All Downloads are FREE. Search and download functionalities are using the official Maven repository.

doop.hadoop-hdfs-httpfs.3.4.1.source-code.httpfs-default.xml Maven / Gradle / Ivy

The newest version!
<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="configuration.xsl"?>
<!--
  Licensed under the Apache License, Version 2.0 (the "License");
  you may not use this file except in compliance with the License.
  You may obtain a copy of the License at

  http://www.apache.org/licenses/LICENSE-2.0

  Unless required by applicable law or agreed to in writing, software
  distributed under the License is distributed on an "AS IS" BASIS,
  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  See the License for the specific language governing permissions and
  limitations under the License.
-->
<configuration>

  <property>
    <name>httpfs.http.port</name>
    <value>14000</value>
    <description>
      The HTTP port for HttpFS REST API.
    </description>
  </property>

  <property>
    <name>httpfs.http.hostname</name>
    <value>0.0.0.0</value>
    <description>
      The bind host for HttpFS REST API.
    </description>
  </property>

  <property>
    <name>httpfs.http.administrators</name>
    <value></value>
    <description>ACL for the admins, this configuration is used to control
      who can access the default servlets for HttpFS server. The value
      should be a comma separated list of users and groups. The user list
      comes first and is separated by a space followed by the group list,
      e.g. "user1,user2 group1,group2". Both users and groups are optional,
      so "user1", " group1", "", "user1 group1", "user1,user2 group1,group2"
      are all valid (note the leading space in " group1"). '*' grants access
      to all users and groups, e.g. '*', '* ' and ' *' are all valid.
    </description>
  </property>

  <property>
    <name>httpfs.ssl.enabled</name>
    <value>false</value>
    <description>
      Whether SSL is enabled. Default is false, i.e. disabled.
    </description>
  </property>

  <!-- HTTP properties -->
  <property>
    <name>hadoop.http.idle_timeout.ms</name>
    <value>60000</value>
    <description>
      Httpfs Server connection timeout in milliseconds.
    </description>
  </property>

  <property>
    <name>hadoop.http.max.threads</name>
    <value>1000</value>
    <description>
      The maxmimum number of threads.
    </description>
  </property>

  <property>
    <name>hadoop.http.max.request.header.size</name>
    <value>65536</value>
    <description>
      The maxmimum HTTP request header size.
    </description>
  </property>

  <property>
    <name>hadoop.http.max.response.header.size</name>
    <value>65536</value>
    <description>
      The maxmimum HTTP response header size.
    </description>
  </property>

  <property>
    <name>hadoop.http.temp.dir</name>
    <value>${hadoop.tmp.dir}/httpfs</value>
    <description>
      HttpFS temp directory.
    </description>
  </property>

  <!-- HttpFSServer Server -->

  <property>
    <name>httpfs.buffer.size</name>
    <value>4096</value>
    <description>
      The buffer size used by a read/write request when streaming data from/to
      HDFS.
    </description>
  </property>

  <!-- HttpFSServer Services -->

  <property>
    <name>httpfs.services</name>
    <value>
      org.apache.hadoop.lib.service.instrumentation.InstrumentationService,
      org.apache.hadoop.lib.service.scheduler.SchedulerService,
      org.apache.hadoop.lib.service.security.GroupsService,
      org.apache.hadoop.lib.service.hadoop.FileSystemAccessService
    </value>
    <description>
      Services used by the httpfs server.
    </description>
  </property>

  <!-- Kerberos Configuration -->

  <property>
    <name>kerberos.realm</name>
    <value>LOCALHOST</value>
    <description>
      Kerberos realm, used only if Kerberos authentication is used between
      the clients and httpfs or between HttpFS and HDFS.

      This property is only used to resolve other properties within this
      configuration file.
    </description>
  </property>

  <!-- HttpFSServer Security Configuration -->

  <property>
    <name>httpfs.hostname</name>
    <value>${httpfs.http.hostname}</value>
    <description>
      Property used to synthetize the HTTP Kerberos principal used by httpfs.

      This property is only used to resolve other properties within this
      configuration file.
    </description>
  </property>

  <property>
    <name>hadoop.http.authentication.signature.secret.file</name>
    <value>${httpfs.config.dir}/httpfs-signature.secret</value>
    <description>
      File containing the secret to sign HttpFS hadoop-auth cookies.

      This file should be readable only by the system user running HttpFS service.

      If multiple HttpFS servers are used in a load-balancer/round-robin fashion,
      they should share the secret file.

      If the secret file specified here does not exist or it is empty, a random
      secret is generated at startup time.

      httpfs.authentication.signature.secret.file is deprecated. Instead use
      hadoop.http.authentication.signature.secret.file.
    </description>
  </property>

  <property>
    <name>hadoop.http.authentication.type</name>
    <value>simple</value>
    <description>
      Defines the authentication mechanism used by httpfs for its HTTP clients.

      Valid values are 'simple' or 'kerberos'.

      If using 'simple' HTTP clients must specify the username with the
      'user.name' query string parameter.

      If using 'kerberos' HTTP clients must use HTTP SPNEGO or delegation tokens.

      httpfs.authentication.type is deprecated. Instead use
      hadoop.http.authentication.type.
    </description>
  </property>

  <property>
    <name>hadoop.http.authentication.kerberos.principal</name>
    <value>HTTP/${httpfs.hostname}@${kerberos.realm}</value>
    <description>
      The HTTP Kerberos principal used by HttpFS in the HTTP endpoint.

      The HTTP Kerberos principal MUST start with 'HTTP/' per Kerberos
      HTTP SPNEGO specification.

      httpfs.authentication.kerberos.principal is deprecated. Instead use
      hadoop.http.authentication.kerberos.principal.
    </description>
  </property>

  <property>
    <name>hadoop.http.authentication.kerberos.keytab</name>
    <value>${user.home}/httpfs.keytab</value>
    <description>
      The Kerberos keytab file with the credentials for the
      HTTP Kerberos principal used by httpfs in the HTTP endpoint.

      httpfs.authentication.kerberos.keytab is deprecated. Instead use
      hadoop.http.authentication.kerberos.keytab.
    </description>
  </property>

  <!-- HttpFSServer proxy user Configuration -->
<!--

  The following 2 properties within this comment are provided as an
  example to facilitate configuring HttpFS proxyusers.

  <property>
    <name>httpfs.proxyuser.#USER#.hosts</name>
    <value>*</value>
    <description>
      List of hosts the '#USER#' user is allowed to perform 'doAs'
      operations.

      The '#USER#' must be replaced with the username o the user who is
      allowed to perform 'doAs' operations.

      The value can be the '*' wildcard or a list of hostnames.

      For multiple users copy this property and replace the user name
      in the property name.
    </description>
  </property>

  <property>
    <name>httpfs.proxyuser.#USER#.groups</name>
    <value>*</value>
    <description>
      List of groups the '#USER#' user is allowed to impersonate users
      from to perform 'doAs' operations.

      The '#USER#' must be replaced with the username o the user who is
      allowed to perform 'doAs' operations.

      The value can be the '*' wildcard or a list of groups.

      For multiple users copy this property and replace the user name
      in the property name.
    </description>
  </property>
-->

  <!-- HttpFS Delegation Token configuration -->

  <property>
    <name>httpfs.delegation.token.manager.update.interval</name>
    <value>86400</value>
    <description>
      HttpFS delegation token update interval, default 1 day, in seconds.
    </description>
  </property>

  <property>
    <name>httpfs.delegation.token.manager.max.lifetime</name>
    <value>604800</value>
    <description>
      HttpFS delegation token maximum lifetime, default 7 days, in seconds
    </description>
  </property>

  <property>
    <name>httpfs.delegation.token.manager.renewal.interval</name>
    <value>86400</value>
    <description>
      HttpFS delegation token update interval, default 1 day, in seconds.
    </description>
  </property>

  <!-- FileSystemAccess Namenode Security Configuration -->

  <property>
    <name>httpfs.hadoop.authentication.type</name>
    <value>simple</value>
    <description>
      Defines the authentication mechanism used by httpfs to connect to
      the HDFS Namenode.

      Valid values are 'simple' and 'kerberos'.
    </description>
  </property>

  <property>
    <name>httpfs.hadoop.authentication.kerberos.keytab</name>
    <value>${user.home}/httpfs.keytab</value>
    <description>
      The Kerberos keytab file with the credentials for the
      Kerberos principal used by httpfs to connect to the HDFS Namenode.
    </description>
  </property>

  <property>
    <name>httpfs.hadoop.authentication.kerberos.principal</name>
    <value>${user.name}/${httpfs.hostname}@${kerberos.realm}</value>
    <description>
      The Kerberos principal used by httpfs to connect to the HDFS Namenode.
    </description>
  </property>

  <property>
    <name>httpfs.hadoop.filesystem.cache.purge.frequency</name>
    <value>60</value>
    <description>
      Frequency, in seconds, for the idle filesystem purging daemon runs.
    </description>
  </property>

  <property>
    <name>httpfs.hadoop.filesystem.cache.purge.timeout</name>
    <value>60</value>
    <description>
      Timeout, in seconds, for an idle filesystem to be purged.
    </description>
  </property>

  <property>
    <name>httpfs.access.mode</name>
    <value>read-write</value>
    <description>
      Sets the access mode for HTTPFS. If access is not allowed the FORBIDDED (403) is returned.
      Valid access modes are:
       read-write   Full Access allowed
       write-only   PUT POST and DELETE full Access. GET only allows GETFILESTATUS and LISTSTATUS
       read-only    GET Full Access PUT POST and DELETE are FORBIDDEN
    </description>
  </property>
</configuration>




© 2015 - 2025 Weber Informatics LLC | Privacy Policy