Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Applies to: (tick) Kyvos Enterprise  (tick) Kyvos Cloud (SaaS on AWS) (tick) Kyvos AWS Marketplace

...

Configuration

Description/Remarks

EMR and Hadoop Ecosystem Configuration

Here you can provide details for the vendor, file systems, node authentication, paths and versions for configuration files, and Zookeeper configuration.

HCatalog Configuration

Here you can enable HCatalog and provide details for the Hive node authentication, paths and versions for configuration files, and additional HCatalog parameters.

Execution Engine Configuration

Here you can specify the execution engine to be used for performing various jobs and operations in the cluster. If using Spark, you can also provide details for Spark Source node authentication, paths and versions for configuration files, and additional Spark parameters.

Click here to know more.

Common Configuration

Here you can provide details for the Library and Configuration files.

Click here to know more.

Click here to know more.

Security configurations

...

Configuration

Description/Remarks

Hadoop authentication

Here you can specify the authentication type for how the user login details will be authenticated.

Kyvos authentication

Here you can specify the Kyvos authentication mechanism. You can further configure:

  • Native: Native Kyvos authentication mechanism.

  • Kerberos: Enables you to use Kerberos network authentication protocol using secret-key for authentication.

  • LDAP: Integrate your organization's LDAP account for Kyvos authentication and importing users. You can integrate multiple accounts. Click here for more details.

  • SSO for Web portal: Single-sign on configuration for accessing the Kyvos Web Portal using any of the following:

    • Waffle

    • Jespa

    • Kerberos
      Click here for more details.

Hadoop authorization

Here you can define configurations for fine-grained Hadoop authorization control for data access. Kyvos supports the following:

  • Sentry

  • Ranger

Network Protocol Configuration

Here you can specify the TSL Configuration for secure communication between client and server.

You can also configure the HTTPS and certificates for Kyvos Web Portal here.

Kyvos Web Portal External Authentication Configuration

Here, you can specify an external authentication mechanism for the Kyvos Web portal. Kyvos supports the following:

  • SAML2.0 based

  • Host Application-based

  • Certificate-based

  • OIDC based

Kyvos Preferences

Here you can specify Kyvos User Preferences for Hadoop access as either KEYTAB PRINCIPAL USER with administrative rights or KYVOS LOGGED IN USER with specific access rights to perform activities as per the user's privileges

Data Security

Here you can specify the Custom Data Security Configurations to limit access to the cube semantic model data. Kyvos supports:

  • Custom Row-level Security

  • Custom Column-Level Security

  • Custom JDBC Security

...

Configuration Files

This page is used to  update and upload the Configuration Files on the cluster.

Instances State Configuration

...

Run the Sanity Suite to check if all the activities (like creating a Registered File, Data Relationship Diagram, and Cube buildingSemantic model processing) for browsing cubes emantic models in the Kyvos application are working fine.

...

Uploading External Libraries

This page is used to upload  any third-party JAR files that you want to use for the Kyvos environment. 

Disaster Recovery

This page is used to restore the system from a disaster. You can also manually recover Kyvos Manager nodes and roles on it. Both guided, and manual recovery are supported.


Cluster Monitoring services

Kyvos Manager allows you to monitor the cluster state through multiple options available on the navigation pane.

You can see:

  • The

dashboard with the state of all Kyvos clusters and nodes. The dashboard also shows a graphical representation of the node-level utilization metrics.

  • Utilities options allowing you to monitor:

    • Audit Trail helps to track changes in configuration parameters.

    • Cluster Logs help to track changes made to the cluster.

    • Cluster Snapshot showing the entire cluster configuration settings in one place.

    • Events occurred on the cluster.

    • Reminders and email messages for alerts, warnings, services status, or nodes down

    • Operations performed on the cluster.

    • Agent Logging Configuration allows you to configure agent logging parameters like log level, file size, and backup file count.