Using JupyterHub in Big Data Service 3.0.26 or Earlier

Use JupyterHub to manage Big Data Service 3.0.26 or earlier ODH 1.x notebooks for groups of users.

Prerequisites

Before JupyterHub can be accessed from a browser, an administrator must:

  • Make the node available to incoming connections from users. The node's private IP address needs to be mapped to a public IP address. Alternatively, the cluster can be set up to use a bastion host or Oracle FastConnect. See Connecting to Cluster Nodes with Private IP Addresses.
  • Open port 8000 on the node by configuring the ingress rules in the network security list. See Defining Security Rules.

JupyterHub Default Credentials

The default admin sign-in credentials for JupyterHub in Big Data Service 3.0.21 and earlier are:

  • Username: jupyterhub
  • Password: Apache Ambari admin password. This is the cluster admin password that was specified when the cluster was created.
  • Principal name for HA cluster: jupyterhub
  • Keytab for HA cluster: /etc/security/keytabs/jupyterhub.keytab

The default admin sign-in credentials for JupyterHub in Big Data Service 3.0.22 through 3.0.26 are:

  • User name: jupyterhub
  • Password: Apache Ambari admin password. This is the cluster admin password that was specified when the cluster was created.
  • Principal name for HA cluster: jupyterhub/<FQDN-OF-UN1-Hostname>
  • Keytab for HA cluster: /etc/security/keytabs/jupyterhub.keytab
    Example:
    Principal name for HA cluster: jupyterhub/pkbdsv2un1.rgroverprdpub1.rgroverprd.oraclevcn.com
              Keytab for HA cluster: /etc/security/keytabs/jupyterhub.keytab 

The admin creates additional users and their sign-in credentials, and provides the sign-in credentials to those users. For more information, see Manage Users and Permissions.

Note

Unless explicitly referenced as some other type of administrator, the use of administrator or admin throughout this section refers to the JupyterHub administrator, jupyterhub.

Accessing JupyterHub

Access JupyterHub through the browser for Big Data Service 3.0.26 or earlier clusters. The JupyterHub is accessed in a browser after the prerequisites are met.
  1. Open a browser window.
  2. Enter a URL in the following format:
    https://<node_ip_address>:8000

    Example:

    https://192.0.2.0:8000
  3. Sign in with your credentials.
    If you're an admin user: Use the default admin credentials, or create a new admin user.
    If you're a non-admin user: Sign up from the Sign Up page. An admin user must authorize the new signed up user. After authorization, user can sign in.

Alternatively, you can access the JupyterHub link from the Cluster details page under Cluster URLs.

You can also create a Load Balancer to provide a secure front end for accessing services, including JupyterHub. See Connecting to Services on a Cluster Using Load Balancer.

Spawning Notebooks

Manage JupyterHub

A JupyterHub admin user can perform the following tasks to manage notebooks in JupyterHub on Big Data Service 3.0.26 or earlier ODH 1.x nodes.

Integrate with Object Storage

Integrate Spark with Object Storage for use with Big Data Service clusters.

In JupyterHub, for Spark to work with Object Storage you must define some system properties and populate them into the spark.driver.extraJavaOption and spark.executor.extraJavaOptions properties in Spark configs.

Manage Users and Permissions

Use one of the two authentication methods to authenticate users to JupyterHub so that they can create notebooks, and optionally administer JupyterHub.

By default, ODH 1.x clusters support native authentication. But, authentication for JupyterHub and other big data services must be handled differently. To spawn single user notebooks, the user signing in to JupyterHub needs to be present on the Linux host and needs to have permissions to write to the root directory in HDFS. Otherwise, the spawner fails as the notebook process is triggered as the Linux user.

For information on native authentication, see Native Authentication.

For information on LDAP authentication for Big Data Service 3.0.26 or earlier, see LDAP Authentication.

Integrate with Trino