Skip to main content

How to disable HA in SCH

  • November 17, 2021
  • 0 replies
  • 55 views

In order to disable HA in SCH, we need first to change the endpoint URL the application will use. This can be changed in $DPM_CONF/common-to-all-apps.properties file and update the following properties:

dpm.base.url=https://<sch-loadbalancer-url>

to 

dpm.base.url=https://<sch-host-url>

 

Also in the same file, we need to verify that the below properties are commented or have the same value as dpm.base.url:

# Internal app endpoints
dpm.app.messaging.url=https://<sch-host-url>
dpm.app.security.url=https://<sch-host-url>
dpm.app.timeseries.url=https://<sch-host-url>
dpm.app.jobrunner.url=https://<sch-host-url>
dpm.app.notification.url=https://<sch-host-url>
dpm.app.pipelinestore.url=https://<sch-host-url>
dpm.app.policy.url=https://<sch-host-url>
dpm.app.provisioning.url=https://<sch-host-url>
dpm.app.reporting.url=https://<sch-host-url>
dpm.app.scheduler.url=https://<sch-host-url>
dpm.app.sdp_classification.url=https://<sch-host-url>
dpm.app.topology.url=https://<sch-host-url>
dpm.app.sla.url=https://<sch-host-url>

 

Once these changes have been applied we need to re-generate the application tokens. First, we need to remove the old ones. The application tokens can be found in $DPM_CONF folder:

$ ls -lrt *auth-token.txt 
-rw-r--r-- 1 mel staff 221 May 27 13:01 security-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 jobrunner-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 messaging-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 pipelinestore-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 provisioning-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 timeseries-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 topology-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:01 notification-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 sla-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 scheduler-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 reporting-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 sdp_classification-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 policy-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 dynamic_preview-auth-token.txt
-rw-r--r-- 1 mel staff 221 May 27 13:02 dpm-auth-token.txt

 

Use the command below to remove them:

rm -f *auth-token.txt

 

Now in order to generate them again, we need to execute one of the scripts provided with the SCH binaries. First, we need to configure the environment variables below:

export DPM_CONF=/etc/dpm

export DPM_HOME=/opt/streamsets-dpm

 

We need to be sure that the SCH service is stopped and that our current directory is $DPM_HOME and we can execute the script:

$ pwd
/opt/streamsets-dpm

 

The script dev/02-initsecurity.sh
 has as parameter the componentID configured in any of the *app-properties files. If the componentID is different than 000 we need to be sure to add is as a parameter when executing the script. E.g.:

dev/02-initsecurity.sh 001

As an output for this script, we should see the new SCH URL configured in the common-to-all-apps.properties file and confirm that the configuration changes have been applied.

Created SAML configuration for DPM:
-----------------------------------------------------
{
 "type" : "SpSelfConfig",
 "bean" : {
 "sp.uri" : [ "uri:https://<sch-host-url>/security", "(FROM CONFIGS)" ],
 "sp.organizationName" : [ "?", "(FROM CONFIGS)" ],
 "sp.organizationDisplayName" : [ "?", "(FROM CONFIGS)" ],
 "sp.organizationUrl" : [ "?", "(FROM CONFIGS)" ],
 "sp.supportEmail" : [ "?", "(FROM CONFIGS)" ],

 

After this, we can bring up again the SCH service. The application should be reachable using the SCH-host URL instead of the HA (High Availability) one.

Did this topic help you find an answer to your question?

0 replies

Be the first to reply!

Reply