<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question HDP Kerberos enable through Ambari in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233642#M195465</link>
    <description>&lt;P&gt;Hi I have 6 node cluster setup as HDP 2.5 and ambari 2.4&lt;/P&gt;&lt;P&gt;Need to enable Kerberos Security:&lt;/P&gt;&lt;P&gt;Steps Did In ambari server :&lt;/P&gt;&lt;P&gt;1.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.1/bk_security/content/_enabling_kerberos_security_in_ambari.html" target="_blank"&gt;https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.1/bk_security/content/_enabling_kerberos_security_in_ambari.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. Yum install Kerberos and clients in all nodes&lt;/P&gt;&lt;P&gt;3. check /etc/krb.conf and checked on all nodes same files and realms&lt;/P&gt;&lt;P&gt;4. checked acl.file and edited and saved and restarted Kdc again&lt;/P&gt;&lt;P&gt;5. Enabling kerberos in ambari it was throwing error in Test Clients:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error message: &lt;/STRONG&gt;An internal system exception occurred: The 'krb5-conf' configuration is not available&lt;/P&gt;&lt;P&gt;500 status codereceived on POST method for API: /api/v1/clusters/Cluster/requests &lt;/P&gt;</description>
    <pubDate>Fri, 25 Aug 2017 05:47:52 GMT</pubDate>
    <dc:creator>sunilreddykallu</dc:creator>
    <dc:date>2017-08-25T05:47:52Z</dc:date>
    <item>
      <title>HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233642#M195465</link>
      <description>&lt;P&gt;Hi I have 6 node cluster setup as HDP 2.5 and ambari 2.4&lt;/P&gt;&lt;P&gt;Need to enable Kerberos Security:&lt;/P&gt;&lt;P&gt;Steps Did In ambari server :&lt;/P&gt;&lt;P&gt;1.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.1/bk_security/content/_enabling_kerberos_security_in_ambari.html" target="_blank"&gt;https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.1/bk_security/content/_enabling_kerberos_security_in_ambari.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. Yum install Kerberos and clients in all nodes&lt;/P&gt;&lt;P&gt;3. check /etc/krb.conf and checked on all nodes same files and realms&lt;/P&gt;&lt;P&gt;4. checked acl.file and edited and saved and restarted Kdc again&lt;/P&gt;&lt;P&gt;5. Enabling kerberos in ambari it was throwing error in Test Clients:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error message: &lt;/STRONG&gt;An internal system exception occurred: The 'krb5-conf' configuration is not available&lt;/P&gt;&lt;P&gt;500 status codereceived on POST method for API: /api/v1/clusters/Cluster/requests &lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 05:47:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233642#M195465</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-25T05:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233643#M195466</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Did you create an admin principal? Are the krb5.conf file in /etc/krb5.conf? I just did kerberize  a HDP 2.6 an hour ago without any issue what is the OS?&lt;/P&gt;&lt;P&gt; We can quickly resolve that !&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 06:11:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233643#M195466</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-25T06:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233644#M195467</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; Yes I did created principal as admin/admin@host.com and OS is centos 7&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 06:15:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233644#M195467</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-25T06:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233645#M195468</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; If you can share step by step that much heplful to get done. &lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 06:21:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233645#M195468</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-25T06:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233646#M195469</link>
      <description>&lt;P&gt;@Sam Red&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;On the KDC server which can be the same as the Ambari server or any server in the cluster install both rpm's on all&lt;/P&gt;&lt;PRE&gt;# yum install -y krb5-server krb5-workstation  &lt;/PRE&gt;&lt;P&gt;Edit Server Configuration Files&lt;/P&gt;&lt;PRE&gt;cd  /var/kerberos/krb5kdc &lt;/PRE&gt;&lt;P&gt;Edit these 2 files&lt;/P&gt;&lt;PRE&gt;kdc.conf
kadm5.acl &lt;/PRE&gt;&lt;P&gt;Mine are save&lt;/P&gt;&lt;PRE&gt;# cat kadm5.acl 
*/admin@TEST.COM      * &lt;/PRE&gt;&lt;P&gt;# cat kdc.conf&lt;/P&gt;&lt;PRE&gt;[kdcdefaults]
 kdc_ports = 88
 kdc_tcp_ports = 88
[realms]
 TEST.COM = {
  #master_key_type = aes256-cts
  acl_file = /var/kerberos/krb5kdc/kadm5.acl
  dict_file = /usr/share/dict/words
  admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
  supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal camellia256-cts:normal camellia128-cts:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal &lt;/PRE&gt;&lt;P&gt;Edit the Client Configuration&lt;/P&gt;&lt;P&gt;This file should be available on the KDC server edit it and copy it to the same path to all the other nodes&lt;/P&gt;&lt;P&gt;# cat /etc/krb5.conf&lt;/P&gt;&lt;PRE&gt;[libdefaults]
  renew_lifetime = 7d
  forwardable = true
  default_realm = TEST.COM
  ticket_lifetime = 24h
  dns_lookup_realm = false
  dns_lookup_kdc = false
  default_ccache_name = /tmp/krb5cc_%{uid}
  #default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
[domain_realm]
  test.com = TEST.COM
  .test.com = TEST.COM
[logging]
  default = FILE:/var/log/krb5kdc.log
  admin_server = FILE:/var/log/kadmind.log
  kdc = FILE:/var/log/krb5kdc.log
[realms]
  TEST.COM = {
    admin_server = kdc.TEST.com
    kdc = kdc.test.com
  }
 } &lt;/PRE&gt;&lt;P&gt;Note the FQDN&lt;/P&gt;&lt;P&gt;Create the KDC Database&lt;/P&gt;&lt;PRE&gt;# sudo kdb5_util create -s -r TEST.COM &lt;/PRE&gt;&lt;P&gt;Confirm password twice Start and Enable Kerberos&lt;/P&gt;&lt;PRE&gt;# systemctl start krb5kdc kadmin &lt;/PRE&gt;&lt;P&gt;Create Principals&lt;/P&gt;&lt;PRE&gt;# kadmin.local kadmin.local: addprinc root/admin &lt;/PRE&gt;&lt;P&gt;quit&lt;/P&gt;&lt;PRE&gt;# sudo systemctl start krb5kdc kadmin &lt;/PRE&gt; &lt;PRE&gt;# sudo systemctl enable krb5kdc kadmin &lt;/PRE&gt;&lt;P&gt;On the Ambari UI enable Kerberos&lt;/P&gt;&lt;PRE&gt;root/admin@TEST.CH 

password {password_created_earlier}&lt;/PRE&gt;&lt;P&gt;This should take you through the procedure. Make sure the KDC is up and running !&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 06:53:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233646#M195469</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-25T06:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233647#M195470</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;There you go !&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 06:54:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233647#M195470</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-25T06:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233648#M195471</link>
      <description>&lt;P&gt;Thank You.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 23:10:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233648#M195471</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-25T23:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233649#M195472</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; followed all these steps when i am starting Krb5kdc and kadmin I am Getting error like these.&lt;/P&gt;&lt;P&gt;Job for krb5kdc.service failed because the control process exited with error code. See "systemctl status krb5kdc.service" and "journalctl -xe" for details.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 23:58:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233649#M195472</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-25T23:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233650#M195473</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;if you are root the remove the sudo !&lt;/P&gt;&lt;P&gt;What is the output of &lt;/P&gt;&lt;P&gt;# systemctl status krb5kdc.service&lt;/P&gt;&lt;P&gt;The result should be&lt;/P&gt;&lt;PRE&gt;# systemctl status krb5kdc.service
● krb5kdc.service - Kerberos 5 KDC
   Loaded: loaded (/usr/lib/systemd/system/krb5kdc.service; enabled; vendor preset: disabled)
   Active: active (running) since Thu 2017-08-24 15:30:12 CEST; 1 day 4h ago
 Main PID: 23781 (krb5kdc)
   CGroup: /system.slice/krb5kdc.service
           └─23781 /usr/sbin/krb5kdc -P /var/run/krb5kdc.pid
Aug 24 15:30:12 bombay.test.com systemd[1]: Starting Kerberos 5 KDC...
Aug 24 15:30:12 bombay.test.com systemd[1]: Started Kerberos 5 KDC&lt;/PRE&gt;&lt;P&gt;Please let me know &lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 00:38:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233650#M195473</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-26T00:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233651#M195474</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; Thank you so much for your help. These are the configs i specified On ambari server&lt;/P&gt;&lt;P&gt;Configs here :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;kdc.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[kdcdefaults] &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; kdc_ports = 88 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; kdc_tcp_ports = 88
[realms] &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RELAY.COM = {
  #master_key_type = aes256-cts &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  acl_file = /var/kerberos/krb5kdc/kadm5.acl &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  dict_file = /usr/share/dict/words &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cat kadm5.acl&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;* /admin@RELAY.COM *&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[libdefaults]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;
  renew_lifetime = 7d &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  forwardable = true
  default_realm = RELAY.COM &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  ticket_lifetime = 24h &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  dns_lookup_realm = false &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  dns_lookup_kdc = false &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  default_ccache_name = /tmp/krb5cc_%{uid} &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  #default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[logging]
  default = FILE:/var/log/krb5kdc.log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  admin_server = FILE:/var/log/kadmind.log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  kdc = FILE:/var/log/krb5kdc.log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[realms] &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RELAY.COM = &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;{
    admin_server = RELAY.COM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;    kdc = IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;    kdc = IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;    kdc = IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;    kdc = IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;    kdc = IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;    kdc = IP &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;
  }&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;krb5kdc.service - Kerberos 5 KDC &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;   Loaded: loaded (/usr/lib/systemd/system/krb5kdc.service; enabled; vendor preset: disabled) &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;   Active: failed (Result: exit-code) since Fri 2017-08-25 10:53:48 PDT; 3s ago &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  Process: 22602 ExecStart=/usr/sbin/krb5kdc -P /var/run/krb5kdc.pid $KRB5KDC_ARGS (code=exited, status=1/FAILURE)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;
 Main PID: 1911 (code=exited, status=0/SUCCESS) &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Aug 25 10:53:48  systemd[1]: Starting Kerberos 5 KDC... &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Aug 25 10:53:48  krb5kdc[22602]: krb5kdc: cannot initialize realm RELAY.COM - see log file for details&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;
Aug 25 10:53:48 : krb5kdc.service: control process exited, code=exited status=1 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Aug 25 10:53:48: Failed to start Kerberos 5 KDC. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Aug 25 10:53:48  Unit krb5kdc.service entered failed state.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;
Aug 25 10:53:48  krb5kdc.service failed.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 00:56:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233651#M195474</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-26T00:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233652#M195475</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;1) By the looks your /etc/krb5.conf doesn't look right. In the case your REALM is RELAY please follow strictly the below notice some are upper and lower case and also the .relay in teh domain_realm section. &lt;/P&gt;&lt;PRE&gt;[libdefaults]
  renew_lifetime = 7d
  forwardable = true
  default_realm = RELAY.COM
  ticket_lifetime = 24h
  dns_lookup_realm = false
  dns_lookup_kdc = false
  default_ccache_name = /tmp/krb5cc_%{uid}
  #default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
[domain_realm]
  relay.com = RELAY.COM
  .relay.com = RELAY.COM
[logging]
  default = FILE:/var/log/krb5kdc.log
  admin_server = FILE:/var/log/kadmind.log
  kdc = FILE:/var/log/krb5kdc.log
[realms]
  RELAY.COM = {
    admin_server = gulu.relay.com
    kdc = gulu.relay.com
  } &lt;/PRE&gt;&lt;P&gt;2) I see many entries where do the come from its wrong, there shouldn't be any entries except if you have a kerberos HA setup for the failover KDC &lt;/P&gt;&lt;PRE&gt;kdc = IP 
kdc = IP 
kdc = IP 
kdc = IP 
kdc = IP 
kdc = IP &lt;/PRE&gt;&lt;P&gt;3) Were the keytabs created correctly in /etc/security/keytabs/* ? &lt;/P&gt;&lt;P&gt;Can you grab a valid kerberos ticket in the below example I first list the principal available for user opera1 whos keytab is opera1.keytab &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;List principal for opera1 &lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;# klist -kt /etc/security/keytabs/opera1.keytab 
Keytab name: FILE:/etc/security/keytabs/opera1.keytab 
KVNO Timestamp Principal ---- ------------------- 
1 08/24/2017 18:28:26 opera1@RELAY.COM &lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;Grab a kerberos ticket &lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;# kinit -kt /etc/security/keytabs/opera1.keytab opera1@RELAY.COM &lt;/PRE&gt;&lt;P&gt;List the kerberos ticket to see validity &lt;/P&gt;&lt;PRE&gt;# klist 
Ticket cache: FILE:/tmp/krb5cc_0 
Default principal: opera1@RELAY.COM 
Valid starting          Expires           Service principal 
08/25/2017 20:33:43 08/26/2017 20:33:42 krbtgt/RELAY.COM@RELAY.COM &lt;/PRE&gt;&lt;P&gt;Please let me know &lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 01:47:46 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233652#M195475</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-26T01:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233653#M195476</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; looks like there will be lot of mess up on my cluster. I follow same steps not able to do kinit.&lt;/P&gt;&lt;P&gt;kinit: Client 'host/*@RELAY.COM' not found in Kerberos database while getting initial credentials&lt;/P&gt;&lt;P&gt;How do i reset everything and re do from Scratch&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 03:55:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233653#M195476</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-26T03:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233654#M195477</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Panic NOT &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Just to be sure of the step you took.&lt;/P&gt;&lt;P&gt;1. Did the Ambari kerberization succeed with errors?&lt;/P&gt;&lt;P&gt;2. Can you paste the contents of /etc/security/keytabs/*&lt;/P&gt;&lt;P&gt;3. Can you list principals in the KDC database?&lt;/P&gt;&lt;PRE&gt;# kadmin.local
kadmin.local: listprincs&lt;/PRE&gt;&lt;P&gt;4.Did you make the changes I pointed out earlier&lt;/P&gt;&lt;P&gt;5.  Can you share the files the below files remember to scramble the private details &lt;/P&gt;&lt;PRE&gt;/etc/krb5.conf
/var/kerberos/krb5kdc/kdc.conf
/var/kerberos/krb5kdc/kadm5.acl&lt;/PRE&gt;&lt;P&gt;6. Can you validate that service keytabs were create on all host in /etc/security/keytabs/* where  service like  YARN,Zookeeper or ranger are installed. &lt;/P&gt;&lt;P&gt;Please revert&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 04:21:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233654#M195477</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-26T04:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233655#M195478</link>
      <description>&lt;P&gt;1. yes&lt;/P&gt;&lt;P&gt;2. -bash: cd: /etc/security/keytabs/*: No such file or directory&lt;/P&gt;&lt;P&gt;3. kadmin.local: Can not fetch master key (error: No such file or directory). while initializing kadmin.local interface&lt;/P&gt;&lt;P&gt;4. Yes&lt;/P&gt;&lt;PRE&gt;[kdcdefaults]
 kdc_ports = 88
 kdc_tcp_ports = 88
[realms]
 RELAY.COM = {
  #master_key_type = aes256-cts
  acl_file = /var/kerberos/krb5kdc/kadm5.acl
  dict_file = /usr/share/dict/words
  admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
  

&lt;BR /&gt;&lt;/PRE&gt;&lt;PRE&gt;[libdefaults]
  renew_lifetime = 7d
  forwardable = true
  default_realm = RELAY.COM
  ticket_lifetime = 24h
  dns_lookup_realm = false
  dns_lookup_kdc = false
  default_ccache_name = /tmp/krb5cc_%{uid}
  #default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5


[domain_realm]
  host.com = RELAY.COM
  .host.com = RELAY.COM 
[logging]
  default = FILE:/var/log/krb5kdc.log
  admin_server = FILE:/var/log/kadmind.log
  kdc = FILE:/var/log/krb5kdc.log


[realms]
  RELAY.COM = {
    admin_server = ambari and kerberos hostname where installed
    kdc = host
  }


&lt;BR /&gt;&lt;/PRE&gt;&lt;PRE&gt;* /admin@RELAY.COM *&lt;BR /&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Aug 2017 04:20:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233655#M195478</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-29T04:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233656#M195479</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution to issue No.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you kerberized the cluster using the Ambari tool then the keytabs MUST have been generated under &lt;STRONG&gt;/etc/security/keytabs&lt;/STRONG&gt; can you validate that you have the keytabs by running the below command as root,you should see a couple of keytabs&lt;/P&gt;&lt;PRE&gt;# ls -al  /etc/security/keytabs&lt;/PRE&gt;&lt;P&gt;Solution to issue No.3&lt;/P&gt;&lt;P&gt;Notice you have to logon to kadmin interface as user&lt;STRONG&gt; root&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If your previously run the  &lt;STRONG&gt;sudo yum install -y  &lt;/STRONG&gt;&lt;STRONG&gt;krb5-server krb5-libs krb5-workstation&lt;/STRONG&gt; then kadmin was installed  see attached my intercation with kadmin my kdc host FQDN is &lt;STRONG&gt;osaka.test.com&lt;/STRONG&gt;  and my REALM is &lt;STRONG&gt;TEST&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Solution to issue No.4&lt;/P&gt;&lt;P&gt;I can already see some error in your &lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt; &lt;/A&gt;/etc/krb5.conf it should look like this. I have adjusted the correct entries but you need to change ONLY the 2 entries of FQDN_of_KDC with the below output from the server where you install the KDC server&lt;/P&gt;&lt;PRE&gt;# hostname -f&lt;/PRE&gt;&lt;P&gt;Your /etc/krb5.conf should look like this &lt;/P&gt;&lt;PRE&gt;[libdefaults]
  renew_lifetime = 7d
  forwardable = true
  default_realm = RELAY.COM
  ticket_lifetime = 24h
  dns_lookup_realm = false
  dns_lookup_kdc = false
  default_ccache_name = /tmp/krb5cc_%{uid}
  #default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5
[domain_realm]
  relay.com = RELAY.COM
  .relay.com = RELAY.COM 
[logging]
  default = FILE:/var/log/krb5kdc.log
  admin_server = FILE:/var/log/kadmind.log
  kdc = FILE:/var/log/krb5kdc.log
[realms]
  RELAY.COM = {
    admin_server = FQDN_of_KDC
    kdc = FQDN_of_KDC
  }&lt;/PRE&gt;&lt;P&gt;Please let me know if you need !&lt;/P&gt;&lt;BR /&gt;&lt;IMG src="https://community.cloudera.com/t5/image/serverpage/image-id/7611i31DC2781DE6A5088/image-size/large?v=1.0&amp;amp;px=999" border="0" alt="samred.jpg" title="samred.jpg" /&gt;</description>
      <pubDate>Tue, 29 Aug 2017 14:33:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233656#M195479</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-29T14:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233657#M195480</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;&lt;P&gt;Thank you for your time. I tried with different ways. Now i am able to start kadmin and enabled too. Able to get generate Principals.&lt;/P&gt;&lt;PRE&gt;[root@Host krb5kdc]# kadmin.local
Authenticating as principal root/admin@RELAY.COM with password.
kadmin.local: 
&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;when i do keytab file to generate&lt;/P&gt;&lt;PRE&gt;ls: cannot access /etc/security/keytabs: No such file or directory&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;I do Klist it says empty.&lt;/P&gt;&lt;P&gt;After I do all these I went to ambari and enable kerberos and selected as existing KDC and Principal as root/admin@RELAY.COM and password that we generated when we creating these principal.&lt;/P&gt;&lt;P&gt;Still in test client is is failed.&lt;/P&gt;&lt;P&gt;Error in KDC Host :&lt;/P&gt;&lt;PRE&gt;2017-08-29 11:04:22,427 - Failed to create principal, phddata-08291@RELAY.COM - Failed to create service principal for phddata-08291@RELAY.COM
STDOUT: Authenticating as principal root/admin@RELAY.COM with password.
Password for root/admin@RELAY.COM: 
Enter password for principal "phddata-08291@RELAY.COM": 
Re-enter password for principal "phddata-08297@RELAY.COM": 

STDERR: WARNING: no policy specified for phddata-08291@RELAY.COM; defaulting to no policy
add_principal: Operation requires ``add'' privilege while creating "phddata-08291@RELAY.COM".
&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Aug 2017 01:08:11 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233657#M195480</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-30T01:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233658#M195481</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;  &lt;/P&gt;&lt;P&gt;Thank you. I am able to resolve the issue.&lt;/P&gt;&lt;P&gt;there is space between * / like these. I just edited it to */admin@RELAY.COM * then i am able to do test clients. &lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 01:48:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233658#M195481</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-30T01:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233659#M195482</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt; I am happy we have advanced at times it such trivial things like extra space or the [domain_realm] you forgot that messes us up but once we have gone through it, we have the memories &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I am NOT yes sure why you can't find the keytabs , once again let's give it this try sequentially.&lt;/P&gt;&lt;P&gt;Once on the console as root check my steps&lt;/P&gt;&lt;PRE&gt;[root@gulu ~]# cd /etc/security/keytabs/
[root@gulu keytabs]# ls
activity-analyzer.headless.keytab  ams-hbase.regionserver.keytab  hbase.service.keytab    knox.service.keytab  rangeradmin.service.keytab     smokeuser.headless.keytab activity-explorer.headless.keytab  ams-zk.service.keytab&lt;/PRE&gt;&lt;P&gt;You should definitely see many keytabs here or try &lt;/P&gt;&lt;PRE&gt;# locate  hive.service.keytab&lt;/PRE&gt;&lt;P&gt;The issue of Failed to create principal, phddata-08291@RELAY.COM  I tried adding the principal in my KDC see&lt;/P&gt;&lt;PRE&gt;# kadmin.local
Authenticating as principal root/admin@TEST.COM with password.
kadmin.local:  addprinc phddata-08291@TEST.COM
WARNING: no policy specified for phddata-08291@TEST.COM; defaulting to no policy
Enter password for principal "phddata-08291@TEST.COM": xxxxxx &lt;/PRE&gt;&lt;P&gt;In the above, the password for phddata-08291@TEST.COM is the KDC password and you got to confirm it twice. &lt;/P&gt;&lt;P&gt;To generate the keytab for user&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;phddata-08291&lt;/STRONG&gt;  do the following as root an invoke the &lt;STRONG&gt;ktutil&lt;/STRONG&gt; (keytab utility) on the KDC&lt;/P&gt;&lt;PRE&gt;# cd /etc/security/keytabs
# sudo ktutil 
ktutil: addent -password -p phddata-08291@TEST.COM -k 1 -e RC4-HMAC 
Password for phddata-08291@TEST.COM: xxxx
ktutil: wkt phddata-08291.keytab 
ktutil: q 
# chown phddata-08291:phddata-08291 phddata-08291.keytab&lt;/PRE&gt;&lt;P&gt;Infact you can copy and pass these commands in ktutil  and give the password you earlier created, the &lt;STRONG&gt;phddata-08291.keytab&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;should be visible in /etc/security/keytabs but owned by &lt;B&gt;root:root&lt;/B&gt; until you run the last chown command&lt;/P&gt;&lt;P&gt;I hope that helps you and remember to reward  me if that works ,I am sure it will work &lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 02:52:11 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233659#M195482</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-30T02:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233660#M195483</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Thank You. I am able to resolve the issues and now we are finally kerberized the cluster.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 03:07:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233660#M195483</guid>
      <dc:creator>sunilreddykallu</dc:creator>
      <dc:date>2017-08-30T03:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: HDP Kerberos enable through Ambari</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233661#M195484</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/28152/sunilreddykallur.html"&gt;Sam Red&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I told you ....:-)  now pat my back with a reward the beer is for next time  !!!!!  Enjoy Hadoop&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 03:10:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-Kerberos-enable-through-Ambari/m-p/233661#M195484</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2017-08-30T03:10:03Z</dc:date>
    </item>
  </channel>
</rss>

