GitHub user cestella opened a pull request:

    https://github.com/apache/incubator-metron/pull/446

    METRON-707: Correct ansible to execute threat intel bulk loading via the 
flat file script

    Ansible deployments in aws or in vagrant with `threat_intel` turned on will 
fail currently due to an executable renaming.
    
    To test this, run it up in AWS or in vagrant with `threat_intel` turned on 
and after the deployment verify that the `threat_intel` hbase table has data in 
it via `echo "scan 'threatintel'" | hbase shell`

You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/cestella/incubator-metron METRON-707

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/incubator-metron/pull/446.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #446
    
----
commit 2540b151c69d22fa9247d430967c99573d0bb8bb
Author: cstella <ceste...@gmail.com>
Date:   2017-02-08T20:08:35Z

    Fixing threat intel to use the proper command

----


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to