Verifying installation

After you have deployed CDP Private Cloud Base with the IBM Storage Scale service, verify the installation setup.

  1. If the CES HDFS cluster is Kerberos enabled, ensure that Kerberos is properly configured for HDFS Transparency. For more information, see Verifying Kerberos.
  2. On the CES HDFS cluster, ensure that there is an active NameNode by running the following commands. If Kerberos is enabled, a Kerberos token for the HDFS user is needed.
    # kinit -kt /etc/security/keytabs/ces-<clustername>.headless.keytab ces-<clustername>@<Realm name> -c /var/mmfs/tmp/krb5cc_ces

    where, <clustername> is the cluster name of your CES HDFS and <Realm> is the Realm name of your Kerberos. For example, IBM.COM.

    # export KRB5CCNAME=/var/mmfs/tmp/krb5cc_ces
    # hdfs haadmin -getAllServiceState
    Namenode1.gpfs.net:8020                           active
    Namenode2.gpfs.net:8020                           standby
    You must see one active NameNode.
  3. To verify the regular HDFS client, run the following command:
    # hdfs dfs -ls /
  4. Log in to one of the CDP Private Cloud Base cluster node setup with a gateway role for the IBM Storage Scale service. These gateway nodes have the configuration files required by the HDFS client.
  5. If Kerberos is enabled, the HDFS client needs a valid Kerberos token before it can access the IBM Storage Scale file system. You can create a regular OS user across all the nodes and then define a user principal and optionally a keytab file corresponding to that user on your KDC server.
    In the following example, a user named testuser is created with the principal name as testuser@IBM.COM and keytab filename as testuser.headless.keytab.
    • Create a regular OS user on all the nodes by following step 5 in Configuring users, groups and file system access for IBM Storage Scale.
    • Log into the KDC server and create a Kerberos principal and keytab for the testuser.
      # kadmin.local addprinc -randkey -maxrenewlife 7d +allow_renewable testuser
      # kadmin.local ktadd -k /etc/security/keytabs/testuser.headless.keytab testuser@<Realm Name>
    • Obtain a token for the testuser.
      # kinit -kt /etc/security/keytabs/testuser.headless.keytab testuser@<Realm Name>
       # klist
  6. To verify the regular HDFS client, run the following command:
    # echo “hello world” > /tmp/hello
    # hdfs dfs -ls /
    # hdfs dfs -put /tmp/hello /tmp
    # hdfs dfs -cat /tmp/hello
  7. To verify WebHDFS client, run the following command:
    # echo “hello world” > /tmp/hello
    # hdfs dfs -ls webhdfs://<CES HDFS Cluster-name>/
    # hdfs dfs -put /tmp/hello webhdfs://<CES HDFS Cluster-name>/tmp/
    # hdfs dfs -cat webhdfs://<CES HDFS Cluster-name>/tmp/hello
    where, <CES HDFS Cluster-name> is the name of your HDFS namespace.