GitHub user cestella opened a pull request: https://github.com/apache/incubator-metron/pull/446
METRON-707: Correct ansible to execute threat intel bulk loading via the flat file script Ansible deployments in aws or in vagrant with `threat_intel` turned on will fail currently due to an executable renaming. To test this, run it up in AWS or in vagrant with `threat_intel` turned on and after the deployment verify that the `threat_intel` hbase table has data in it via `echo "scan 'threatintel'" | hbase shell` You can merge this pull request into a Git repository by running: $ git pull https://github.com/cestella/incubator-metron METRON-707 Alternatively you can review and apply these changes as the patch at: https://github.com/apache/incubator-metron/pull/446.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #446 ---- commit 2540b151c69d22fa9247d430967c99573d0bb8bb Author: cstella <ceste...@gmail.com> Date: 2017-02-08T20:08:35Z Fixing threat intel to use the proper command ---- --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---