<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI. in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189183#M151276</link>
    <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Unsupported key type issue is solved.&lt;/P&gt;&lt;P&gt;Now getting another error in /var/log/krb5kdc.log while accessing storm web ui.&lt;/P&gt;&lt;PRE&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): TGS_REQ (6 etypes {181716232526})127.0.0.1: LOOKING_UP_SERVER: authtime 0,  HTTP/sdssystemmaster2@EXAMPLE.COM for HTTP/ec2-18-114-9-244.compute-1.amazonaws.com@EXAMPLE.COM,Servernot found inKerberos database&lt;BR /&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): closing down fd 13&lt;BR /&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): TGS_REQ (6 etypes {181716232526})127.0.0.1: UNKNOWN_SERVER: authtime 0,  HTTP/sdssystemmaster2@EXAMPLE.COM for krbtgt/COMPUTE-1.AMAZONAWS.COM@EXAMPLE.COM,Servernot found inKerberos database&lt;BR /&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): closing down fd 13&lt;/PRE&gt;</description>
    <pubDate>Mon, 17 Sep 2018 22:56:57 GMT</pubDate>
    <dc:creator>rakesh_satheesa</dc:creator>
    <dc:date>2018-09-17T22:56:57Z</dc:date>
    <item>
      <title>403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189181#M151274</link>
      <description>&lt;P&gt;We have a kerberised hdp cluster ( 2.6.5 ) deployed in AWS. AWS network architecture is in such a way that all the hdp component nodes are under private subnet and the access to them is only via ssh from bastion node which is in public subnet. We have enabled all the web components ( Storm UI, Metron UI, Metron Management UI etc ) available outside via AWS ELB load balancer to the outside world. &lt;/P&gt;&lt;P&gt;
Our kerberos server and kdc admin is available outside via ssh tunneling via bastion node, This is for the external accessing client to authenticate eg : Spengo. &lt;/P&gt;&lt;P&gt;When we access our storm UI via browser with proper step taken for to pass spengo authentication, We are getting 403 error even with proper keytab and principal. &lt;/P&gt;&lt;P&gt;Error getting in /var/log/storm/ui.out in storm UI hosted node &lt;/P&gt;&lt;PRE&gt;Found KeyTab /etc/security/keytabs/spnego.service.keytab for HTTP/sdssystemmaster2@EXAMPLE.COM
Looking for keys for: HTTP/sdssystemmaster2@EXAMPLE.COM
Found unsupported keytype (3) for HTTP/sdssystemmaster2@EXAMPLE.COM
MemoryCache: add 1536315369/301662/8ABC886166F6808EA668D561462EDD37/metron@EXAMPLE.COM to metron@HOST.&lt;/PRE&gt;&lt;P&gt;Steps followed : &lt;/P&gt;&lt;P&gt;
1- Installed kerberos client &lt;/P&gt;&lt;P&gt;2- Copied krb5.conf file from kerberose node to local file krb5.ini and configured &lt;/P&gt;&lt;PRE&gt;[libdefaults]
  renew_lifetime = 7d
  forwardable = true
  default_realm = EXAMPLE.COM
  ticket_lifetime = 24h
  dns_lookup_realm = false
  dns_lookup_kdc = false
  default_ccache_name = /tmp/krb5cc_%{uid}
  #default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
[logging]
  default = FILE:/var/log/krb5kdc.log
  admin_server = FILE:/var/log/kadmind.log
  kdc = FILE:/var/log/krb5kdc.log
[realms]
  EXAMPLE.COM = {
    admin_server = localhost
    kdc = localhost
  }&lt;/PRE&gt;&lt;P&gt;3- Copied keytab file of principal - HTTP/sdssystemmaster2@EXAMPLE.COM &lt;/P&gt;&lt;P&gt;                                                      spnego.service.keytab&lt;/P&gt;&lt;P&gt;3- kinit executed () and ticket seems to be generated fine (screenshot added)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="92425-kerb.png" style="width: 586px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/18582i75A2619A2993E47C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="92425-kerb.png" alt="92425-kerb.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cloudera.com/legacyfs/online/attachments/92424-kerb.png" /&gt;&lt;/P&gt;&lt;P&gt;4- Configured firefox about:config &lt;/P&gt;&lt;PRE&gt;network.negotiate-auth.trusted-uris : loadbalancer-url 
network.negotiate-auth.delegation-uris : loadbalancer-url 
network.negotiate-auth.gsslib : C:\Program Files\MIT\Kerberos\bin\gssapi64.dll 
network.negotiate-auth.using-native-gsslib : false&lt;/PRE&gt;&lt;P&gt;5- Loaded the storm UI &lt;/P&gt;&lt;P&gt;Storm UI spengo Kerberos configuration &lt;/P&gt;&lt;PRE&gt;ui.filter : org.apache.hadoop.security.authentication.server.AuthenticationFilter

ui.filter.params : {'type': 'kerberos', 'kerberos.principal': '{{storm_ui_jaas_principal}}', 'kerberos.keytab':'{{storm_ui_keytab_path}}' , 'kerberos.name.rules': 'DEFAULT'}


storm_ui_keytab : /etc/security/keytabs/spnego.service.keytab
storm_ui_principal_name : HTTP/_HOST@EXAMPLE.COM
&lt;/PRE&gt;</description>
      <pubDate>Sun, 18 Aug 2019 07:45:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189181#M151274</guid>
      <dc:creator>rakesh_satheesa</dc:creator>
      <dc:date>2019-08-18T07:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189182#M151275</link>
      <description>&lt;P&gt;Key type 3 is DES_CBC_MD5, which is pretty much deprecated (see &lt;A href="https://www.opencore.com/blog/2017/3/kerberos-encryption-types/)" target="_blank"&gt;https://www.opencore.com/blog/2017/3/kerberos-encryption-types/)&lt;/A&gt;, but by default Ambari requests/creates keytab entries using this type for backwards compatibility.  Your KDC is probably rejecting keys encrypted with this type. &lt;/P&gt;&lt;P&gt;
To fix this, you should go into the Kerberos service settings and edit the "Encryption Type" value under the "Advanced kerberos-env" section.  The default value is "aes des3-cbc-sha1 rc4 des-cbc-md5". Change it to "aes des3-cbc-sha1 rc4". &lt;/P&gt;&lt;P&gt;You will also want to update the "krb5-conf template" value under "Advanced krb5-conf" to add the following under the "[libdefaults]" section: &lt;/P&gt;&lt;PRE&gt;allow_weak_crypto = false&lt;/PRE&gt;&lt;P&gt;
After saving the changes and restarting the Kerberos service (which ensure the krb5.conf file is synced up), you should restart all of the services. 
If you still see issues, maybe regenerate all keytab files (Admin-&amp;gt;Kerberos) and then restart all services.  However depending on the KDC implementation you may or may not see a change in the generated keytab files.  By default they will look like &lt;/P&gt;&lt;PRE&gt;[root@c7401 ~]# klist -kte /etc/security/keytabs/spnego.service.keytab
Keytab name: FILE:/etc/security/keytabs/spnego.service.keytab
KVNO Timestamp           Principal
---- ------------------- ------------------------------------------------------
   2 09/14/2018 15:06:22 HTTP/c7401.ambari.apache.org@EXAMPLE.COM (des3-cbc-sha1)
   2 09/14/2018 15:06:22 HTTP/c7401.ambari.apache.org@EXAMPLE.COM (des-cbc-md5)
   2 09/14/2018 15:06:22 HTTP/c7401.ambari.apache.org@EXAMPLE.COM (aes128-cts-hmac-sha1-96)
   2 09/14/2018 15:06:22 HTTP/c7401.ambari.apache.org@EXAMPLE.COM (arcfour-hmac)
   2 09/14/2018 15:06:22 HTTP/c7401.ambari.apache.org@EXAMPLE.COM (aes256-cts-hmac-sha1-96)&lt;/PRE&gt;</description>
      <pubDate>Fri, 14 Sep 2018 22:35:22 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189182#M151275</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-09-14T22:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189183#M151276</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Unsupported key type issue is solved.&lt;/P&gt;&lt;P&gt;Now getting another error in /var/log/krb5kdc.log while accessing storm web ui.&lt;/P&gt;&lt;PRE&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): TGS_REQ (6 etypes {181716232526})127.0.0.1: LOOKING_UP_SERVER: authtime 0,  HTTP/sdssystemmaster2@EXAMPLE.COM for HTTP/ec2-18-114-9-244.compute-1.amazonaws.com@EXAMPLE.COM,Servernot found inKerberos database&lt;BR /&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): closing down fd 13&lt;BR /&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): TGS_REQ (6 etypes {181716232526})127.0.0.1: UNKNOWN_SERVER: authtime 0,  HTTP/sdssystemmaster2@EXAMPLE.COM for krbtgt/COMPUTE-1.AMAZONAWS.COM@EXAMPLE.COM,Servernot found inKerberos database&lt;BR /&gt;Sep1708:37:50 ip-10-0-2-8.ec2.internal krb5kdc[1536](info): closing down fd 13&lt;/PRE&gt;</description>
      <pubDate>Mon, 17 Sep 2018 22:56:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189183#M151276</guid>
      <dc:creator>rakesh_satheesa</dc:creator>
      <dc:date>2018-09-17T22:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189184#M151277</link>
      <description>&lt;P&gt;HTTP/sdssystemmaster2@EXAMPLE.COM is not a valid service principal.  The "sdssystemmaster2" part needs to be a FQDN.  Like HTTP/host1.example.com@EXAMPLE.COM.  Where did that value come from?  It is possible that you have a DNS or reverse DNS issue.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 23:11:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189184#M151277</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-09-17T23:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189185#M151278</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;&lt;/P&gt;&lt;P&gt;That principal name is masked.&lt;/P&gt;&lt;P&gt;Actually it is in FQDN format (HTTP/sdssystemmaster2.example.com@EXAMPLE.COM) &lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 13:39:14 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189185#M151278</guid>
      <dc:creator>rakesh_satheesa</dc:creator>
      <dc:date>2018-09-18T13:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189186#M151279</link>
      <description>&lt;P&gt;oops.. sorry about that.  It is not always clear when hostnames are masked and I have seen issues where the hostname was incorrect (for various reasons). &lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 19:47:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189186#M151279</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-09-18T19:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189187#M151280</link>
      <description>&lt;P&gt;Looking at the error message again, it appears that the issue is with the principal name HTTP/ec2-18-114-9-244.compute-1.amazonaws.com@EXAMPLE.COM.  My reason is the same as before... a DNS or reverse DNS issue.  Take a look at the KDC to see if this principal exists.  If you are using an MIT KDC and have access to the host where the KDC is installed, you can find all of the SPNEGO principals by doing:&lt;/P&gt;&lt;PRE&gt;kadmin.local -q list_principals | grep HTTP&lt;/PRE&gt;&lt;P&gt;Ideally they all look similar and the hostname for each of the HTTP/&amp;lt;hostname&amp;gt; principals is an expected hostname.  &lt;/P&gt;&lt;P&gt;Keep in mind that both DNS and reverse DNS need to use the same IP address to DNS name mapping, else issues like this will occur.  &lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 19:59:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189187#M151280</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-09-18T19:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189188#M151281</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;&lt;/A&gt;List of SPNEGO principals&lt;/P&gt;&lt;PRE&gt;HTTP/sdssystemedge.example.com@EXAMPLE.COM
HTTP/sdssystemhdf1.example.com@EXAMPLE.COM
HTTP/sdssystemhdf2.example.com@EXAMPLE.COM
HTTP/sdssystemhdf3.example.com@EXAMPLE.COM
HTTP/sdssystemmaster1.example.com@EXAMPLE.COM
HTTP/sdssystemmaster2.example.com@EXAMPLE.COM
HTTP/sdssystemworker1.example.com@EXAMPLE.COM
HTTP/sdssystemworker2.example.com@EXAMPLE.COM
HTTP/sdssystemworker3.example.com@EXAMPLE.COM
HTTP/sdssystemworker4.example.com@EXAMPLE.COM
&lt;/PRE&gt;&lt;P&gt;Turned off Reverse-DNS by setting rdns=false in krb5.conf file.&lt;/P&gt;&lt;P&gt;But still getting same error &lt;/P&gt;&lt;PRE&gt;HTTP ERROR: 403&lt;BR /&gt;Problem accessing /. Reason:
org.apache.hadoop.security.authentication.client.AuthenticationException&lt;/PRE&gt;&lt;HR /&gt;&lt;P&gt;&lt;EM&gt;&lt;SMALL&gt;Powered by Jetty://&lt;/SMALL&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 14:22:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189188#M151281</guid>
      <dc:creator>rakesh_satheesa</dc:creator>
      <dc:date>2018-09-26T14:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189189#M151282</link>
      <description>&lt;P&gt;Turning off rdns in the krb5.conf wont help.  I am not even sure the property applies to this type of scenario.  The Hadoop libraries do the reverse DNS lookup on their own. &lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 22:17:46 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189189#M151282</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-09-26T22:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189190#M151283</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Could this be a problem related to principal mismatch in client and spengo configuration ? &lt;/P&gt;&lt;P&gt;
When I checked `klist` I could see principal name has HTTP/$loadBalancer@EXAMPLE.COM. Where I actually configured HTTP/_HOST@EXAMPLE.COM in ui.filter.params. Is the browser override the principal name as the host ? Can we bypass that ? &lt;/P&gt;&lt;P&gt;
My Spnego configuration object -&lt;/P&gt;&lt;PRE&gt;{'type': 'kerberos', 'kerberos.principal': 'HTTP/_HOST@EXAMPLE.COM', 'kerberos.keytab':'/etc/security/keytabs/spnego.service.keytab' , 'kerberos.name.rules': 'DEFAULT'} &lt;/PRE&gt;&lt;P&gt;klist output - &lt;/P&gt;&lt;P&gt;klist   
Ticket cache: FILE:/tmp/krb5cc_1000 &lt;/P&gt;&lt;P&gt;  
Default principal: HTTP/sdssystemmaster2.example.com@EXAMPLE.COM             &lt;/P&gt;&lt;PRE&gt;Valid starting       Expires              Service principal                   
2018-09-28T10:12:09  2018-09-29T10:12:09  krbtgt/example.com@EXAMPLE.COM     
2018-09-28T10:22:44  2018-09-29T10:12:09  HTTP/elb.amazonaws.com@                                          2018-09-28T10:22:44  2018-09-29T10:12:09  HTTP/elb.amazonaws.com@EXAMPLE.COM &lt;/PRE&gt;</description>
      <pubDate>Fri, 28 Sep 2018 12:31:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189190#M151283</guid>
      <dc:creator>rakesh_satheesa</dc:creator>
      <dc:date>2018-09-28T12:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189191#M151284</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/86217/rakeshsatheesa.html" nodeid="86217"&gt;@Rakesh S&lt;/A&gt; &lt;/P&gt;&lt;P&gt;In a load balancer scenario, the browser should ask for a Kerberos ticket to access the web server on the load balancer. The load balancer should forward the request on to the real service.  The real service should be able to validate the Kerberos token using the load balancer's principal and keytab entry.  So the load balancer's keytab entry needs to be in the service's configured keytab file. &lt;/P&gt;&lt;P&gt;However for all this to work, the service needs to understand that a load balancer is in the middle and behave properly. So there are some details here, related to Storm that some one familiar with storm needs to answer. For example does Storm support this scenario?&lt;/P&gt;&lt;P&gt;I seem to have lost track of the issue here... the subject of this tread is related to an unsupported key.  I think we solved this and have now moved on to another issue?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 20:56:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189191#M151284</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2018-09-28T20:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189192#M151285</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;&lt;BR /&gt;&lt;P&gt;Thanks for your support&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 13:44:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189192#M151285</guid>
      <dc:creator>rakesh_satheesa</dc:creator>
      <dc:date>2018-10-03T13:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: 403 error with  'unsupported key type'  message upon accessing  spengo enabled storm UI.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189193#M151286</link>
      <description>&lt;P&gt;@Robert Levas : Thanks a lot for the solution, 'unsupported type' issue has been resolved after kerberose config changes. I have raised another issue for storm spenago load balancer related &lt;A href="https://community.hortonworks.com/questions/223614/storm-ui-spengo-configuration-issue-when-accessing.html"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 15:42:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/403-error-with-unsupported-key-type-message-upon-accessing/m-p/189193#M151286</guid>
      <dc:creator>irshadkt_mec</dc:creator>
      <dc:date>2018-10-03T15:42:56Z</dc:date>
    </item>
  </channel>
</rss>

