Skip to main content
Version: 1.3.1.0

Network Requirements

A well-configured network is essential for ODP cluster stability and performance. This page covers DNS, NTP, firewall, and Kerberos KDC connectivity requirements.

DNS Requirements

Forward and Reverse DNS Resolution

All nodes in an ODP cluster must have valid forward DNS (hostname to IP) and reverse DNS (IP to hostname) resolution. This is a hard requirement for:

  • Kerberos principal binding (service principals are tied to fully qualified domain names)
  • HDFS NameNode to DataNode communication
  • YARN ResourceManager to NodeManager communication
  • Ambari agent registration

Verify DNS resolution on each node:

# Forward lookup
host $(hostname -f)

# Reverse lookup
host $(hostname -i)

Both lookups must return consistent results. The hostname returned by hostname -f must match the reverse DNS entry for the node's IP.

For clusters with more than a few nodes, manage DNS through a proper DNS server (e.g., FreeIPA/BIND, Microsoft Active Directory DNS). Using /etc/hosts is acceptable only for lab or test environments and does not scale.

Hostname Requirements

  • Use fully qualified domain names (FQDNs) such as master01.cluster.example.com
  • Do not use single-label hostnames (e.g., master01 alone)
  • Avoid hostnames with underscores (_); use hyphens (-) instead — some components (Kerberos, Java SSL) reject underscores in hostnames

NTP Requirements

All cluster nodes must have their clocks synchronized via NTP. Clock skew greater than 5 minutes will cause Kerberos ticket validation to fail, resulting in authentication errors across all Kerberized services.

Recommended NTP configuration:

  • Use chrony (preferred on RHEL 9) or ntpd
  • Point all cluster nodes to the same NTP source or internal NTP server
  • Verify synchronization: chronyc tracking or ntpstat
# Install and enable chrony (RHEL 9 / Rocky Linux 9)
dnf install -y chrony
systemctl enable --now chronyd
chronyc tracking

Firewall Port Reference

The following table lists the key ports required for ODP services. Configure your firewall (firewalld, iptables, or security groups) to allow these ports between the relevant node types.

Core Infrastructure

ServicePortProtocolDirection
Ambari Server Web UI8080TCPClient → Ambari Server
Ambari Server Web UI (HTTPS)8442TCPClient → Ambari Server
Ambari Agent8670TCPAmbari Server → All nodes
ZooKeeper client2181TCPAll nodes → ZooKeeper nodes
ZooKeeper peer2888, 3888TCPZooKeeper → ZooKeeper

HDFS

ServicePortProtocolDirection
NameNode RPC8020TCPAll nodes / clients → NameNode
NameNode HTTP UI9870TCPAdmin → NameNode
NameNode HTTPS UI9871TCPAdmin → NameNode
DataNode data transfer9866TCPNameNode / clients → DataNode
DataNode HTTP UI9864TCPAdmin → DataNode
JournalNode8485TCPNameNode → JournalNode
note

Port 50070 (legacy NameNode HTTP) and 50010 (legacy DataNode) were replaced in Hadoop 3.x by 9870 and 9866 respectively.

YARN

ServicePortProtocolDirection
ResourceManager Web UI8088TCPClient → ResourceManager
ResourceManager Scheduler8030TCPNodeManager → ResourceManager
NodeManager8042TCPClient / RM → NodeManager
Job History Server19888TCPClient → History Server
Timeline Server8188TCPClient → ATS

Hive

ServicePortProtocolDirection
HiveServer2 (JDBC/ODBC)10000TCPClient → HiveServer2
HiveServer2 (HTTP)10001TCPClient → HiveServer2
Hive Metastore9083TCPHiveServer2 / Spark → Metastore

HBase

ServicePortProtocolDirection
HBase Master16000TCPRegionServer → Master
HBase Master Web UI16010TCPAdmin → HBase Master
RegionServer16020TCPClient → RegionServer
RegionServer Web UI16030TCPAdmin → RegionServer

Security Services

ServicePortProtocolDirection
Ranger Admin Web UI6080TCPClient → Ranger
Ranger Admin Web UI (HTTPS)6182TCPClient → Ranger
Knox Gateway (HTTPS)8443TCPExternal client → Knox
Atlas Web UI (HTTP)21000TCPClient → Atlas
Atlas Web UI (HTTPS)21443TCPClient → Atlas

Kafka

ServicePortProtocolDirection
Kafka Broker6667TCPProducer / Consumer → Broker
Kafka Broker (SSL)6668TCPProducer / Consumer → Broker

NiFi

ServicePortProtocolDirection
NiFi Web UI (HTTPS)9090TCPClient → NiFi
NiFi Site-to-Site10000TCPNiFi → NiFi (if clustered)

Polaris REST Catalog

ServicePortProtocolDirection
Polaris REST API8181TCPSpark / Trino → Polaris

Kudu

ServicePortProtocolDirection
Kudu Master RPC7051TCPClient / TabletServer → Master
Kudu Master Web UI8051TCPAdmin → Kudu Master
Kudu TabletServer RPC7050TCPClient → TabletServer
Kudu TabletServer Web UI8050TCPAdmin → TabletServer

Kerberos KDC Connectivity

In a Kerberos-secured ODP cluster, all nodes must be able to reach the Kerberos Key Distribution Center (KDC). ODP supports both MIT Kerberos and FreeIPA (which embeds MIT Kerberos).

ServicePortProtocolDirection
Kerberos KDC88TCP + UDPAll nodes → KDC
Kerberos admin749TCPAmbari Server → KDC admin
FreeIPA LDAP389TCPAmbari / Ranger → FreeIPA
FreeIPA LDAPS636TCPAmbari / Ranger → FreeIPA

Requirements:

  • All cluster nodes must be able to resolve the KDC hostname and reach port 88 (both TCP and UDP)
  • Ambari Server must be able to reach the KDC admin port (749) to create service principals during the Enable Kerberos wizard
  • If using FreeIPA, Ranger UserSync must be able to reach the LDAP port (389 or 636) for user/group synchronization

Clock Skew

Kerberos is highly sensitive to clock skew. The maximum allowed skew between a client and the KDC is 300 seconds (5 minutes) by default. Ensure NTP synchronization is in place across all nodes before enabling Kerberos (see NTP Requirements above).