
  29. <value>/tmp/hadoop-${user.name}</value>
  30. <description>A base for other temporary directories.</description>
  31. </property>
  32. <property>
  33. <name>hadoop.http.filter.initializers</name>
  34. <value>org.apache.hadoop.http.lib.StaticUserWebFilter</value>
  35. <description>A comma separated list of class names. Each class in the list
  36. must extend org.apache.hadoop.http.FilterInitializer. The corresponding
  37. Filter will be initialized. Then, the Filter will be applied to all user
  38. facing jsp and servlet web pages. The ordering of the list defines the
  39. ordering of the filters.</description>
  40. </property>
  41. <!--- security properties -->
  42. <property>
  43. <name>hadoop.security.authorization</name>
  44. <value>false</value>
  45. <description>Is service-level authorization enabled?</description>
  46. </property>
  47. <property>
  48. <name>hadoop.security.instrumentation.requires.admin</name>
  49. <value>false</value>
  50. <description>
  51. Indicates if administrator ACLs are required to access
  52. instrumentation servlets (JMX, METRICS, CONF, STACKS).
  53. </description>
  54. </property>
  55. <property>
  56. <name>hadoop.security.authentication</name>
  57. <value>simple</value>
  58. <description>Possible values are simple (no authentication), and kerberos
  59. </description>
  60. </property>
  61. <property>
  62. <name>hadoop.security.group.mapping</name>
  63. <value>org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback</value>
  64. <description>
  65. Class for user to group mapping (get groups for a given user) for ACL.
  66. The default implementation,
  67. org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback,
  68. will determine if the Java Native Interface (JNI) is available. If JNI is
  69. available the implementation will use the API within hadoop to resolve a
  70. list of groups for a user. If JNI is not available then the shell
  71. implementation, ShellBasedUnixGroupsMapping, is used. This implementation
  72. shells out to the Linux/Unix environment with the
  73. <code>bash -c groups</code> command to resolve a list of groups for a user.
  74. </description>
  75. </property>
  76. <property>
  77. <name>hadoop.security.dns.interface</name>
  78. <description>
  79. The name of the Network Interface from which the service should determine
  80. its host name for Kerberos login. e.g. eth2. In a multi-homed environment,
  81. the setting can be used to affect the _HOST substitution in the service
  82. Kerberos principal. If this configuration value is not set, the service
  83. will use its default hostname as returned by
  84. InetAddress.getLocalHost().getCanonicalHostName().
  85. Most clusters will not require this setting.
  86. </description>
  87. </property>
  88. <property>
  89. <name>hadoop.security.dns.nameserver</name>
  90. <description>
  91. The host name or IP address of the name server (DNS) which a service Node
  92. should use to determine its own host name for Kerberos Login. Requires
  93. hadoop.security.dns.interface.
  94. Most clusters will not require this setting.
  95. </description>
  96. </property>
  97. <property>
  98. <name>hadoop.security.dns.log-slow-lookups.enabled</name>
  99. <value>false</value>
  100. <description>
  101. Time name lookups (via SecurityUtil) and log them if they exceed the
  102. configured threshold.
  103. </description>
  104. </property>
  105. <property>
  106. <name>hadoop.security.dns.log-slow-lookups.threshold.ms</name>
  107. <value>1000</value>
  108. <description>
  109. If slow lookup logging is enabled, this threshold is used to decide if a
  110. lookup is considered slow enough to be logged.
  111. </description>
  112. </property>
  113. <property>
  114. <name>hadoop.security.groups.cache.secs</name>
  115. <value>300</value>
  116. <description>
  117. This is the config controlling the validity of the entries in the cache
  118. containing the user->group mapping. When this duration has expired,
  119. then the implementation of the group mapping provider is invoked to get
  120. the groups of the user and then cached back.
  121. </description>
  122. </property>
  123. <property>
  124. <name>hadoop.security.groups.negative-cache.secs</name>
  125. <value>30</value>
  126. <description>
  127. Expiration time for entries in the the negative user-to-group mapping
  128. caching, in seconds. This is useful when invalid users are retrying
  129. frequently. It is suggested to set a small value for this expiration, since
  130. a transient error in group lookup could temporarily lock out a legitimate
  131. user.
  132. Set this to zero or negative value to disable negative user-to-group caching.
  133. </description>
  134. </property>
  135. <property>
  136. <name>hadoop.security.groups.cache.warn.after.ms</name>
  137. <value>5000</value>
  138. <description>
  139. If looking up a single user to group takes longer than this amount of
  140. milliseconds, we will log a warning message.
  141. </description>
  142. </property>
  143. <property>
  144. <name>hadoop.security.groups.cache.background.reload</name>
  145. <value>false</value>
  146. <description>
  147. Whether to reload expired user->group mappings using a background thread
  148. pool. If set to true, a pool of
  149. hadoop.security.groups.cache.background.reload.threads is created to
  150. update the cache in the background.
  151. </description>
  152. </property>
  153. <property>
  154. <name>hadoop.security.groups.cache.background.reload.threads</name>
  155. <value>3</value>
  156. <description>
  157. Only relevant if hadoop.security.groups.cache.background.reload is true.
  158. Controls the number of concurrent background user->group cache entry
  159. refreshes. Pending refresh requests beyond this value are queued and
  160. processed when a thread is free.
  161. </description>
  162. </property>
  163. <property>
  164. <name>hadoop.security.groups.shell.command.timeout</name>
  165. <value>0s</value>
  166. <description>
  167. Used by the ShellBasedUnixGroupsMapping class, this property controls how
  168. long to wait for the underlying shell command that is run to fetch groups.
  169. Expressed in seconds (e.g. 10s, 1m, etc.), if the running command takes
  170. longer than the value configured, the command is aborted and the groups
  171. resolver would return a result of no groups found. A value of 0s (default)
  172. would mean an infinite wait (i.e. wait until the command exits on its own).
  173. </description>
  174. </property>
  175. <property>
  176. <name>hadoop.security.group.mapping.ldap.connection.timeout.ms</name>
  177. <value>60000</value>
  178. <description>
  179. This property is the connection timeout (in milliseconds) for LDAP
  180. operations. If the LDAP provider doesn't establish a connection within the
  181. specified period, it will abort the connect attempt. Non-positive value
  182. means no LDAP connection timeout is specified in which case it waits for the
  183. connection to establish until the underlying network times out.
  184. </description>
  185. </property>
  186. <property>
  187. <name>hadoop.security.group.mapping.ldap.read.timeout.ms</name>
  188. <value>60000</value>
  189. <description>
  190. This property is the read timeout (in milliseconds) for LDAP
  191. operations. If the LDAP provider doesn't get a LDAP response within the
  192. specified period, it will abort the read attempt. Non-positive value
  193. means no read timeout is specified in which case it waits for the response
  194. infinitely.
  195. </description>
  196. </property>
  197. <property>
  198. <name>hadoop.security.group.mapping.ldap.url</name>
  199. <value></value>
  200. <description>
  201. The URL of the LDAP server to use for resolving user groups when using
  202. the LdapGroupsMapping user to group mapping.
  203. </description>
  204. </property>
  205. <property>
  206. <name>hadoop.security.group.mapping.ldap.ssl</name>
  207. <value>false</value>
  208. <description>
  209. Whether or not to use SSL when connecting to the LDAP server.
  210. </description>
  211. </property>
  212. <property>
  213. <name>hadoop.security.group.mapping.ldap.ssl.keystore</name>
  214. <value></value>
  215. <description>
  216. File path to the SSL keystore that contains the SSL certificate required
  217. by the LDAP server.
  218. </description>
  219. </property>
  220. <property>
  221. <name>hadoop.security.group.mapping.ldap.ssl.keystore.password.file</name>
  222. <value></value>
  223. <description>
  224. The path to a file containing the password of the LDAP SSL keystore. If
  225. the password is not configured in credential providers and the property
  226. hadoop.security.group.mapping.ldap.ssl.keystore.password is not set,
  227. LDAPGroupsMapping reads password from the file.
  228. IMPORTANT: This file should be readable only by the Unix user running
  229. the daemons and should be a local file.
  230. </description>
  231. </property>
  232. <property>
  233. <name>hadoop.security.group.mapping.ldap.ssl.keystore.password</name>
  234. <value></value>
  235. <description>
  236. The password of the LDAP SSL keystore. this property name is used as an
  237. alias to get the password from credential providers. If the password can
  238. not be found and hadoop.security.credential.clear-text-fallback is true
  239. LDAPGroupsMapping uses the value of this property for password.
  240. </description>
  241. </property>
  242. <property>
  243. <name>hadoop.security.credential.clear-text-fallback</name>
  244. <value>true</value>
  245. <description>
  246. true or false to indicate whether or not to fall back to storing credential
  247. password as clear text. The default value is true. This property only works
  248. when the password can't not be found from credential providers.
  249. </description>
  250. </property>
  251. <property>
  252. <name>hadoop.security.credential.provider.path</name>
  253. <value></value>
  254. <description>
  255. A comma-separated list of URLs that indicates the type and
  256. location of a list of providers that should be consulted.
  257. </description>
  258. </property>
  259. <property>
  260. <name>hadoop.security.credstore.java-keystore-provider.password-file</name>
  261. <value></value>
  262. <description>
  263. The path to a file containing the custom password for all keystores
  264. that may be configured in the provider path.
  265. </description>
  266. </property>
  267. <property>
  268. <name>hadoop.security.group.mapping.ldap.bind.user</name>
  269. <value></value>
  270. <description>
  271. The distinguished name of the user to bind as when connecting to the LDAP
  272. server. This may be left blank if the LDAP server supports anonymous binds.
  273. </description>
  274. </property>
  275. <property>
  276. <name>hadoop.security.group.mapping.ldap.bind.password.file</name>
  277. <value></value>
  278. <description>
  279. The path to a file containing the password of the bind user. If
  280. the password is not configured in credential providers and the property
  281. hadoop.security.group.mapping.ldap.bind.password is not set,
  282. LDAPGroupsMapping reads password from the file.
  283. IMPORTANT: This file should be readable only by the Unix user running
  284. the daemons and should be a local file.
  285. </description>
  286. </property>
  287. <property>
  288. <name>hadoop.security.group.mapping.ldap.bind.password</name>
  289. <value></value>
  290. <description>
  291. The password of the bind user. this property name is used as an
  292. alias to get the password from credential providers. If the password can
  293. not be found and hadoop.security.credential.clear-text-fallback is true
  294. LDAPGroupsMapping uses the value of this property for password.
  295. </description>
  296. </property>
  297. <property>
  298. <name>hadoop.security.group.mapping.ldap.base</name>
  299. <value></value>
  300. <description>
  301. The search base for the LDAP connection. This is a distinguished name,
  302. and will typically be the root of the LDAP directory.
  303. </description>
  304. </property>
  305. <property>
  306. <name>hadoop.security.group.mapping.ldap.userbase</name>
  307. <value></value>
  308. <description>
  309. The search base for the LDAP connection for user search query. This is a
  310. distinguished name, and its the root of the LDAP directory for users.
  311. If not set, hadoop.security.group.mapping.ldap.base is used.
  312. </description>
  313. </property>
  314. <property>
  315. <name>hadoop.security.group.mapping.ldap.groupbase</name>
  316. <value></value>
  317. <description>
  318. The search base for the LDAP connection for group search . This is a
  319. distinguished name, and its the root of the LDAP directory for groups.
  320. If not set, hadoop.security.group.mapping.ldap.base is used.
  321. </description>
  322. </property>
  323. <property>
  324. <name>hadoop.security.group.mapping.ldap.search.filter.user</name>
  325. <value>(&amp;(objectClass=user)(sAMAccountName={0}))</value>
  326. <description>
  327. An additional filter to use when searching for LDAP users. The default will
  328. usually be appropriate for Active Directory installations. If connecting to
  329. an LDAP server with a non-AD schema, this should be replaced with
  330. (&amp;(objectClass=inetOrgPerson)(uid={0}). {0} is a special string used to
  331. denote where the username fits into the filter.
  332. If the LDAP server supports posixGroups, Hadoop can enable the feature by
  333. setting the value of this property to "posixAccount" and the value of
  334. the hadoop.security.group.mapping.ldap.search.filter.group property to
  335. "posixGroup".
  336. </description>
  337. </property>
  338. <property>
  339. <name>hadoop.security.group.mapping.ldap.search.filter.group</name>
  340. <value>(objectClass=group)</value>
  341. <description>
  342. An additional filter to use when searching for LDAP groups. This should be
  343. changed when resolving groups against a non-Active Directory installation.
  344. See the description of hadoop.security.group.mapping.ldap.search.filter.user
  345. to enable posixGroups support.
  346. </description>
  347. </property>
  348. <property>
  349. <name>hadoop.security.group.mapping.ldap.search.attr.memberof</name>
  350. <value></value>
  351. <description>
  352. The attribute of the user object that identifies its group objects. By
  353. default, Hadoop makes two LDAP queries per user if this value is empty. If
  354. set, Hadoop will attempt to resolve group names from this attribute,
  355. instead of making the second LDAP query to get group objects. The value
  356. should be 'memberOf' for an MS AD installation.
  357. </description>
  358. </property>
  359. <property>
  360. <name>hadoop.security.group.mapping.ldap.search.attr.member</name>
  361. <value>member</value>
  362. <description>
  363. The attribute of the group object that identifies the users that are
  364. members of the group. The default will usually be appropriate for
  365. any LDAP installation.
  366. </description>
  367. </property>
  368. <property>
  369. <name>hadoop.security.group.mapping.ldap.search.attr.group.name</name>
  370. <value>cn</value>
  371. <description>
  372. The attribute of the group object that identifies the group name. The
  373. default will usually be appropriate for all LDAP systems.
  374. </description>
  375. </property>
  376. <property>
  377. <name>hadoop.security.group.mapping.ldap.search.group.hierarchy.levels</name>
  378. <value>0</value>
  379. <description>
  380. The number of levels to go up the group hierarchy when determining
  381. which groups a user is part of. 0 Will represent checking just the
  382. group that the user belongs to. Each additional level will raise the
  383. time it takes to execute a query by at most
  384. hadoop.security.group.mapping.ldap.directory.search.timeout.
  385. The default will usually be appropriate for all LDAP systems.
  386. </description>
  387. </property>
  388. <property>
  389. <name>hadoop.security.group.mapping.ldap.posix.attr.uid.name</name>
  390. <value>uidNumber</value>
  391. <description>
  392. The attribute of posixAccount to use when groups for membership.
  393. Mostly useful for schemas wherein groups have memberUids that use an
  394. attribute other than uidNumber.
  395. </description>
  396. </property>
  397. <property>
  398. <name>hadoop.security.group.mapping.ldap.posix.attr.gid.name</name>
  399. <value>gidNumber</value>
  400. <description>
  401. The attribute of posixAccount indicating the group id.
  402. </description>
  403. </property>
  404. <property>
  405. <name>hadoop.security.group.mapping.ldap.directory.search.timeout</name>
  406. <value>10000</value>
  407. <description>
  408. The attribute applied to the LDAP SearchControl properties to set a
  409. maximum time limit when searching and awaiting a result.
  410. Set to 0 if infinite wait period is desired.
  411. Default is 10 seconds. Units in milliseconds.
  412. </description>
  413. </property>
  414. <property>
  415. <name>hadoop.security.group.mapping.providers</name>
  416. <value></value>
  417. <description>
  418. Comma separated of names of other providers to provide user to group
  419. mapping. Used by CompositeGroupsMapping.
  420. </description>
  421. </property>
  422. <property>
  423. <name>hadoop.security.group.mapping.providers.combined</name>
  424. <value>true</value>
  425. <description>
  426. true or false to indicate whether groups from the providers are combined or
  427. not. The default value is true. If true, then all the providers will be
  428. tried to get groups and all the groups are combined to return as the final
  429. results. Otherwise, providers are tried one by one in the configured list
  430. order, and if any groups are retrieved from any provider, then the groups
  431. will be returned without trying the left ones.
  432. </description>
  433. </property>
  434. <property>
  435. <name>hadoop.security.service.user.name.key</name>
  436. <value></value>
  437. <description>
  438. For those cases where the same RPC protocol is implemented by multiple
  439. servers, this configuration is required for specifying the principal
  440. name to use for the service when the client wishes to make an RPC call.
  441. </description>
  442. </property>
  443. <property>
  444. <name>fs.azure.user.agent.prefix</name>
  445. <value>unknown</value>
  446. <description>
  447. WASB passes User-Agent header to the Azure back-end. The default value
  448. contains WASB version, Java Runtime version, Azure Client library version,
  449. and the value of the configuration option fs.azure.user.agent.prefix.
  450. </description>
  451. </property>
  452. <property>
  453. <name>hadoop.security.uid.cache.secs</name>
  454. <value>14400</value>
  455. <description>
  456. This is the config controlling the validity of the entries in the cache
  457. containing the userId to userName and groupId to groupName used by
  458. NativeIO getFstat().
  459. </description>
  460. </property>
  461. <property>
  462. <name>hadoop.rpc.protection</name>
  463. <value>authentication</value>
  464. <description>A comma-separated list of protection values for secured sasl
  465. connections. Possible values are authentication, integrity and privacy.
  466. authentication means authentication only and no integrity or privacy;
  467. integrity implies authentication and integrity are enabled; and privacy
  468. implies all of authentication, integrity and privacy are enabled.
  469. hadoop.security.saslproperties.resolver.class can be used to override
  470. the hadoop.rpc.protection for a connection at the server side.
  471. </description>
  472. </property>
  473. <property>
  474. <name>hadoop.security.saslproperties.resolver.class</name>
  475. <value></value>
  476. <description>SaslPropertiesResolver used to resolve the QOP used for a
  477. connection. If not specified, the full set of values specified in
  478. hadoop.rpc.protection is used while determining the QOP used for the
  479. connection. If a class is specified, then the QOP values returned by
  480. the class will be used while determining the QOP used for the connection.
  481. </description>
  482. </property>
  483. <property>
  484. <name>hadoop.security.sensitive-config-keys</name>
  485. <value>
  486. secret$
  487. password$
  488. ssl.keystore.pass$
  489. fs.s3.*[Ss]ecret.?[Kk]ey
  490. fs.s3a.*.server-side-encryption.key
  491. fs.azure.account.key.*
  492. credential$
  493. oauth.*token$
  494. hadoop.security.sensitive-config-keys
  495. </value>
  496. <description>A comma-separated or multi-line list of regular expressions to
  497. match configuration keys that should be redacted where appropriate, for
  498. example, when logging modified properties during a reconfiguration,
  499. private credentials should not be logged.
  500. </description>
  501. </property>
  502. <property>
  503. <name>hadoop.workaround.non.threadsafe.getpwuid</name>
  504. <value>true</value>
  505. <description>Some operating systems or authentication modules are known to
  506. have broken implementations of getpwuid_r and getpwgid_r, such that these
  507. calls are not thread-safe. Symptoms of this problem include JVM crashes
  508. with a stack trace inside these functions. If your system exhibits this
  509. issue, enable this configuration parameter to include a lock around the
  510. calls as a workaround.
  511. An incomplete list of some systems known to have this issue is available
  512. at http://wiki.apache.org/hadoop/KnownBrokenPwuidImplementations
  513. </description>
  514. </property>
  515. <property>
  516. <name>hadoop.kerberos.kinit.command</name>
  517. <value>kinit</value>
  518. <description>Used to periodically renew Kerberos credentials when provided
  519. to Hadoop. The default setting assumes that kinit is in the PATH of users
  520. running the Hadoop client. Change this to the absolute path to kinit if this
  521. is not the case.
  522. </description>
  523. </property>
  524. <property>
  525. <name>hadoop.kerberos.min.seconds.before.relogin</name>
  526. <value>60</value>
  527. <description>The minimum time between relogin attempts for Kerberos, in
  528. seconds.
  529. </description>
  530. </property>
  531. <property>
  532. <name>hadoop.security.auth_to_local</name>
  533. <value></value>
  534. <description>Maps kerberos principals to local user names</description>
  535. </property>
  536. <property>
  537. <name>hadoop.token.files</name>
  538. <value></value>
  539. <description>List of token cache files that have delegation tokens for hadoop service</description>
  540. </property>
  541. <!-- i/o properties -->
  542. <property>
  543. <name>io.file.buffer.size</name>
  544. <value>4096</value>
  545. <description>The size of buffer for use in sequence files.
  546. The size of this buffer should probably be a multiple of hardware
  547. page size (4096 on Intel x86), and it determines how much data is
  548. buffered during read and write operations.</description>
  549. </property>
  550. <property>
  551. <name>io.bytes.per.checksum</name>
  552. <value>512</value>
  553. <description>The number of bytes per checksum. Must not be larger than
  554. io.file.buffer.size.</description>
  555. </property>
  556. <property>
  557. <name>io.skip.checksum.errors</name>
  558. <value>false</value>
  559. <description>If true, when a checksum error is encountered while
  560. reading a sequence file, entries are skipped, instead of throwing an
  561. exception.</description>
  562. </property>
  563. <property>
  564. <name>io.compression.codecs</name>
  565. <value></value>
  566. <description>A comma-separated list of the compression codec classes that can
  567. be used for compression/decompression. In addition to any classes specified
  568. with this property (which take precedence), codec classes on the classpath
  569. are discovered using a Java ServiceLoader.</description>
  570. </property>
  571. <property>
  572. <name>io.compression.codec.bzip2.library</name>
  573. <value>system-native</value>
  574. <description>The native-code library to be used for compression and
  575. decompression by the bzip2 codec. This library could be specified
  576. either by by name or the full pathname. In the former case, the
  577. library is located by the dynamic linker, usually searching the
  578. directories specified in the environment variable LD_LIBRARY_PATH.
  579. The value of "system-native" indicates that the default system
  580. library should be used. To indicate that the algorithm should
  581. operate entirely in Java, specify "java-builtin".</description>
  582. </property>
  583. <property>
  584. <name>io.serializations</name>
  585. <value>org.apache.hadoop.io.serializer.WritableSerialization, org.apache.hadoop.io.serializer.avro.AvroSpecificSerialization, org.apache.hadoop.io.serializer.avro.AvroReflectSerialization</value>
  586. <description>A list of serialization classes that can be used for
  587. obtaining serializers and deserializers.</description>
  588. </property>
  589. <property>
  590. <name>io.seqfile.local.dir</name>
  591. <value>${hadoop.tmp.dir}/io/local</value>
  592. <description>The local directory where sequence file stores intermediate
  593. data files during merge. May be a comma-separated list of
  594. directories on different devices in order to spread disk i/o.
  595. Directories that do not exist are ignored.
  596. </description>
  597. </property>
  598. <property>
  599. <name>io.map.index.skip</name>
  600. <value>0</value>
  601. <description>Number of index entries to skip between each entry.
  602. Zero by default. Setting this to values larger than zero can
  603. facilitate opening large MapFiles using less memory.</description>
  604. </property>
  605. <property>
  606. <name>io.map.index.interval</name>
  607. <value>128</value>
  608. <description>
  609. MapFile consist of two files - data file (tuples) and index file
  610. (keys). For every io.map.index.interval records written in the
  611. data file, an entry (record-key, data-file-position) is written
  612. in the index file. This is to allow for doing binary search later
  613. within the index file to look up records by their keys and get their
  614. closest positions in the data file.
  615. </description>
  616. </property>
  617. <property>
  618. <name>io.erasurecode.codec.rs.rawcoders</name>
  619. <value>rs_native,rs_java</value>
  620. <description>
  621. Comma separated raw coder implementations for the rs codec. The earlier
  622. factory is prior to followings in case of failure of creating raw coders.
  623. </description>
  624. </property>
  625. <property>
  626. <name>io.erasurecode.codec.rs-legacy.rawcoders</name>
  627. <value>rs-legacy_java</value>
  628. <description>
  629. Comma separated raw coder implementations for the rs-legacy codec. The earlier
  630. factory is prior to followings in case of failure of creating raw coders.
  631. </description>
  632. </property>
  633. <property>
  634. <name>io.erasurecode.codec.xor.rawcoders</name>
  635. <value>xor_native,xor_java</value>
  636. <description>
  637. Comma separated raw coder implementations for the xor codec. The earlier
  638. factory is prior to followings in case of failure of creating raw coders.
  639. </description>
  640. </property>
  641. <!-- file system properties -->
  642. <property>
  643. <name>fs.defaultFS</name>
  644. <value>file:///</value>
  645. <description>The name of the default file system. A URI whose
  646. scheme and authority determine the FileSystem implementation. The
  647. uri's scheme determines the config property (fs.SCHEME.impl) naming
  648. the FileSystem implementation class. The uri's authority is used to
  649. determine the host, port, etc. for a filesystem.</description>
  650. </property>
  651. <property>
  652. <name>fs.default.name</name>
  653. <value>file:///</value>
  654. <description>Deprecated. Use (fs.defaultFS) property
  655. instead</description>
  656. </property>
  657. <property>
  658. <name>fs.trash.interval</name>
  659. <value>0</value>
  660. <description>Number of minutes after which the checkpoint
  661. gets deleted. If zero, the trash feature is disabled.
  662. This option may be configured both on the server and the
  663. client. If trash is disabled server side then the client
  664. side configuration is checked. If trash is enabled on the
  665. server side then the value configured on the server is
  666. used and the client configuration value is ignored.
  667. </description>
  668. </property>
  669. <property>
  670. <name>fs.trash.checkpoint.interval</name>
  671. <value>0</value>
  672. <description>Number of minutes between trash checkpoints.
  673. Should be smaller or equal to fs.trash.interval. If zero,
  674. the value is set to the value of fs.trash.interval.
  675. Every time the checkpointer runs it creates a new checkpoint
  676. out of current and removes checkpoints created more than
  677. fs.trash.interval minutes ago.
  678. </description>
  679. </property>
  680. <property>
  681. <name>fs.protected.directories</name>
  682. <value></value>
  683. <description>A comma-separated list of directories which cannot
  684. be deleted even by the superuser unless they are empty. This
  685. setting can be used to guard important system directories
  686. against accidental deletion due to administrator error.
  687. </description>
  688. </property>
  689. <property>
  690. <name>fs.AbstractFileSystem.file.impl</name>
  691. <value>org.apache.hadoop.fs.local.LocalFs</value>
  692. <description>The AbstractFileSystem for file: uris.</description>
  693. </property>
  694. <property>
  695. <name>fs.AbstractFileSystem.har.impl</name>
  696. <value>org.apache.hadoop.fs.HarFs</value>
  697. <description>The AbstractFileSystem for har: uris.</description>
  698. </property>
  699. <property>
  700. <name>fs.AbstractFileSystem.hdfs.impl</name>
  701. <value>org.apache.hadoop.fs.Hdfs</value>
  702. <description>The FileSystem for hdfs: uris.</description>
  703. </property>
  704. <property>
  705. <name>fs.AbstractFileSystem.viewfs.impl</name>
  706. <value>org.apache.hadoop.fs.viewfs.ViewFs</value>
  707. <description>The AbstractFileSystem for view file system for viewfs: uris
  708. (ie client side mount table:).</description>
  709. </property>
  710. <property>
  711. <name>fs.viewfs.rename.strategy</name>
  712. <value>SAME_MOUNTPOINT</value>
  713. <description>Allowed rename strategy to rename between multiple mountpoints.
  714. Allowed values are SAME_MOUNTPOINT,SAME_TARGET_URI_ACROSS_MOUNTPOINT and
  715. SAME_FILESYSTEM_ACROSS_MOUNTPOINT.
  716. </description>
  717. </property>
  718. <property>
  719. <name>fs.AbstractFileSystem.ftp.impl</name>
  720. <value>org.apache.hadoop.fs.ftp.FtpFs</value>
  721. <description>The FileSystem for Ftp: uris.</description>
  722. </property>
  723. <property>
  724. <name>fs.AbstractFileSystem.webhdfs.impl</name>
  725. <value>org.apache.hadoop.fs.WebHdfs</value>
  726. <description>The FileSystem for webhdfs: uris.</description>
  727. </property>
  728. <property>
  729. <name>fs.AbstractFileSystem.swebhdfs.impl</name>
  730. <value>org.apache.hadoop.fs.SWebHdfs</value>
  731. <description>The FileSystem for swebhdfs: uris.</description>
  732. </property>
  733. <property>
  734. <name>fs.ftp.host</name>
  735. <value>0.0.0.0</value>
  736. <description>FTP filesystem connects to this server</description>
  737. </property>
  738. <property>
  739. <name>fs.ftp.host.port</name>
  740. <value>21</value>
  741. <description>
  742. FTP filesystem connects to fs.ftp.host on this port
  743. </description>
  744. </property>
  745. <property>
  746. <name>fs.ftp.data.connection.mode</name>
  747. <value>ACTIVE_LOCAL_DATA_CONNECTION_MODE</value>
  748. <description>Set the FTPClient's data connection mode based on configuration.
  749. Valid values are ACTIVE_LOCAL_DATA_CONNECTION_MODE,
  750. PASSIVE_LOCAL_DATA_CONNECTION_MODE and PASSIVE_REMOTE_DATA_CONNECTION_MODE.
  751. </description>
  752. </property>
  753. <property>
  754. <name>fs.ftp.transfer.mode</name>
  755. <value>BLOCK_TRANSFER_MODE</value>
  756. <description>
  757. Set FTP's transfer mode based on configuration. Valid values are
  758. STREAM_TRANSFER_MODE, BLOCK_TRANSFER_MODE and COMPRESSED_TRANSFER_MODE.
  759. </description>
  760. </property>
  761. <property>
  762. <name>fs.df.interval</name>
  763. <value>60000</value>
  764. <description>Disk usage statistics refresh interval in msec.</description>
  765. </property>
  766. <property>
  767. <name>fs.du.interval</name>
  768. <value>600000</value>
  769. <description>File space usage statistics refresh interval in msec.</description>
  770. </property>
  771. <property>
  772. <name>fs.swift.impl</name>
  773. <value>org.apache.hadoop.fs.swift.snative.SwiftNativeFileSystem</value>
  774. <description>The implementation class of the OpenStack Swift Filesystem</description>
  775. </property>
  776. <property>
  777. <name>fs.automatic.close</name>
  778. <value>true</value>
  779. <description>By default, FileSystem instances are automatically closed at program
  780. exit using a JVM shutdown hook. Setting this property to false disables this
  781. behavior. This is an advanced option that should only be used by server applications
  782. requiring a more carefully orchestrated shutdown sequence.
  783. </description>
  784. </property>
  785. <property>
  786. <name>fs.s3a.access.key</name>
  787. <description>AWS access key ID used by S3A file system. Omit for IAM role-based or provider-based authentication.</description>
  788. </property>
  789. <property>
  790. <name>fs.s3a.secret.key</name>
  791. <description>AWS secret key used by S3A file system. Omit for IAM role-based or provider-based authentication.</description>
  792. </property>
  793. <property>
  794. <name>fs.s3a.aws.credentials.provider</name>
  795. <description>
  796. Comma-separated class names of credential provider classes which implement
  797. com.amazonaws.auth.AWSCredentialsProvider.
  798. These are loaded and queried in sequence for a valid set of credentials.
  799. Each listed class must implement one of the following means of
  800. construction, which are attempted in order:
  801. 1. a public constructor accepting java.net.URI and
  802. org.apache.hadoop.conf.Configuration,
  803. 2. a public static method named getInstance that accepts no
  804. arguments and returns an instance of
  805. com.amazonaws.auth.AWSCredentialsProvider, or
  806. 3. a public default constructor.
  807. Specifying org.apache.hadoop.fs.s3a.AnonymousAWSCredentialsProvider allows
  808. anonymous access to a publicly accessible S3 bucket without any credentials.
  809. Please note that allowing anonymous access to an S3 bucket compromises
  810. security and therefore is unsuitable for most use cases. It can be useful
  811. for accessing public data sets without requiring AWS credentials.
  812. If unspecified, then the default list of credential provider classes,
  813. queried in sequence, is:
  814. 1. org.apache.hadoop.fs.s3a.BasicAWSCredentialsProvider: supports static
  815. configuration of AWS access key ID and secret access key. See also
  816. fs.s3a.access.key and fs.s3a.secret.key.
  817. 2. com.amazonaws.auth.EnvironmentVariableCredentialsProvider: supports
  818. configuration of AWS access key ID and secret access key in
  819. environment variables named AWS_ACCESS_KEY_ID and
  820. AWS_SECRET_ACCESS_KEY, as documented in the AWS SDK.
  821. 3. com.amazonaws.auth.InstanceProfileCredentialsProvider: supports use
  822. of instance profile credentials if running in an EC2 VM.
  823. </description>
  824. </property>
  825. <property>
  826. <name>fs.s3a.session.token</name>
  827. <description>Session token, when using org.apache.hadoop.fs.s3a.TemporaryAWSCredentialsProvider
  828. as one of the providers.
  829. </description>
  830. </property>
  831. <property>
  832. <name>fs.s3a.security.credential.provider.path</name>
  833. <value />
  834. <description>
  835. Optional comma separated list of credential providers, a list
  836. which is prepended to that set in hadoop.security.credential.provider.path
  837. </description>
  838. </property>
  839. <property>
  840. <name>fs.s3a.connection.maximum</name>
  841. <value>15</value>
  842. <description>Controls the maximum number of simultaneous connections to S3.</description>
  843. </property>
  844. <property>
  845. <name>fs.s3a.connection.ssl.enabled</name>
  846. <value>true</value>
  847. <description>Enables or disables SSL connections to S3.</description>
  848. </property>
  849. <property>
  850. <name>fs.s3a.endpoint</name>
  851. <description>AWS S3 endpoint to connect to. An up-to-date list is
  852. provided in the AWS Documentation: regions and endpoints. Without this
  853. property, the standard region (s3.amazonaws.com) is assumed.
  854. </description>
  855. </property>
  856. <property>
  857. <name>fs.s3a.path.style.access</name>
  858. <value>false</value>
  859. <description>Enable S3 path style access ie disabling the default virtual hosting behaviour.
  860. Useful for S3A-compliant storage providers as it removes the need to set up DNS for virtual hosting.
  861. </description>
  862. </property>
  863. <property>
  864. <name>fs.s3a.proxy.host</name>
  865. <description>Hostname of the (optional) proxy server for S3 connections.</description>
  866. </property>
  867. <property>
  868. <name>fs.s3a.proxy.port</name>
  869. <description>Proxy server port. If this property is not set
  870. but fs.s3a.proxy.host is, port 80 or 443 is assumed (consistent with
  871. the value of fs.s3a.connection.ssl.enabled).</description>
  872. </property>
  873. <property>
  874. <name>fs.s3a.proxy.username</name>
  875. <description>Username for authenticating with proxy server.</description>
  876. </property>
  877. <property>
  878. <name>fs.s3a.proxy.password</name>
  879. <description>Password for authenticating with proxy server.</description>
  880. </property>
  881. <property>
  882. <name>fs.s3a.proxy.domain</name>
  883. <description>Domain for authenticating with proxy server.</description>
  884. </property>
  885. <property>
  886. <name>fs.s3a.proxy.workstation</name>
  887. <description>Workstation for authenticating with proxy server.</description>
  888. </property>
  889. <property>
  890. <name>fs.s3a.attempts.maximum</name>
  891. <value>20</value>
  892. <description>How many times we should retry commands on transient errors.</description>
  893. </property>
  894. <property>
  895. <name>fs.s3a.connection.establish.timeout</name>
  896. <value>5000</value>
  897. <description>Socket connection setup timeout in milliseconds.</description>
  898. </property>
  899. <property>
  900. <name>fs.s3a.connection.timeout</name>
  901. <value>200000</value>
  902. <description>Socket connection timeout in milliseconds.</description>
  903. </property>
  904. <property>
  905. <name>fs.s3a.socket.send.buffer</name>
  906. <value>8192</value>
  907. <description>Socket send buffer hint to amazon connector. Represented in bytes.</description>
  908. </property>
  909. <property>
  910. <name>fs.s3a.socket.recv.buffer</name>
  911. <value>8192</value>
  912. <description>Socket receive buffer hint to amazon connector. Represented in bytes.</description>
  913. </property>
  914. <property>
  915. <name>fs.s3a.paging.maximum</name>
  916. <value>5000</value>
  917. <description>How many keys to request from S3 when doing
  918. directory listings at a time.</description>
  919. </property>
  920. <property>
  921. <name>fs.s3a.threads.max</name>
  922. <value>10</value>
  923. <description>The total number of threads available in the filesystem for data
  924. uploads *or any other queued filesystem operation*.</description>
  925. </property>
  926. <property>
  927. <name>fs.s3a.threads.keepalivetime</name>
  928. <value>60</value>
  929. <description>Number of seconds a thread can be idle before being
  930. terminated.</description>
  931. </property>
  932. <property>
  933. <name>fs.s3a.max.total.tasks</name>
  934. <value>5</value>
  935. <description>The number of operations which can be queued for execution</description>
  936. </property>
  937. <property>
  938. <name>fs.s3a.multipart.size</name>
  939. <value>100M</value>
  940. <description>How big (in bytes) to split upload or copy operations up into.
  941. A suffix from the set {K,M,G,T,P} may be used to scale the numeric value.
  942. </description>
  943. </property>
  944. <property>
  945. <name>fs.s3a.multipart.threshold</name>
  946. <value>2147483647</value>
  947. <description>How big (in bytes) to split upload or copy operations up into.
  948. This also controls the partition size in renamed files, as rename() involves
  949. copying the source file(s).
  950. A suffix from the set {K,M,G,T,P} may be used to scale the numeric value.
  951. </description>
  952. </property>
  953. <property>
  954. <name>fs.s3a.multiobjectdelete.enable</name>
  955. <value>true</value>
  956. <description>When enabled, multiple single-object delete requests are replaced by
  957. a single 'delete multiple objects'-request, reducing the number of requests.
  958. Beware: legacy S3-compatible object stores might not support this request.
  959. </description>
  960. </property>
  961. <property>
  962. <name>fs.s3a.acl.default</name>
  963. <description>Set a canned ACL for newly created and copied objects. Value may be Private,
  964. PublicRead, PublicReadWrite, AuthenticatedRead, LogDeliveryWrite, BucketOwnerRead,
  965. or BucketOwnerFullControl.</description>
  966. </property>
  967. <property>
  968. <name>fs.s3a.multipart.purge</name>
  969. <value>false</value>
  970. <description>True if you want to purge existing multipart uploads that may not have been
  971. completed/aborted correctly. The corresponding purge age is defined in
  972. fs.s3a.multipart.purge.age.
  973. If set, when the filesystem is instantiated then all outstanding uploads
  974. older than the purge age will be terminated -across the entire bucket.
  975. This will impact multipart uploads by other applications and users. so should
  976. be used sparingly, with an age value chosen to stop failed uploads, without
  977. breaking ongoing operations.
  978. </description>
  979. </property>
  980. <property>
  981. <name>fs.s3a.multipart.purge.age</name>
  982. <value>86400</value>
  983. <description>Minimum age in seconds of multipart uploads to purge.
  984. </description>
  985. </property>
  986. <property>
  987. <name>fs.s3a.server-side-encryption-algorithm</name>
  988. <description>Specify a server-side encryption algorithm for s3a: file system.
  989. Unset by default. It supports the following values: 'AES256' (for SSE-S3),
  990. 'SSE-KMS' and 'SSE-C'.
  991. </description>
  992. </property>
  993. <property>
  994. <name>fs.s3a.server-side-encryption.key</name>
  995. <description>Specific encryption key to use if fs.s3a.server-side-encryption-algorithm
  996. has been set to 'SSE-KMS' or 'SSE-C'. In the case of SSE-C, the value of this property
  997. should be the Base64 encoded key. If you are using SSE-KMS and leave this property empty,
  998. you'll be using your default's S3 KMS key, otherwise you should set this property to
  999. the specific KMS key id.
  1000. </description>
  1001. </property>
  1002. <property>
  1003. <name>fs.s3a.signing-algorithm</name>
  1004. <description>Override the default signing algorithm so legacy
  1005. implementations can still be used</description>
  1006. </property>
  1007. <property>
  1008. <name>fs.s3a.block.size</name>
  1009. <value>32M</value>
  1010. <description>Block size to use when reading files using s3a: file system.
  1011. A suffix from the set {K,M,G,T,P} may be used to scale the numeric value.
  1012. </description>
  1013. </property>
  1014. <property>
  1015. <name>fs.s3a.buffer.dir</name>
  1016. <value>${hadoop.tmp.dir}/s3a</value>
  1017. <description>Comma separated list of directories that will be used to buffer file
  1018. uploads to.</description>
  1019. </property>
  1020. <property>
  1021. <name>fs.s3a.fast.upload.buffer</name>
  1022. <value>disk</value>
  1023. <description>
  1024. The buffering mechanism to for data being written.
  1025. Values: disk, array, bytebuffer.
  1026. "disk" will use the directories listed in fs.s3a.buffer.dir as
  1027. the location(s) to save data prior to being uploaded.
  1028. "array" uses arrays in the JVM heap
  1029. "bytebuffer" uses off-heap memory within the JVM.
  1030. Both "array" and "bytebuffer" will consume memory in a single stream up to the number
  1031. of blocks set by:
  1032. fs.s3a.multipart.size * fs.s3a.fast.upload.active.blocks.
  1033. If using either of these mechanisms, keep this value low
  1034. The total number of threads performing work across all threads is set by
  1035. fs.s3a.threads.max, with fs.s3a.max.total.tasks values setting the number of queued
  1036. work items.
  1037. </description>
  1038. </property>
  1039. <property>
  1040. <name>fs.s3a.fast.upload.active.blocks</name>
  1041. <value>4</value>
  1042. <description>
  1043. Maximum Number of blocks a single output stream can have
  1044. active (uploading, or queued to the central FileSystem
  1045. instance's pool of queued operations.
  1046. This stops a single stream overloading the shared thread pool.
  1047. </description>
  1048. </property>
  1049. <property>
  1050. <name>fs.s3a.readahead.range</name>
  1051. <value>64K</value>
  1052. <description>Bytes to read ahead during a seek() before closing and
  1053. re-opening the S3 HTTP connection. This option will be overridden if
  1054. any call to setReadahead() is made to an open stream.
  1055. A suffix from the set {K,M,G,T,P} may be used to scale the numeric value.
  1056. </description>
  1057. </property>
  1058. <property>
  1059. <name>fs.s3a.user.agent.prefix</name>
  1060. <value></value>
  1061. <description>
  1062. Sets a custom value that will be prepended to the User-Agent header sent in
  1063. HTTP requests to the S3 back-end by S3AFileSystem. The User-Agent header
  1064. always includes the Hadoop version number followed by a string generated by
  1065. the AWS SDK. An example is "User-Agent: Hadoop 2.8.0, aws-sdk-java/1.10.6".
  1066. If this optional property is set, then its value is prepended to create a
  1067. customized User-Agent. For example, if this configuration property was set
  1068. to "MyApp", then an example of the resulting User-Agent would be
  1069. "User-Agent: MyApp, Hadoop 2.8.0, aws-sdk-java/1.10.6".
  1070. </description>
  1071. </property>
  1072. <property>
  1073. <name>fs.s3a.metadatastore.authoritative</name>
  1074. <value>false</value>
  1075. <description>
  1076. When true, allow MetadataStore implementations to act as source of
  1077. truth for getting file status and directory listings. Even if this
  1078. is set to true, MetadataStore implementations may choose not to
  1079. return authoritative results. If the configured MetadataStore does
  1080. not support being authoritative, this setting will have no effect.
  1081. </description>
  1082. </property>
  1083. <property>
  1084. <name>fs.s3a.metadatastore.impl</name>
  1085. <value>org.apache.hadoop.fs.s3a.s3guard.NullMetadataStore</value>
  1086. <description>
  1087. Fully-qualified name of the class that implements the MetadataStore
  1088. to be used by s3a. The default class, NullMetadataStore, has no
  1089. effect: s3a will continue to treat the backing S3 service as the one
  1090. and only source of truth for file and directory metadata.
  1091. </description>
  1092. </property>
  1093. <property>
  1094. <name>fs.s3a.s3guard.cli.prune.age</name>
  1095. <value>86400000</value>
  1096. <description>
  1097. Default age (in milliseconds) after which to prune metadata from the
  1098. metadatastore when the prune command is run. Can be overridden on the
  1099. command-line.
  1100. </description>
  1101. </property>
  1102. <property>
  1103. <name>fs.s3a.impl</name>
  1104. <value>org.apache.hadoop.fs.s3a.S3AFileSystem</value>
  1105. <description>The implementation class of the S3A Filesystem</description>
  1106. </property>
  1107. <property>
  1108. <name>fs.s3a.s3guard.ddb.region</name>
  1109. <value></value>
  1110. <description>
  1111. AWS DynamoDB region to connect to. An up-to-date list is
  1112. provided in the AWS Documentation: regions and endpoints. Without this
  1113. property, the S3Guard will operate table in the associated S3 bucket region.
  1114. </description>
  1115. </property>
  1116. <property>
  1117. <name>fs.s3a.s3guard.ddb.table</name>
  1118. <value></value>
  1119. <description>
  1120. The DynamoDB table name to operate. Without this property, the respective
  1121. S3 bucket name will be used.
  1122. </description>
  1123. </property>
  1124. <property>
  1125. <name>fs.s3a.s3guard.ddb.table.create</name>
  1126. <value>false</value>
  1127. <description>
  1128. If true, the S3A client will create the table if it does not already exist.
  1129. </description>
  1130. </property>
  1131. <property>
  1132. <name>fs.s3a.s3guard.ddb.table.capacity.read</name>
  1133. <value>500</value>
  1134. <description>
  1135. Provisioned throughput requirements for read operations in terms of capacity
  1136. units for the DynamoDB table. This config value will only be used when
  1137. creating a new DynamoDB table, though later you can manually provision by
  1138. increasing or decreasing read capacity as needed for existing tables.
  1139. See DynamoDB documents for more information.
  1140. </description>
  1141. </property>
  1142. <property>
  1143. <name>fs.s3a.s3guard.ddb.table.capacity.write</name>
  1144. <value>100</value>
  1145. <description>
  1146. Provisioned throughput requirements for write operations in terms of
  1147. capacity units for the DynamoDB table. Refer to related config
  1148. fs.s3a.s3guard.ddb.table.capacity.read before usage.
  1149. </description>
  1150. </property>
  1151. <property>
  1152. <name>fs.s3a.s3guard.ddb.max.retries</name>
  1153. <value>9</value>
  1154. <description>
  1155. Max retries on batched DynamoDB operations before giving up and
  1156. throwing an IOException. Each retry is delayed with an exponential
  1157. backoff timer which starts at 100 milliseconds and approximately
  1158. doubles each time. The minimum wait before throwing an exception is
  1159. sum(100, 200, 400, 800, .. 100*2^N-1 ) == 100 * ((2^N)-1)
  1160. So N = 9 yields at least 51.1 seconds (51,100) milliseconds of blocking
  1161. before throwing an IOException.
  1162. </description>
  1163. </property>
  1164. <property>
  1165. <name>fs.s3a.s3guard.ddb.background.sleep</name>
  1166. <value>25</value>
  1167. <description>
  1168. Length (in milliseconds) of pause between each batch of deletes when
  1169. pruning metadata. Prevents prune operations (which can typically be low
  1170. priority background operations) from overly interfering with other I/O
  1171. operations.
  1172. </description>
  1173. </property>
  1174. <property>
  1175. <name>fs.AbstractFileSystem.s3a.impl</name>
  1176. <value>org.apache.hadoop.fs.s3a.S3A</value>
  1177. <description>The implementation class of the S3A AbstractFileSystem.</description>
  1178. </property>
  1179. <property>
  1180. <name>fs.s3a.list.version</name>
  1181. <value>2</value>
  1182. <description>
  1183. Select which version of the S3 SDK's List Objects API to use. Currently
  1184. support 2 (default) and 1 (older API).
  1185. </description>
  1186. </property>
  1187. <!-- Azure file system properties -->
  1188. <property>
  1189. <name>fs.wasb.impl</name>
  1190. <value>org.apache.hadoop.fs.azure.NativeAzureFileSystem</value>
  1191. <description>The implementation class of the Native Azure Filesystem</description>
  1192. </property>
  1193. <property>
  1194. <name>fs.wasbs.impl</name>
  1195. <value>org.apache.hadoop.fs.azure.NativeAzureFileSystem$Secure</value>
  1196. <description>The implementation class of the Secure Native Azure Filesystem</description>
  1197. </property>
  1198. <property>
  1199. <name>fs.azure.secure.mode</name>
  1200. <value>false</value>
  1201. <description>
  1202. Config flag to identify the mode in which fs.azure.NativeAzureFileSystem needs
  1203. to run under. Setting it "true" would make fs.azure.NativeAzureFileSystem use
  1204. SAS keys to communicate with Azure storage.
  1205. </description>
  1206. </property>
  1207. <property>
  1208. <name>fs.azure.local.sas.key.mode</name>
  1209. <value>false</value>
  1210. <description>
  1211. Works in conjuction with fs.azure.secure.mode. Setting this config to true
  1212. results in fs.azure.NativeAzureFileSystem using the local SAS key generation
  1213. where the SAS keys are generating in the same process as fs.azure.NativeAzureFileSystem.
  1214. If fs.azure.secure.mode flag is set to false, this flag has no effect.
  1215. </description>
  1216. </property>
  1217. <property>
  1218. <name>fs.azure.sas.expiry.period</name>
  1219. <value>90d</value>
  1220. <description>
  1221. The default value to be used for expiration period for SAS keys generated.
  1222. Can use the following suffix (case insensitive):
  1223. ms(millis), s(sec), m(min), h(hour), d(day)
  1224. to specify the time (such as 2s, 2m, 1h, etc.).
  1225. </description>
  1226. </property>
  1227. <property>
  1228. <name>fs.azure.authorization</name>
  1229. <value>false</value>
  1230. <description>
  1231. Config flag to enable authorization support in WASB. Setting it to "true" enables
  1232. authorization support to WASB. Currently WASB authorization requires a remote service
  1233. to provide authorization that needs to be specified via fs.azure.authorization.remote.service.url
  1234. configuration
  1235. </description>
  1236. </property>
  1237. <property>
  1238. <name>fs.azure.authorization.caching.enable</name>
  1239. <value>true</value>
  1240. <description>
  1241. Config flag to enable caching of authorization results and saskeys in WASB.
  1242. This flag is relevant only when fs.azure.authorization is enabled.
  1243. </description>
  1244. </property>
  1245. <property>
  1246. <name>fs.azure.saskey.usecontainersaskeyforallaccess</name>
  1247. <value>true</value>
  1248. <description>
  1249. Use container saskey for access to all blobs within the container.
  1250. Blob-specific saskeys are not used when this setting is enabled.
  1251. This setting provides better performance compared to blob-specific saskeys.
  1252. </description>
  1253. </property>
  1254. <property>
  1255. <name>io.seqfile.compress.blocksize</name>
  1256. <value>1000000</value>
  1257. <description>The minimum block size for compression in block compressed
  1258. SequenceFiles.
  1259. </description>
  1260. </property>
  1261. <property>
  1262. <name>io.mapfile.bloom.size</name>
  1263. <value>1048576</value>
  1264. <description>The size of BloomFilter-s used in BloomMapFile. Each time this many
  1265. keys is appended the next BloomFilter will be created (inside a DynamicBloomFilter).
  1266. Larger values minimize the number of filters, which slightly increases the performance,
  1267. but may waste too much space if the total number of keys is usually much smaller
  1268. than this number.
  1269. </description>
  1270. </property>
  1271. <property>
  1272. <name>io.mapfile.bloom.error.rate</name>
  1273. <value>0.005</value>
  1274. <description>The rate of false positives in BloomFilter-s used in BloomMapFile.
  1275. As this value decreases, the size of BloomFilter-s increases exponentially. This
  1276. value is the probability of encountering false positives (default is 0.5%).
  1277. </description>
  1278. </property>
  1279. <property>
  1280. <name>hadoop.util.hash.type</name>
  1281. <value>murmur</value>
  1282. <description>The default implementation of Hash. Currently this can take one of the
  1283. two values: 'murmur' to select MurmurHash and 'jenkins' to select JenkinsHash.
  1284. </description>
  1285. </property>
  1286. <!-- ipc properties -->
  1287. <property>
  1288. <name>ipc.client.idlethreshold</name>
  1289. <value>4000</value>
  1290. <description>Defines the threshold number of connections after which
  1291. connections will be inspected for idleness.
  1292. </description>
  1293. </property>
  1294. <property>
  1295. <name>ipc.client.kill.max</name>
  1296. <value>10</value>
  1297. <description>Defines the maximum number of clients to disconnect in one go.
  1298. </description>
  1299. </property>
  1300. <property>
  1301. <name>ipc.client.connection.maxidletime</name>
  1302. <value>10000</value>
  1303. <description>The maximum time in msec after which a client will bring down the
  1304. connection to the server.
  1305. </description>
  1306. </property>
  1307. <property>
  1308. <name>ipc.client.connect.max.retries</name>
  1309. <value>10</value>
  1310. <description>Indicates the number of retries a client will make to establish
  1311. a server connection.
  1312. </description>
  1313. </property>
  1314. <property>
  1315. <name>ipc.client.connect.retry.interval</name>
  1316. <value>1000</value>
  1317. <description>Indicates the number of milliseconds a client will wait for
  1318. before retrying to establish a server connection.
  1319. </description>
  1320. </property>
  1321. <property>
  1322. <name>ipc.client.connect.timeout</name>
  1323. <value>20000</value>
  1324. <description>Indicates the number of milliseconds a client will wait for the
  1325. socket to establish a server connection.
  1326. </description>
  1327. </property>
  1328. <property>
  1329. <name>ipc.client.connect.max.retries.on.timeouts</name>
  1330. <value>45</value>
  1331. <description>Indicates the number of retries a client will make on socket timeout
  1332. to establish a server connection.
  1333. </description>
  1334. </property>
  1335. <property>
  1336. <name>ipc.client.tcpnodelay</name>
  1337. <value>true</value>
  1338. <description>Use TCP_NODELAY flag to bypass Nagle's algorithm transmission delays.
  1339. </description>
  1340. </property>
  1341. <property>
  1342. <name>ipc.client.low-latency</name>
  1343. <value>false</value>
  1344. <description>Use low-latency QoS markers for IPC connections.
  1345. </description>
  1346. </property>
  1347. <property>
  1348. <name>ipc.client.ping</name>
  1349. <value>true</value>
  1350. <description>Send a ping to the server when timeout on reading the response,
  1351. if set to true. If no failure is detected, the client retries until at least
  1352. a byte is read or the time given by ipc.client.rpc-timeout.ms is passed.
  1353. </description>
  1354. </property>
  1355. <property>
  1356. <name>ipc.ping.interval</name>
  1357. <value>60000</value>
  1358. <description>Timeout on waiting response from server, in milliseconds.
  1359. The client will send ping when the interval is passed without receiving bytes,
  1360. if ipc.client.ping is set to true.
  1361. </description>
  1362. </property>
  1363. <property>
  1364. <name>ipc.client.rpc-timeout.ms</name>
  1365. <value>0</value>
  1366. <description>Timeout on waiting response from server, in milliseconds.
  1367. If ipc.client.ping is set to true and this rpc-timeout is greater than
  1368. the value of ipc.ping.interval, the effective value of the rpc-timeout is
  1369. rounded up to multiple of ipc.ping.interval.
  1370. </description>
  1371. </property>
  1372. <property>
  1373. <name>ipc.server.listen.queue.size</name>
  1374. <value>128</value>
  1375. <description>Indicates the length of the listen queue for servers accepting
  1376. client connections.
  1377. </description>
  1378. </property>
  1379. <property>
  1380. <name>ipc.server.log.slow.rpc</name>
  1381. <value>false</value>
  1382. <description>This setting is useful to troubleshoot performance issues for
  1383. various services. If this value is set to true then we log requests that
  1384. fall into 99th percentile as well as increment RpcSlowCalls counter.
  1385. </description>
  1386. </property>
  1387. <property>
  1388. <name>ipc.maximum.data.length</name>
  1389. <value>67108864</value>
  1390. <description>This indicates the maximum IPC message length (bytes) that can be
  1391. accepted by the server. Messages larger than this value are rejected by the
  1392. immediately to avoid possible OOMs. This setting should rarely need to be
  1393. changed.
  1394. </description>
  1395. </property>
  1396. <property>
  1397. <name>ipc.maximum.response.length</name>
  1398. <value>134217728</value>
  1399. <description>This indicates the maximum IPC message length (bytes) that can be
  1400. accepted by the client. Messages larger than this value are rejected
  1401. immediately to avoid possible OOMs. This setting should rarely need to be
  1402. changed. Set to 0 to disable.
  1403. </description>
  1404. </property>
  1405. <!-- Proxy Configuration -->
  1406. <property>
  1407. <name>hadoop.security.impersonation.provider.class</name>
  1408. <value></value>
  1409. <description>A class which implements ImpersonationProvider interface, used to
  1410. authorize whether one user can impersonate a specific user.
  1411. If not specified, the DefaultImpersonationProvider will be used.
  1412. If a class is specified, then that class will be used to determine
  1413. the impersonation capability.
  1414. </description>
  1415. </property>
  1416. <property>
  1417. <name>hadoop.rpc.socket.factory.class.default</name>
  1418. <value>org.apache.hadoop.net.StandardSocketFactory</value>
  1419. <description> Default SocketFactory to use. This parameter is expected to be
  1420. formatted as "package.FactoryClassName".
  1421. </description>
  1422. </property>
  1423. <property>
  1424. <name>hadoop.rpc.socket.factory.class.ClientProtocol</name>
  1425. <value></value>
  1426. <description> SocketFactory to use to connect to a DFS. If null or empty, use
  1427. hadoop.rpc.socket.class.default. This socket factory is also used by
  1428. DFSClient to create sockets to DataNodes.
  1429. </description>
  1430. </property>
  1431. <property>
  1432. <name>hadoop.socks.server</name>
  1433. <value></value>
  1434. <description> Address (host:port) of the SOCKS server to be used by the
  1435. SocksSocketFactory.
  1436. </description>
  1437. </property>
  1438. <!-- Topology Configuration -->
  1439. <property>
  1440. <name>net.topology.node.switch.mapping.impl</name>
  1441. <value>org.apache.hadoop.net.ScriptBasedMapping</value>
  1442. <description> The default implementation of the DNSToSwitchMapping. It
  1443. invokes a script specified in net.topology.script.file.name to resolve
  1444. node names. If the value for net.topology.script.file.name is not set, the
  1445. default value of DEFAULT_RACK is returned for all node names.
  1446. </description>
  1447. </property>
  1448. <property>
  1449. <name>net.topology.impl</name>
  1450. <value>org.apache.hadoop.net.NetworkTopology</value>
  1451. <description> The default implementation of NetworkTopology which is classic three layer one.
  1452. </description>
  1453. </property>
  1454. <property>
  1455. <name>net.topology.script.file.name</name>
  1456. <value></value>
  1457. <description> The script name that should be invoked to resolve DNS names to
  1458. NetworkTopology names. Example: the script would take host.foo.bar as an
  1459. argument, and return /rack1 as the output.
  1460. </description>
  1461. </property>
  1462. <property>
  1463. <name>net.topology.script.number.args</name>
  1464. <value>100</value>
  1465. <description> The max number of args that the script configured with
  1466. net.topology.script.file.name should be run with. Each arg is an
  1467. IP address.
  1468. </description>
  1469. </property>
  1470. <property>
  1471. <name>net.topology.table.file.name</name>
  1472. <value></value>
  1473. <description> The file name for a topology file, which is used when the
  1474. net.topology.node.switch.mapping.impl property is set to
  1475. org.apache.hadoop.net.TableMapping. The file format is a two column text
  1476. file, with columns separated by whitespace. The first column is a DNS or
  1477. IP address and the second column specifies the rack where the address maps.
  1478. If no entry corresponding to a host in the cluster is found, then
  1479. /default-rack is assumed.
  1480. </description>
  1481. </property>
  1482. <!-- Local file system -->
  1483. <property>
  1484. <name>file.stream-buffer-size</name>
  1485. <value>4096</value>
  1486. <description>The size of buffer to stream files.
  1487. The size of this buffer should probably be a multiple of hardware
  1488. page size (4096 on Intel x86), and it determines how much data is
  1489. buffered during read and write operations.</description>
  1490. </property>
  1491. <property>
  1492. <name>file.bytes-per-checksum</name>
  1493. <value>512</value>
  1494. <description>The number of bytes per checksum. Must not be larger than
  1495. file.stream-buffer-size</description>
  1496. </property>
  1497. <property>
  1498. <name>file.client-write-packet-size</name>
  1499. <value>65536</value>
  1500. <description>Packet size for clients to write</description>
  1501. </property>
  1502. <property>
  1503. <name>file.blocksize</name>
  1504. <value>67108864</value>
  1505. <description>Block size</description>
  1506. </property>
  1507. <property>
  1508. <name>file.replication</name>
  1509. <value>1</value>
  1510. <description>Replication factor</description>
  1511. </property>
  1512. <!-- FTP file system -->
  1513. <property>
  1514. <name>ftp.stream-buffer-size</name>
  1515. <value>4096</value>
  1516. <description>The size of buffer to stream files.
  1517. The size of this buffer should probably be a multiple of hardware
  1518. page size (4096 on Intel x86), and it determines how much data is
  1519. buffered during read and write operations.</description>
  1520. </property>
  1521. <property>
  1522. <name>ftp.bytes-per-checksum</name>
  1523. <value>512</value>
  1524. <description>The number of bytes per checksum. Must not be larger than
  1525. ftp.stream-buffer-size</description>
  1526. </property>
  1527. <property>
  1528. <name>ftp.client-write-packet-size</name>
  1529. <value>65536</value>
  1530. <description>Packet size for clients to write</description>
  1531. </property>
  1532. <property>
  1533. <name>ftp.blocksize</name>
  1534. <value>67108864</value>
  1535. <description>Block size</description>
  1536. </property>
  1537. <property>
  1538. <name>ftp.replication</name>
  1539. <value>3</value>
  1540. <description>Replication factor</description>
  1541. </property>
  1542. <!-- Tfile -->
  1543. <property>
  1544. <name>tfile.io.chunk.size</name>
  1545. <value>1048576</value>
  1546. <description>
  1547. Value chunk size in bytes. Default to
  1548. 1MB. Values of the length less than the chunk size is
  1549. guaranteed to have known value length in read time (See also
  1550. TFile.Reader.Scanner.Entry.isValueLengthKnown()).
  1551. </description>
  1552. </property>
  1553. <property>
  1554. <name>tfile.fs.output.buffer.size</name>
  1555. <value>262144</value>
  1556. <description>
  1557. Buffer size used for FSDataOutputStream in bytes.
  1558. </description>
  1559. </property>
  1560. <property>
  1561. <name>tfile.fs.input.buffer.size</name>
  1562. <value>262144</value>
  1563. <description>
  1564. Buffer size used for FSDataInputStream in bytes.
  1565. </description>
  1566. </property>
  1567. <!-- HTTP web-consoles Authentication -->
  1568. <property>
  1569. <name>hadoop.http.authentication.type</name>
  1570. <value>simple</value>
  1571. <description>
  1572. Defines authentication used for Oozie HTTP endpoint.
  1573. Supported values are: simple | kerberos | #AUTHENTICATION_HANDLER_CLASSNAME#
  1574. </description>
  1575. </property>
  1576. <property>
  1577. <name>hadoop.http.authentication.token.validity</name>
  1578. <value>36000</value>
  1579. <description>
  1580. Indicates how long (in seconds) an authentication token is valid before it has
  1581. to be renewed.
  1582. </description>
  1583. </property>
  1584. <property>
  1585. <name>hadoop.http.authentication.signature.secret.file</name>
  1586. <value>${user.home}/hadoop-http-auth-signature-secret</value>
  1587. <description>
  1588. The signature secret for signing the authentication tokens.
  1589. The same secret should be used for JT/NN/DN/TT configurations.
  1590. </description>
  1591. </property>
  1592. <property>
  1593. <name>hadoop.http.authentication.cookie.domain</name>
  1594. <value></value>
  1595. <description>
  1596. The domain to use for the HTTP cookie that stores the authentication token.
  1597. In order to authentiation to work correctly across all Hadoop nodes web-consoles
  1598. the domain must be correctly set.
  1599. IMPORTANT: when using IP addresses, browsers ignore cookies with domain settings.
  1600. For this setting to work properly all nodes in the cluster must be configured
  1601. to generate URLs with hostname.domain names on it.
  1602. </description>
  1603. </property>
  1604. <property>
  1605. <name>hadoop.http.authentication.simple.anonymous.allowed</name>
  1606. <value>true</value>
  1607. <description>
  1608. Indicates if anonymous requests are allowed when using 'simple' authentication.
  1609. </description>
  1610. </property>
  1611. <property>
  1612. <name>hadoop.http.authentication.kerberos.principal</name>
  1613. <value>HTTP/_HOST@LOCALHOST</value>
  1614. <description>
  1615. Indicates the Kerberos principal to be used for HTTP endpoint.
  1616. The principal MUST start with 'HTTP/' as per Kerberos HTTP SPNEGO specification.
  1617. </description>
  1618. </property>
  1619. <property>
  1620. <name>hadoop.http.authentication.kerberos.keytab</name>
  1621. <value>${user.home}/hadoop.keytab</value>
  1622. <description>
  1623. Location of the keytab file with the credentials for the principal.
  1624. Referring to the same keytab file Oozie uses for its Kerberos credentials for Hadoop.
  1625. </description>
  1626. </property>
  1627. <!-- HTTP CORS support -->
  1628. <property>
  1629. <name>hadoop.http.cross-origin.enabled</name>
  1630. <value>false</value>
  1631. <description>Enable/disable the cross-origin (CORS) filter.</description>
  1632. </property>
  1633. <property>
  1634. <name>hadoop.http.cross-origin.allowed-origins</name>
  1635. <value>*</value>
  1636. <description>Comma separated list of origins that are allowed for web
  1637. services needing cross-origin (CORS) support. Wildcards (*) and patterns
  1638. allowed</description>
  1639. </property>
  1640. <property>
  1641. <name>hadoop.http.cross-origin.allowed-methods</name>
  1642. <value>GET,POST,HEAD</value>
  1643. <description>Comma separated list of methods that are allowed for web
  1644. services needing cross-origin (CORS) support.</description>
  1645. </property>
  1646. <property>
  1647. <name>hadoop.http.cross-origin.allowed-headers</name>
  1648. <value>X-Requested-With,Content-Type,Accept,Origin</value>
  1649. <description>Comma separated list of headers that are allowed for web
  1650. services needing cross-origin (CORS) support.</description>
  1651. </property>
  1652. <property>
  1653. <name>hadoop.http.cross-origin.max-age</name>
  1654. <value>1800</value>
  1655. <description>The number of seconds a pre-flighted request can be cached
  1656. for web services needing cross-origin (CORS) support.</description>
  1657. </property>
  1658. <property>
  1659. <name>dfs.ha.fencing.methods</name>
  1660. <value></value>
  1661. <description>
  1662. List of fencing methods to use for service fencing. May contain
  1663. builtin methods (eg shell and sshfence) or user-defined method.
  1664. </description>
  1665. </property>
  1666. <property>
  1667. <name>dfs.ha.fencing.ssh.connect-timeout</name>
  1668. <value>30000</value>
  1669. <description>
  1670. SSH connection timeout, in milliseconds, to use with the builtin
  1671. sshfence fencer.
  1672. </description>
  1673. </property>
  1674. <property>
  1675. <name>dfs.ha.fencing.ssh.private-key-files</name>
  1676. <value></value>
  1677. <description>
  1678. The SSH private key files to use with the builtin sshfence fencer.
  1679. </description>
  1680. </property>
  1681. <property>
  1682. <name>ha.zookeeper.quorum</name>
  1683. <description>
  1684. A list of ZooKeeper server addresses, separated by commas, that are
  1685. to be used by the ZKFailoverController in automatic failover.
  1686. </description>
  1687. </property>
  1688. <property>
  1689. <name>ha.zookeeper.session-timeout.ms</name>
  1690. <value>5000</value>
  1691. <description>
  1692. The session timeout to use when the ZKFC connects to ZooKeeper.
  1693. Setting this value to a lower value implies that server crashes
  1694. will be detected more quickly, but risks triggering failover too
  1695. aggressively in the case of a transient error or network blip.
  1696. </description>
  1697. </property>
  1698. <property>
  1699. <name>ha.zookeeper.parent-znode</name>
  1700. <value>/hadoop-ha</value>
  1701. <description>
  1702. The ZooKeeper znode under which the ZK failover controller stores
  1703. its information. Note that the nameservice ID is automatically
  1704. appended to this znode, so it is not normally necessary to
  1705. configure this, even in a federated environment.
  1706. </description>
  1707. </property>
  1708. <property>
  1709. <name>ha.zookeeper.acl</name>
  1710. <value>world:anyone:rwcda</value>
  1711. <description>
  1712. A comma-separated list of ZooKeeper ACLs to apply to the znodes
  1713. used by automatic failover. These ACLs are specified in the same
  1714. format as used by the ZooKeeper CLI.
  1715. If the ACL itself contains secrets, you may instead specify a
  1716. path to a file, prefixed with the '@' symbol, and the value of
  1717. this configuration will be loaded from within.
  1718. </description>
  1719. </property>
  1720. <property>
  1721. <name>ha.zookeeper.auth</name>
  1722. <value></value>
  1723. <description>
  1724. A comma-separated list of ZooKeeper authentications to add when
  1725. connecting to ZooKeeper. These are specified in the same format
  1726. as used by the &quot;addauth&quot; command in the ZK CLI. It is
  1727. important that the authentications specified here are sufficient
  1728. to access znodes with the ACL specified in ha.zookeeper.acl.
  1729. If the auths contain secrets, you may instead specify a
  1730. path to a file, prefixed with the '@' symbol, and the value of
  1731. this configuration will be loaded from within.
  1732. </description>
  1733. </property>
  1734. <!-- Static Web User Filter properties. -->
  1735. <property>
  1736. <name>hadoop.http.staticuser.user</name>
  1737. <value>dr.who</value>
  1738. <description>
  1739. The user name to filter as, on static web filters
  1740. while rendering content. An example use is the HDFS
  1741. web UI (user to be used for browsing files).
  1742. </description>
  1743. </property>
  1744. <!-- SSLFactory configuration -->
  1745. <property>
  1746. <name>hadoop.ssl.keystores.factory.class</name>
  1747. <value>org.apache.hadoop.security.ssl.FileBasedKeyStoresFactory</value>
  1748. <description>
  1749. The keystores factory to use for retrieving certificates.
  1750. </description>
  1751. </property>
  1752. <property>
  1753. <name>hadoop.ssl.require.client.cert</name>
  1754. <value>false</value>
  1755. <description>Whether client certificates are required</description>
  1756. </property>
  1757. <property>
  1758. <name>hadoop.ssl.hostname.verifier</name>
  1759. <value>DEFAULT</value>
  1760. <description>
  1761. The hostname verifier to provide for HttpsURLConnections.
  1762. Valid values are: DEFAULT, STRICT, STRICT_IE6, DEFAULT_AND_LOCALHOST and
  1763. ALLOW_ALL
  1764. </description>
  1765. </property>
  1766. <property>
  1767. <name>hadoop.ssl.server.conf</name>
  1768. <value>ssl-server.xml</value>
  1769. <description>
  1770. Resource file from which ssl server keystore information will be extracted.
  1771. This file is looked up in the classpath, typically it should be in Hadoop
  1772. conf/ directory.
  1773. </description>
  1774. </property>
  1775. <property>
  1776. <name>hadoop.ssl.client.conf</name>
  1777. <value>ssl-client.xml</value>
  1778. <description>
  1779. Resource file from which ssl client keystore information will be extracted
  1780. This file is looked up in the classpath, typically it should be in Hadoop
  1781. conf/ directory.
  1782. </description>
  1783. </property>
  1784. <property>
  1785. <name>hadoop.ssl.enabled</name>
  1786. <value>false</value>
  1787. <description>
  1788. Deprecated. Use dfs.http.policy and yarn.http.policy instead.
  1789. </description>
  1790. </property>
  1791. <property>
  1792. <name>hadoop.ssl.enabled.protocols</name>
  1793. <value>TLSv1,SSLv2Hello,TLSv1.1,TLSv1.2</value>
  1794. <description>
  1795. The supported SSL protocols.
  1796. </description>
  1797. </property>
  1798. <property>
  1799. <name>hadoop.jetty.logs.serve.aliases</name>
  1800. <value>true</value>
  1801. <description>
  1802. Enable/Disable aliases serving from jetty
  1803. </description>
  1804. </property>
  1805. <property>
  1806. <name>fs.permissions.umask-mode</name>
  1807. <value>022</value>
  1808. <description>
  1809. The umask used when creating files and directories.
  1810. Can be in octal or in symbolic. Examples are:
  1811. "022" (octal for u=rwx,g=r-x,o=r-x in symbolic),
  1812. or "u=rwx,g=rwx,o=" (symbolic for 007 in octal).
  1813. </description>
  1814. </property>
  1815. <!-- ha properties -->
  1816. <property>
  1817. <name>ha.health-monitor.connect-retry-interval.ms</name>
  1818. <value>1000</value>
  1819. <description>
  1820. How often to retry connecting to the service.
  1821. </description>
  1822. </property>
  1823. <property>
  1824. <name>ha.health-monitor.check-interval.ms</name>
  1825. <value>1000</value>
  1826. <description>
  1827. How often to check the service.
  1828. </description>
  1829. </property>
  1830. <property>
  1831. <name>ha.health-monitor.sleep-after-disconnect.ms</name>
  1832. <value>1000</value>
  1833. <description>
  1834. How long to sleep after an unexpected RPC error.
  1835. </description>
  1836. </property>
  1837. <property>
  1838. <name>ha.health-monitor.rpc-timeout.ms</name>
  1839. <value>45000</value>
  1840. <description>
  1841. Timeout for the actual monitorHealth() calls.
  1842. </description>
  1843. </property>
  1844. <property>
  1845. <name>ha.failover-controller.new-active.rpc-timeout.ms</name>
  1846. <value>60000</value>
  1847. <description>
  1848. Timeout that the FC waits for the new active to become active
  1849. </description>
  1850. </property>
  1851. <property>
  1852. <name>ha.failover-controller.graceful-fence.rpc-timeout.ms</name>
  1853. <value>5000</value>
  1854. <description>
  1855. Timeout that the FC waits for the old active to go to standby
  1856. </description>
  1857. </property>
  1858. <property>
  1859. <name>ha.failover-controller.graceful-fence.connection.retries</name>
  1860. <value>1</value>
  1861. <description>
  1862. FC connection retries for graceful fencing
  1863. </description>
  1864. </property>
  1865. <property>
  1866. <name>ha.failover-controller.cli-check.rpc-timeout.ms</name>
  1867. <value>20000</value>
  1868. <description>
  1869. Timeout that the CLI (manual) FC waits for monitorHealth, getServiceState
  1870. </description>
  1871. </property>
  1872. <property>
  1873. <name>ipc.client.fallback-to-simple-auth-allowed</name>
  1874. <value>false</value>
  1875. <description>
  1876. When a client is configured to attempt a secure connection, but attempts to
  1877. connect to an insecure server, that server may instruct the client to
  1878. switch to SASL SIMPLE (unsecure) authentication. This setting controls
  1879. whether or not the client will accept this instruction from the server.
  1880. When false (the default), the client will not allow the fallback to SIMPLE
  1881. authentication, and will abort the connection.
  1882. </description>
  1883. </property>
  1884. <property>
  1885. <name>fs.client.resolve.remote.symlinks</name>
  1886. <value>true</value>
  1887. <description>
  1888. Whether to resolve symlinks when accessing a remote Hadoop filesystem.
  1889. Setting this to false causes an exception to be thrown upon encountering
  1890. a symlink. This setting does not apply to local filesystems, which
  1891. automatically resolve local symlinks.
  1892. </description>
  1893. </property>
  1894. <property>
  1895. <name>nfs.exports.allowed.hosts</name>
  1896. <value>* rw</value>
  1897. <description>
  1898. By default, the export can be mounted by any client. The value string
  1899. contains machine name and access privilege, separated by whitespace
  1900. characters. The machine name format can be a single host, a Java regular
  1901. expression, or an IPv4 address. The access privilege uses rw or ro to
  1902. specify read/write or read-only access of the machines to exports. If the
  1903. access privilege is not provided, the default is read-only. Entries are separated by ";".
  1904. For example: "192.168.0.0/22 rw ; host.*\.example\.com ; host1.test.org ro;".
  1905. Only the NFS gateway needs to restart after this property is updated.
  1906. </description>
  1907. </property>
  1908. <property>
  1909. <name>hadoop.user.group.static.mapping.overrides</name>
  1910. <value>dr.who=;</value>
  1911. <description>
  1912. Static mapping of user to groups. This will override the groups if
  1913. available in the system for the specified user. In other words, groups
  1914. look-up will not happen for these users, instead groups mapped in this
  1915. configuration will be used.
  1916. Mapping should be in this format.
  1917. user1=group1,group2;user2=;user3=group2;
  1918. Default, "dr.who=;" will consider "dr.who" as user without groups.
  1919. </description>
  1920. </property>
  1921. <property>
  1922. <name>rpc.metrics.quantile.enable</name>
  1923. <value>false</value>
  1924. <description>
  1925. Setting this property to true and rpc.metrics.percentiles.intervals
  1926. to a comma-separated list of the granularity in seconds, the
  1927. 50/75/90/95/99th percentile latency for rpc queue/processing time in
  1928. milliseconds are added to rpc metrics.
  1929. </description>
  1930. </property>
  1931. <property>
  1932. <name>rpc.metrics.percentiles.intervals</name>
  1933. <value></value>
  1934. <description>
  1935. A comma-separated list of the granularity in seconds for the metrics which
  1936. describe the 50/75/90/95/99th percentile latency for rpc queue/processing
  1937. time. The metrics are outputted if rpc.metrics.quantile.enable is set to
  1938. true.
  1939. </description>
  1940. </property>
  1941. <property>
  1942. <name>hadoop.security.crypto.codec.classes.EXAMPLECIPHERSUITE</name>
  1943. <value></value>
  1944. <description>
  1945. The prefix for a given crypto codec, contains a comma-separated
  1946. list of implementation classes for a given crypto codec (eg EXAMPLECIPHERSUITE).
  1947. The first implementation will be used if available, others are fallbacks.
  1948. </description>
  1949. </property>
  1950. <property>
  1951. <name>hadoop.security.crypto.codec.classes.aes.ctr.nopadding</name>
  1952. <value>org.apache.hadoop.crypto.OpensslAesCtrCryptoCodec, org.apache.hadoop.crypto.JceAesCtrCryptoCodec</value>
  1953. <description>
  1954. Comma-separated list of crypto codec implementations for AES/CTR/NoPadding.
  1955. The first implementation will be used if available, others are fallbacks.
  1956. </description>
  1957. </property>
  1958. <property>
  1959. <name>hadoop.security.crypto.cipher.suite</name>
  1960. <value>AES/CTR/NoPadding</value>
  1961. <description>
  1962. Cipher suite for crypto codec.
  1963. </description>
  1964. </property>
  1965. <property>
  1966. <name>hadoop.security.crypto.jce.provider</name>
  1967. <value></value>
  1968. <description>
  1969. The JCE provider name used in CryptoCodec.
  1970. </description>
  1971. </property>
  1972. <property>
  1973. <name>hadoop.security.crypto.buffer.size</name>
  1974. <value>8192</value>
  1975. <description>
  1976. The buffer size used by CryptoInputStream and CryptoOutputStream.
  1977. </description>
  1978. </property>
  1979. <property>
  1980. <name>hadoop.security.java.secure.random.algorithm</name>
  1981. <value>SHA1PRNG</value>
  1982. <description>
  1983. The java secure random algorithm.
  1984. </description>
  1985. </property>
  1986. <property>
  1987. <name>hadoop.security.secure.random.impl</name>
  1988. <value></value>
  1989. <description>
  1990. Implementation of secure random.
  1991. </description>
  1992. </property>
  1993. <property>
  1994. <name>hadoop.security.random.device.file.path</name>
  1995. <value>/dev/urandom</value>
  1996. <description>
  1997. OS security random device file path.
  1998. </description>
  1999. </property>
  2000. <property>
  2001. <name>hadoop.security.key.provider.path</name>
  2002. <description>
  2003. The KeyProvider to use when managing zone keys, and interacting with
  2004. encryption keys when reading and writing to an encryption zone.
  2005. For hdfs clients, the provider path will be same as namenode's
  2006. provider path.
  2007. </description>
  2008. </property>
  2009. <property>
  2010. <name>fs.har.impl.disable.cache</name>
  2011. <value>true</value>
  2012. <description>Don't cache 'har' filesystem instances.</description>
  2013. </property>
  2014. <!--- KMSClientProvider configurations -->
  2015. <property>
  2016. <name>hadoop.security.kms.client.authentication.retry-count</name>
  2017. <value>1</value>
  2018. <description>
  2019. Number of time to retry connecting to KMS on authentication failure
  2020. </description>
  2021. </property>
  2022. <property>
  2023. <name>hadoop.security.kms.client.encrypted.key.cache.size</name>
  2024. <value>500</value>
  2025. <description>
  2026. Size of the EncryptedKeyVersion cache Queue for each key
  2027. </description>
  2028. </property>
  2029. <property>
  2030. <name>hadoop.security.kms.client.encrypted.key.cache.low-watermark</name>
  2031. <value>0.3f</value>
  2032. <description>
  2033. If size of the EncryptedKeyVersion cache Queue falls below the
  2034. low watermark, this cache queue will be scheduled for a refill
  2035. </description>
  2036. </property>
  2037. <property>
  2038. <name>hadoop.security.kms.client.encrypted.key.cache.num.refill.threads</name>
  2039. <value>2</value>
  2040. <description>
  2041. Number of threads to use for refilling depleted EncryptedKeyVersion
  2042. cache Queues
  2043. </description>
  2044. </property>
  2045. <property>
  2046. <name>hadoop.security.kms.client.encrypted.key.cache.expiry</name>
  2047. <value>43200000</value>
  2048. <description>
  2049. Cache expiry time for a Key, after which the cache Queue for this
  2050. key will be dropped. Default = 12hrs
  2051. </description>
  2052. </property>
  2053. <property>
  2054. <name>ipc.server.max.connections</name>
  2055. <value>0</value>
  2056. <description>The maximum number of concurrent connections a server is allowed
  2057. to accept. If this limit is exceeded, incoming connections will first fill
  2058. the listen queue and then may go to an OS-specific listen overflow queue.
  2059. The client may fail or timeout, but the server can avoid running out of file
  2060. descriptors using this feature. 0 means no limit.
  2061. </description>
  2062. </property>
  2063. <!-- YARN registry -->
  2064. <property>
  2065. <name>hadoop.registry.rm.enabled</name>
  2066. <value>false</value>
  2067. <description>
  2068. Is the registry enabled in the YARN Resource Manager?
  2069. If true, the YARN RM will, as needed.
  2070. create the user and system paths, and purge
  2071. service records when containers, application attempts
  2072. and applications complete.
  2073. If false, the paths must be created by other means,
  2074. and no automatic cleanup of service records will take place.
  2075. </description>
  2076. </property>
  2077. <property>
  2078. <name>hadoop.registry.zk.root</name>
  2079. <value>/registry</value>
  2080. <description>
  2081. The root zookeeper node for the registry
  2082. </description>
  2083. </property>
  2084. <property>
  2085. <name>hadoop.registry.zk.session.timeout.ms</name>
  2086. <value>60000</value>
  2087. <description>
  2088. Zookeeper session timeout in milliseconds
  2089. </description>
  2090. </property>
  2091. <property>
  2092. <name>hadoop.registry.zk.connection.timeout.ms</name>
  2093. <value>15000</value>
  2094. <description>
  2095. Zookeeper connection timeout in milliseconds
  2096. </description>
  2097. </property>
  2098. <property>
  2099. <name>hadoop.registry.zk.retry.times</name>
  2100. <value>5</value>
  2101. <description>
  2102. Zookeeper connection retry count before failing
  2103. </description>
  2104. </property>
  2105. <property>
  2106. <name>hadoop.registry.zk.retry.interval.ms</name>
  2107. <value>1000</value>
  2108. <description>
  2109. </description>
  2110. </property>
  2111. <property>
  2112. <name>hadoop.registry.zk.retry.ceiling.ms</name>
  2113. <value>60000</value>
  2114. <description>
  2115. Zookeeper retry limit in milliseconds, during
  2116. exponential backoff.
  2117. This places a limit even
  2118. if the retry times and interval limit, combined
  2119. with the backoff policy, result in a long retry
  2120. period
  2121. </description>
  2122. </property>
  2123. <property>
  2124. <name>hadoop.registry.zk.quorum</name>
  2125. <value>localhost:2181</value>
  2126. <description>
  2127. List of hostname:port pairs defining the
  2128. zookeeper quorum binding for the registry
  2129. </description>
  2130. </property>
  2131. <property>
  2132. <name>hadoop.registry.secure</name>
  2133. <value>false</value>
  2134. <description>
  2135. Key to set if the registry is secure. Turning it on
  2136. changes the permissions policy from "open access"
  2137. to restrictions on kerberos with the option of
  2138. a user adding one or more auth key pairs down their
  2139. own tree.
  2140. </description>
  2141. </property>
  2142. <property>
  2143. <name>hadoop.registry.system.acls</name>
  2144. <value>sasl:yarn@, sasl:mapred@, sasl:hdfs@</value>
  2145. <description>
  2146. A comma separated list of Zookeeper ACL identifiers with
  2147. system access to the registry in a secure cluster.
  2148. These are given full access to all entries.
  2149. If there is an "@" at the end of a SASL entry it
  2150. instructs the registry client to append the default kerberos domain.
  2151. </description>
  2152. </property>
  2153. <property>
  2154. <name>hadoop.registry.kerberos.realm</name>
  2155. <value></value>
  2156. <description>
  2157. The kerberos realm: used to set the realm of
  2158. system principals which do not declare their realm,
  2159. and any other accounts that need the value.
  2160. If empty, the default realm of the running process
  2161. is used.
  2162. If neither are known and the realm is needed, then the registry
  2163. service/client will fail.
  2164. </description>
  2165. </property>
  2166. <property>
  2167. <name>hadoop.registry.jaas.context</name>
  2168. <value>Client</value>
  2169. <description>
  2170. Key to define the JAAS context. Used in secure
  2171. mode
  2172. </description>
  2173. </property>
  2174. <property>
  2175. <name>hadoop.shell.missing.defaultFs.warning</name>
  2176. <value>false</value>
  2177. <description>
  2178. Enable hdfs shell commands to display warnings if (fs.defaultFS) property
  2179. is not set.
  2180. </description>
  2181. </property>
  2182. <property>
  2183. <name>hadoop.shell.safely.delete.limit.num.files</name>
  2184. <value>100</value>
  2185. <description>Used by -safely option of hadoop fs shell -rm command to avoid
  2186. accidental deletion of large directories. When enabled, the -rm command
  2187. requires confirmation if the number of files to be deleted is greater than
  2188. this limit. The default limit is 100 files. The warning is disabled if
  2189. the limit is 0 or the -safely is not specified in -rm command.
  2190. </description>
  2191. </property>
  2192. <property>
  2193. <name>fs.client.htrace.sampler.classes</name>
  2194. <value></value>
  2195. <description>The class names of the HTrace Samplers to use for Hadoop
  2196. filesystem clients.
  2197. </description>
  2198. </property>
  2199. <property>
  2200. <name>hadoop.htrace.span.receiver.classes</name>
  2201. <value></value>
  2202. <description>The class names of the Span Receivers to use for Hadoop.
  2203. </description>
  2204. </property>
  2205. <property>
  2206. <name>hadoop.http.logs.enabled</name>
  2207. <value>true</value>
  2208. <description>
  2209. Enable the "/logs" endpoint on all Hadoop daemons, which serves local
  2210. logs, but may be considered a security risk due to it listing the contents
  2211. of a directory.
  2212. </description>
  2213. </property>
  2214. <property>
  2215. <name>fs.client.resolve.topology.enabled</name>
  2216. <value>false</value>
  2217. <description>Whether the client machine will use the class specified by
  2218. property net.topology.node.switch.mapping.impl to compute the network
  2219. distance between itself and remote machines of the FileSystem. Additional
  2220. properties might need to be configured depending on the class specified
  2221. in net.topology.node.switch.mapping.impl. For example, if
  2222. org.apache.hadoop.net.ScriptBasedMapping is used, a valid script file
  2223. needs to be specified in net.topology.script.file.name.
  2224. </description>
  2225. </property>
  2226. <!-- Azure Data Lake File System Configurations -->
  2227. <property>
  2228. <name>fs.adl.impl</name>
  2229. <value>org.apache.hadoop.fs.adl.AdlFileSystem</value>
  2230. </property>
  2231. <property>
  2232. <name>fs.AbstractFileSystem.adl.impl</name>
  2233. <value>org.apache.hadoop.fs.adl.Adl</value>
  2234. </property>
  2235. <property>
  2236. <name>adl.feature.ownerandgroup.enableupn</name>
  2237. <value>false</value>
  2238. <description>
  2239. When true : User and Group in FileStatus/AclStatus response is
  2240. represented as user friendly name as per Azure AD profile.
  2241. When false (default) : User and Group in FileStatus/AclStatus
  2242. response is represented by the unique identifier from Azure AD
  2243. profile (Object ID as GUID).
  2244. For optimal performance, false is recommended.
  2245. </description>
  2246. </property>
  2247. <property>
  2248. <name>fs.adl.oauth2.access.token.provider.type</name>
  2249. <value>ClientCredential</value>
  2250. <description>
  2251. Defines Azure Active Directory OAuth2 access token provider type.
  2252. Supported types are ClientCredential, RefreshToken, MSI, DeviceCode,
  2253. and Custom.
  2254. The ClientCredential type requires property fs.adl.oauth2.client.id,
  2255. fs.adl.oauth2.credential, and fs.adl.oauth2.refresh.url.
  2256. The RefreshToken type requires property fs.adl.oauth2.client.id and
  2257. fs.adl.oauth2.refresh.token.
  2258. The MSI type reads optional property fs.adl.oauth2.msi.port, if specified.
  2259. The DeviceCode type requires property
  2260. fs.adl.oauth2.devicecode.clientapp.id.
  2261. The Custom type requires property fs.adl.oauth2.access.token.provider.
  2262. </description>
  2263. </property>
  2264. <property>
  2265. <name>fs.adl.oauth2.client.id</name>
  2266. <value></value>
  2267. <description>The OAuth2 client id.</description>
  2268. </property>
  2269. <property>
  2270. <name>fs.adl.oauth2.credential</name>
  2271. <value></value>
  2272. <description>The OAuth2 access key.</description>
  2273. </property>
  2274. <property>
  2275. <name>fs.adl.oauth2.refresh.url</name>
  2276. <value></value>
  2277. <description>The OAuth2 token endpoint.</description>
  2278. </property>
  2279. <property>
  2280. <name>fs.adl.oauth2.refresh.token</name>
  2281. <value></value>
  2282. <description>The OAuth2 refresh token.</description>
  2283. </property>
  2284. <property>
  2285. <name>fs.adl.oauth2.access.token.provider</name>
  2286. <value></value>
  2287. <description>
  2288. The class name of the OAuth2 access token provider.
  2289. </description>
  2290. </property>
  2291. <property>
  2292. <name>fs.adl.oauth2.msi.port</name>
  2293. <value></value>
  2294. <description>
  2295. The localhost port for the MSI token service. This is the port specified
  2296. when creating the Azure VM. The default, if this setting is not specified,
  2297. is 50342.
  2298. Used by MSI token provider.
  2299. </description>
  2300. </property>
  2301. <property>
  2302. <name>fs.adl.oauth2.devicecode.clientapp.id</name>
  2303. <value></value>
  2304. <description>
  2305. The app id of the AAD native app in whose context the auth request
  2306. should be made.
  2307. Used by DeviceCode token provider.
  2308. </description>
  2309. </property>
  2310. <!-- Azure Data Lake File System Configurations Ends Here-->
  2311. <property>
  2312. <name>hadoop.caller.context.enabled</name>
  2313. <value>false</value>
  2314. <description>When the feature is enabled, additional fields are written into
  2315. name-node audit log records for auditing coarse granularity operations.
  2316. </description>
  2317. </property>
  2318. <property>
  2319. <name>hadoop.caller.context.max.size</name>
  2320. <value>128</value>
  2321. <description>The maximum bytes a caller context string can have. If the
  2322. passed caller context is longer than this maximum bytes, client will
  2323. truncate it before sending to server. Note that the server may have a
  2324. different maximum size, and will truncate the caller context to the
  2325. maximum size it allows.
  2326. </description>
  2327. </property>
  2328. <property>
  2329. <name>hadoop.caller.context.signature.max.size</name>
  2330. <value>40</value>
  2331. <description>
  2332. The caller's signature (optional) is for offline validation. If the
  2333. signature exceeds the maximum allowed bytes in server, the caller context
  2334. will be abandoned, in which case the caller context will not be recorded
  2335. in audit logs.
  2336. </description>
  2337. </property>
  2338. <!-- SequenceFile's Sorter properties -->
  2339. <property>
  2340. <name>seq.io.sort.mb</name>
  2341. <value>100</value>
  2342. <description>
  2343. The total amount of buffer memory to use while sorting files,
  2344. while using SequenceFile.Sorter, in megabytes. By default,
  2345. gives each merge stream 1MB, which should minimize seeks.
  2346. </description>
  2347. </property>
  2348. <property>
  2349. <name>seq.io.sort.factor</name>
  2350. <value>100</value>
  2351. <description>
  2352. The number of streams to merge at once while sorting
  2353. files using SequenceFile.Sorter.
  2354. This determines the number of open file handles.
  2355. </description>
  2356. </property>
  2357. <property>
  2358. <name>hadoop.zk.address</name>
  2359. <!--value>127.0.0.1:2181</value-->
  2360. <description>Host:Port of the ZooKeeper server to be used.
  2361. </description>
  2362. </property>
  2363. <property>
  2364. <name>hadoop.zk.num-retries</name>
  2365. <value>1000</value>
  2366. <description>Number of tries to connect to ZooKeeper.</description>
  2367. </property>
  2368. <property>
  2369. <name>hadoop.zk.retry-interval-ms</name>
  2370. <value>1000</value>
  2371. <description>Retry interval in milliseconds when connecting to ZooKeeper.
  2372. </description>
  2373. </property>
  2374. <property>
  2375. <name>hadoop.zk.timeout-ms</name>
  2376. <value>10000</value>
  2377. <description>ZooKeeper session timeout in milliseconds. Session expiration
  2378. is managed by the ZooKeeper cluster itself, not by the client. This value is
  2379. used by the cluster to determine when the client's session expires.
  2380. Expirations happens when the cluster does not hear from the client within
  2381. the specified session timeout period (i.e. no heartbeat).</description>
  2382. </property>
  2383. <property>
  2384. <name>hadoop.zk.acl</name>
  2385. <value>world:anyone:rwcda</value>
  2386. <description>ACL's to be used for ZooKeeper znodes.</description>
  2387. </property>
  2388. <property>
  2389. <name>hadoop.zk.auth</name>
  2390. <description>
  2391. Specify the auths to be used for the ACL's specified in hadoop.zk.acl.
  2392. This takes a comma-separated list of authentication mechanisms, each of the
  2393. form 'scheme:auth' (the same syntax used for the 'addAuth' command in
  2394. the ZK CLI).
  2395. </description>
  2396. </property>
  2397. </configuration>