Set up Watson Studio Local
After you install Watson Studio Local, you can configure it in the following ways.
- Generating a self-signed certificate
- Configure Watson Studio Local settings and users
- Configure Watson Studio Local to work with the HDP or CDH cluster
- Configure Watson Studio Local to work with Microsoft Azure VMs
- Optional configuration settings
Generating a self-signed certificate
If you need to enable an HTTPS connection to the Watson Studio Local web client with your own SSL certificate and private key (both in PEM format) rather than the default, complete the following steps:
- Generate a 2048 bit DES3 RSA key by entering the following
# openssl genrsa -des3 -out server.key 2048
- Generate a certificate using the key that you just created earlier by entering the following
Keep the challenge password entry blank by pressing Enter. Confirm that the
# openssl req -new -key server.key -out server.csr
- Create a new server.key based on the first server.key you created. This process eliminates the
password. Use the following
# cp server.key server.key.org # openssl rsa -in server.key.org -out server.key
- Create a new certificate using the new key you created in the previous step by entering the
Confirm that you now have a new server.key and a new server.crt that was created.
# openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
- Create a subdirectory called mycert and move both the certificate and key files to that directory.
# openssl x509 -noout -text -in ./cert.crty
Verify that the private key and the key used by the certificate match.
Configure Watson Studio Local settings and users
To configure Watson Studio Local, complete the following steps:
- By default, you can sign in to the Watson Studio Local client by using
your high availability proxy IP address, for example,
https://184.108.40.206.Optional: In the local DNS server, you can add an entry to resolve to the HA proxy IP address. For example:
220.127.116.11 ibm-nginx-svc. As a result, you are able to sign in to the Watson Studio Local client through the
- Open the Admin Console by signing into the Watson Studio Local client
from a web browser and switching to Admin Console.
- In the Admin Console, click the Menu icon ( ) and click User Management. Edit the admin user to set an email address and change the password for the primary administrator.
- You can configure a connection to your SMTP server so that Watson Studio Local can send email to users and admins. Watson Studio Local sends emails to users when they are given access to Watson Studio Local and to administrators when a new user signs up for Watson Studio Local, an alert is triggered, or an application setting, such as the
alert threshold, is changed.
To enable Watson Studio Local to send email:
- From your username, select Settings.
- In the SMTP settings section, specify the following information:
- The SMTP mail server address.
- The port number of your SMTP server.Important: If you specify a secure port, you must select Use SSL encryption. If you specify a secure port but do not select this option, Watson Studio Local cannot communicate with your SMTP server.
- Depending on your SMTP server, you might need to specify your SMTP credentials:
- If your SMTP server doesn't have a mailer daemon, you must specify an SMTP username and password.
- If you SMTP server does have a mailer daemon, communications from Watson Studio Local are associated with the mailer daemon account automatically. To associate communications with a specific account instead, provide the credentials for that account.
- Click Save. If your SMTP configuration is successful, you receive a confirmation email.
- Add users or set up an LDAP server. See Manage users for details.
- Switch to the Watson Studio Local client.
- Verify that the sample notebooks display successfully. Create a test project.
Configure Watson Studio Local to work with the HDP or CDH cluster
If your HDP or CDH cluster does not use security, then just ensure Watson Studio Local can access it. No additional configuration is needed.
To configure Watson Studio Local to work with a secure HDP or CDH cluster, complete the following steps:
- In the Watson Studio Local master node, run the
/wdp/utils/add_endpoint.shscript to add the certificate to securely connect to the HDP or CDH cluster. Additionally, you can run the script to set up the default Livy endpoint for the Watson Studio Local cluster. Example:
./add_endpoint.sh --knox-url=https://9.87.654.323:8443 --addcert ./add_endpoint.sh --knox-url=https://9.87.654.323:8443 --livy-url=https://9.87.654.323:8443/gateway/dsx/livy/v1 --addcert
https://9.87.654.323:8443/gateway/dsx/livy2/v1represents the secure Livy endpoint that is defined in
dsx.xml. As a result, the script automatically creates a
Alternatively, in the Admin Console, click the menu icon ( ) and click Scripts. In the Script pull-down menu, select Add the default Livy endpoint for Watson Studio (add_endpoint.sh) to perform the same tasks.
- Restart your Jupyter kernel and Zeppelin interpreter to pick up the new certificates.
- To ensure the same usernames exist in both Watson Studio Local and HDP or CDH, set up the HDP or CDH LDAP server in Watson Studio Local. See Manage users for details.
Configure Watson Studio Local to work with Microsoft Azure VMs
For users to access the Watson Studio Local client, you must make all three private IP addresses for the three master nodes (either from the three node or nine node configuration) accessible. Complete the following steps on each master node:
- In the /wdp/k8s/dsx-local-proxy/k8s/ directory, back up nginx-service.yaml to nginx-service.yaml.orig.
- Edit nginx-service.yaml and change the IP addresses to the three private IP
addresses of the three master nodes (follow the same format as in the file, and ensure each IP is on
a separate line). Example:
( externalIPs: 10.0.0.100 10.0.0.7 10.0.0.8 10.0.0.9)
- Run the command: kubectl delete -f nginx-service.yaml.orig --namespace=ibm-private-cloud
- Run the command: kubectl create -f nginx-service.yaml --namespace=ibm-private-cloud
- Test for an HTML response by running the command: curl -k https://
- Order a Load Balancer within Azure, and set up the Load Balancer for HTTPs (port 443) to point to the three private IP interfaces of the three master nodes.
Optional configuration settings
In the Watson Studio Local client, an administrator can optionally adjust when alerts are generated, how long log files and metrics are stored, and how frequently the metrics on the dashboard are refreshed.
To configure refresh and retention settings:
- From the Admin user profile icon, select Settings.
- In the Refresh and alert settings, adjust the appropriate settings:
- Log retention (days)
- The number of days to keep logs before they are automatically deleted. The default is 10 days.
- Metrics retention (days)
- Number of days to keep metrics history (such as the CPU and memory usage shown in the dashboard) before they are automatically deleted. The default is 1 day. Note that if you increase the retention period and increase the frequency with which the dashboard metrics are refreshed, you use much storage in the Mongo database where metrics are stored.
- Dashboard refresh (seconds)
- The frequency with which the data in the admin dashboard is refreshed. The default is 10 seconds
- Alert threshold (%)
- The usage threshold at which an alert is triggered. When the usage reaches this threshold, the node color immediately changes to red. The alert is generated if the usage stays above the threshold longer than the time that is specified for the Alert length threshold setting. The default is 90%.
- Alert warning threshold (%)
- The usage threshold at which a warning is triggered and the node color changes to yellow. The default is 70%.
- Alert time threshold (minutes)
- The length of time that must elapse before an alert is generated. For example, if CPU usage goes above 90% for 30 seconds during a complex computation, you probably don't need to be alerted. But if CPU usage stays above 90% for 5 minutes, it might be cause for concern.
- Click Save.