Available in VPC
You can submit management tasks or applications through NAVER Cloud Platform's Cloud Hadoop console or web UI (Ambari, Hue, etc.). However, SSH connection to the cluster node is required to execute the client directly.
If you connect through SSH to the cluster's assigned domain, the connection will be made to the cluster's edge node. Other nodes can be accessed from the edge node through SSH. For more information, see 2. Access cluster node.
Preparations
In order to access a cluster node, the following preparations need to be made:
| Item | Description | Guide |
|---|---|---|
| Set SSL VPN | Secure access from the outside to the network configured within NAVER Cloud Platform.
|
SSL VPN user guide (VPC) |
| Set ACG | Add the IP of the device and port 22 to access the cluster's ACG settings.
|
Set firewall (ACG) |
| Authentication key | Private key (.pem) required for accessing the cluster. | Manage authentication key for direct cluster access |
| Domain | Domain address required for accessing the cluster node. | Check cluster details |
1. Set SSL VPN
SSL VPN must be set to ensure secure access from outside to the network configured within NAVER Cloud Platform.
Create and set SSL VPN according to the following steps:
a. Create SSL VPN
- In the VPC environment of the NAVER Cloud Platform console, navigate to
> Services > Security > SSL VPN in order. - Click [Create SSL VPN] and create a VPN.
- Creation is complete once the status changes to Running.

- Creation is complete once the status changes to Running.
- Check the VPN access path from the email sent when the SSL VPN creation is completed.
- You must add the SSL VPN access route to the subnet's route table. Be sure to check your email.

- You must add the SSL VPN access route to the subnet's route table. Be sure to check your email.
- Select the SSL VPN you are operating and click [User settings].

- After adding the SSL VPN user information to the user settings window, click [Apply]. Every time you access VPN in the future, you will receive an OTP verification code through your email and SMS.

b. Add VPN range to subnet's route table.
To add VPN range to the subnet's route table:
- In the VPC environment of the NAVER Cloud Platform console, navigate to
> Services > Networking > VPC > Route Table in order.
- You can see that a route table has been created for each subnet of Cloud Hadoop you have created.
- Select the route table you want to access and click [Set routes].

- Enter the following 3 items and create a table entry:
- Destination: SSL VPN's IP pool
- Target Type: SSL VPN
- Target name: SSL VPN created above

- Do the same for the other route tables.
c. Download SSL VPN client
To access the Cloud Hadoop cluster using the created SSL VPN, you need to install a client program.
To download and install the SSL VPN client:
- Download the SSL VPN Agent from Download SSL VPN.
- Unzip and install the client using the .dmg file for mac OS or the .zip file for Windows.
After the installation is complete, you can view the following applications:

In the mac OS Catalina version, error 22, the invalid parameter error, may occur when you attempt to unzip the file. In such case, using programs such as The Unarchiver instead of the default uninstaller (archive utility) will resolve the problem.
d. Run and access SSL VPN client
To access the VPC selected when creating the VPN after running the installed SSL VPN client:
- Run the SSL VPN client you have installed.
- Enter the SSL VPN path received by email when creating the VPN and click [Connect].

Once OTP authentication is complete, you can access the VPC selected when creating the VPN through SSL VPN. If you are accessing the same VPC/Subnet, you only need to perform steps a to d just once.
2. Add fixed IP to ACG
To add a fixed IP to the cluster's ACG:
- In the VPC environment of the NAVER Cloud Platform console, navigate to
> Services > Compute > Server > ACG in order. - Select the ACG of the cluster you want to access and click [ACG settings].
- Enter the following 4 information items and add ACG Rule:
- Protocol: TCP
- Access source: IP of the local device used for SSH communication
- Allowed port: 22
- Note (optional)
SSH connection in the mac OS
It describes the connection method using iTerm2. Even if other programs are used, the same action generates the same outcome.
chmod 400 </path/to/pem-key>
ssh -i </path/to/pem-key> sshuser@<cluster-domain>
sign_and_send_pubkey: If the No mutual signature supported error occurs, add the following contents to the ~/.ssh/config file, and then access it:
Host *
PubkeyAcceptedKeyTypes +ssh-rsa
Access SSH in Windows environment
It describes the connection method using the PuTTY client. Even if other programs are used, the same action generates the same outcome.
Follow the steps below in order:
1. Convert authentication key (pem)
PuTTY does not natively support the private key format (.pem) generated by Cloud Hadoop. You can use the PuTTYgen application provided by PuTTY to convert the authentication key into the format (.ppk) used by PuTTY. The private key must be converted into this format (.ppk) before PuTTY can be used to connect to the edge node.
- Run PuTTYgen. (Download PuTTYgen)
- Select RSA in Type of key to generate and click [Load].
- Select the authentication key (*.pem) and then click [Open].
- To find a file in PEM format, select the option that allows you to see files of all types.
- The PEM file is the file name of the authentication key that is currently applied to the cluster. This PEM file must be stored on the user's local PC.
- If the PEM file is missing, the authentication key for connection can be changed from Console > Manage server access > Manage authentication key for direct cluster access. (See Managing authentication key for direct cluster connection)
- Check the details on the Completion confirmation popup window and then click [OK].
- Click [Save private key] and save it in PPK format so that it can be used in PuTTY.
- If PuTTYgen displays a warning message about saving a key without a password, select [Yes].
- Save it using the same name as the previously generated authentication key. PuTTY automatically adds the .ppk file extension.
2. Access cluster node
- Run PuTTY. (Download PuTTY)
- Select Session in Category and enter as below:
- HostName (or IP address):
sshuser@DNS(Enter the domain address of the cluster inDNSamongsshuser@DNS) - Port:
22
- HostName (or IP address):
- Click Connection > SSH > Auth > Credentials in Category.
- Click [Browse] in Private key file for authentication to select the PPK file created by converting the PEM file, and then click [Open].
- Check if connection to the edge node has been established successfully as follows:

For earlier versions than PuTTY 0.78, Private key file for authentication can be selected in Connection > SSH > Auth.
You can check the private IP and host name of each node in Ambari UI > Hosts. For more information on how to access Ambari UI, see the Ambari UI guide.
-
Connect to the edge node and enter ssh {master node host name} or ssh {master node Private IP} to access the master node (for example, m-001 or m-002).

-
Data nodes (for example, d-001 or d-002) can also be accessed in the same way as the master node. Connect to the edge node and connect to ssh {data node host name} or ssh {data node private IP}.
