<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos High Availability Functionality Testing in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239933#M201739</link>
    <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/231263/%E2%80%8B@harish"&gt;@harish&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Yes for sure, that's doable I am assuming you have set up 2 kdc's on different networks but accessible to the cluster, &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;&lt;STRONG&gt;Assumptions:&lt;/STRONG&gt; &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;You MUST have successfully configure the 2 master and slave KDC's&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;my realm =REALM
Master host=master-kdc.test.com
Slave host=slave-kdc.test.com &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;EM&gt;Contents of /var/kerberos/krb5kdc/kpropd.acl: &lt;/EM&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;host/master-kdc.test.com@REALM
host/slave-kdc.test.com@REALM &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Create the configuration for kpropd on both the Master and Slave KDC hosts: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Create /etc/xinetd.d/krb5_prop with the following contents. &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;service krb_prop
{
        disable         = no
        socket_type     = stream
        protocol        = tcp
        user            = root
        wait            = no
        server          = /usr/sbin/kpropd
} &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Configure xinetd to run as a persistent service on both the Master and Slave KDC hosts: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# systemctl enable xinetd.service
# systemctl start xinetd.service &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Copy the following files from the Master KDC host to the Slave KDC host: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;/etc/krb5.conf 
/var/kerberos/krb5kdc/kadm5.acl 
/var/kerberos/krb5kdc/kdc.conf 
/var/kerberos/krb5kdc/kpropd.acl 
/var/kerberos/krb5kdc/.k5.REALM &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Perform the initial KDC database propagation to the Slave KDC: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans 
# kprop -f /usr/local/var/krb5kdc/slave_datatrans slave-kdc.REALM &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Start the Slave KDC :&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# systemctl enable krb5kdc 
# systemctl start krb5kdc &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Script to propagate the updates from the Master KDC to the Slave KDC. Create a cron job, or the like, to run this script on a frequent basis. &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;#!/bin/sh 
#/var/kerberos/kdc-slave-propogate.sh 
kdclist = "slave-kdc.customer.com" 
  /sbin/kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans 
  for kdc in $kdclist 
  do 
 /sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans $kdc 
done &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;How to test the KDC HA is to shut down the master KDC as start the slave KDC note both KDC's should NEVER be running at the same time, the crontab script should do the propagation of all changes in the KDC database in the master to the slave. &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;&lt;STRONG&gt;CAUTION&lt;/STRONG&gt; &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Run the kprop before shutting down the master KDC then to test the kdc HA log on to the cluster linux CLI follow the below steps my steps I am using the root user &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Switch user to hive/spark/Yarn etc &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# su - hive &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Check if the hive user still has valid Kerberos ticket The below output shows the hive user still has a valid ticket &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_507 
Default principal: hdfs-host1@{REALM} 
Valid starting 		Expires 		Service principal 
12/28/16 22:57:11 	12/29/16 22:57:11 	krbtgt/{REALM}@{REALM} 		renew until 12/28/16 22:57:11 
12/28/16 22:57:11 	12/29/16 22:57:11 	HTTP/host1.test.com@{REALM} 	renew until 12/28/16 22:57:11 
12/28/16 22:57:11 	12/29/16 22:57:11 	HTTP/host1.com@{REALM} 		renew until 12/28/16 22:57:11 &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Destroy the Kerberos tickets as user hive &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;$ kdestroy &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Running the previous command shouldn't give you any lines, now try getting a valid ticket by running the following command format {&lt;STRONG&gt;kinit -kt $keytab $principal&lt;/STRONG&gt;} &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;$ kinit -kt /etc/security/keytabs/hive.keytab {PRINCIPAL} &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Repeating the klist should give the hive user a valid ticket this will validate that the HA is functioning well.&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jan 2019 23:12:50 GMT</pubDate>
    <dc:creator>Shelton</dc:creator>
    <dc:date>2019-01-04T23:12:50Z</dc:date>
    <item>
      <title>Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239932#M201738</link>
      <description>&lt;P&gt;Is there a way to test MIT kerberos high availability functionality?Any approaches?&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 01:03:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239932#M201738</guid>
      <dc:creator>singathi_harish</dc:creator>
      <dc:date>2019-01-04T01:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239933#M201739</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/231263/%E2%80%8B@harish"&gt;@harish&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Yes for sure, that's doable I am assuming you have set up 2 kdc's on different networks but accessible to the cluster, &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;&lt;STRONG&gt;Assumptions:&lt;/STRONG&gt; &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;You MUST have successfully configure the 2 master and slave KDC's&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;my realm =REALM
Master host=master-kdc.test.com
Slave host=slave-kdc.test.com &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;EM&gt;Contents of /var/kerberos/krb5kdc/kpropd.acl: &lt;/EM&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;host/master-kdc.test.com@REALM
host/slave-kdc.test.com@REALM &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Create the configuration for kpropd on both the Master and Slave KDC hosts: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Create /etc/xinetd.d/krb5_prop with the following contents. &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;service krb_prop
{
        disable         = no
        socket_type     = stream
        protocol        = tcp
        user            = root
        wait            = no
        server          = /usr/sbin/kpropd
} &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Configure xinetd to run as a persistent service on both the Master and Slave KDC hosts: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# systemctl enable xinetd.service
# systemctl start xinetd.service &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Copy the following files from the Master KDC host to the Slave KDC host: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;/etc/krb5.conf 
/var/kerberos/krb5kdc/kadm5.acl 
/var/kerberos/krb5kdc/kdc.conf 
/var/kerberos/krb5kdc/kpropd.acl 
/var/kerberos/krb5kdc/.k5.REALM &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Perform the initial KDC database propagation to the Slave KDC: &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans 
# kprop -f /usr/local/var/krb5kdc/slave_datatrans slave-kdc.REALM &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Start the Slave KDC :&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# systemctl enable krb5kdc 
# systemctl start krb5kdc &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Script to propagate the updates from the Master KDC to the Slave KDC. Create a cron job, or the like, to run this script on a frequent basis. &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;#!/bin/sh 
#/var/kerberos/kdc-slave-propogate.sh 
kdclist = "slave-kdc.customer.com" 
  /sbin/kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans 
  for kdc in $kdclist 
  do 
 /sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans $kdc 
done &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;How to test the KDC HA is to shut down the master KDC as start the slave KDC note both KDC's should NEVER be running at the same time, the crontab script should do the propagation of all changes in the KDC database in the master to the slave. &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;&lt;STRONG&gt;CAUTION&lt;/STRONG&gt; &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Run the kprop before shutting down the master KDC then to test the kdc HA log on to the cluster linux CLI follow the below steps my steps I am using the root user &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Switch user to hive/spark/Yarn etc &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;# su - hive &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Check if the hive user still has valid Kerberos ticket The below output shows the hive user still has a valid ticket &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_507 
Default principal: hdfs-host1@{REALM} 
Valid starting 		Expires 		Service principal 
12/28/16 22:57:11 	12/29/16 22:57:11 	krbtgt/{REALM}@{REALM} 		renew until 12/28/16 22:57:11 
12/28/16 22:57:11 	12/29/16 22:57:11 	HTTP/host1.test.com@{REALM} 	renew until 12/28/16 22:57:11 
12/28/16 22:57:11 	12/29/16 22:57:11 	HTTP/host1.com@{REALM} 		renew until 12/28/16 22:57:11 &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;# Destroy the Kerberos tickets as user hive &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;$ kdestroy &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Running the previous command shouldn't give you any lines, now try getting a valid ticket by running the following command format {&lt;STRONG&gt;kinit -kt $keytab $principal&lt;/STRONG&gt;} &lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;$ kinit -kt /etc/security/keytabs/hive.keytab {PRINCIPAL} &lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;EM&gt;Repeating the klist should give the hive user a valid ticket this will validate that the HA is functioning well.&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 23:12:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239933#M201739</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2019-01-04T23:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239934#M201740</link>
      <description>&lt;P&gt;Thank for your information &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 05:04:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239934#M201740</guid>
      <dc:creator>singathi_harish</dc:creator>
      <dc:date>2019-01-05T05:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239935#M201741</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;While testing Kerberos High Availability ,i stopped Master KDC server..and started kadmin on slave, and created a new principal (on slave).when i tried to get kerberos ticket for new principal ,it is failing with below error.&lt;/P&gt;&lt;P&gt;Error: kinit: Client 'user@RXSKNY.HDP.XX.COM' not found in Kerberos database while getting initial credentials&lt;/P&gt;&lt;P&gt;Any thoughts on this?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 01:00:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239935#M201741</guid>
      <dc:creator>singathi_harish</dc:creator>
      <dc:date>2019-01-08T01:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239936#M201742</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/231263/%E2%80%8B@harish"&gt;@harish&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Was the creation successful without errors? If so can you list the principals in the slave KDC&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;On the slave&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# kadmin.local
kadmin:  listprincs&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Is your slave KDC also in the krb5.conf? &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;In the format. &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;[realms]
  EXAMPLE.COM = {
    ...
    kdc = kdc1.example.com
    kdc = kdc2.example.com
    ...
  }&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Because multiple KDCs may exist for an installation (failover, high availability, etc, Ambari should allow a user to specify multiple KDC hosts to be set while enabling Kerberos and updating the Kerberos service's configuration.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This should be done by allowing kerberos-env/kdc_host to accept a (comma-)delimited list of hosts and then parsing that list properly when building the krb5.conf file where each kdc_host item generates an entry in the relevant realm block&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;kerberos-env&lt;/STRONG&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;And in Ambari your kerberos.env should have an entry the &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;{
  ...
 "kdc_hosts" : "kdc1.example.com, kdc2.example.com"
  ...
}&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Some &lt;A href="https://github.com/apache/ambari/blob/branch-2.6/ambari-server/docs/security/kerberos/index.md" target="_blank"&gt; Ambari KDC documentation&lt;/A&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;To backup a KDC database to a file, use krb5_util_dump. &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# kdb5_util dump kdcfile &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;To restore the KDC database from the dump file created in the above step, do the following: &lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# kdb5_util load kdcfile&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Please revert&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 03:23:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239936#M201742</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2019-01-08T03:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239937#M201743</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The principal creation was successful and i added secondary host in ambari after enabling Kerberos HA,every krb5.conf file in the cluster is modified with two KDC hosts as you mentioned above.But the new principal created on slave KDC(after disabling master) is not working as  expected.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 04:31:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239937#M201743</guid>
      <dc:creator>singathi_harish</dc:creator>
      <dc:date>2019-01-08T04:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239938#M201744</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The new principal creation was successful and i can listprincs it with no issues.After enabling kerberos HA ,i had added secondary host in ambari,now every krb5.conf file is updated with two hosts like above.But the the new principal created on slave after disabling master KDC is failing with no credentials found error.&lt;/P&gt;&lt;P&gt;thanks. &lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 04:36:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239938#M201744</guid>
      <dc:creator>singathi_harish</dc:creator>
      <dc:date>2019-01-08T04:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239939#M201745</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/231263/%E2%80%8B@harish"&gt;@harish&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Can you share with me exactly how you created the new principal and keytab?   I would like to see the syntax  remember to &lt;/EM&gt;&lt;EM&gt;garble sensitive info.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Also remember to add a new entry in the &lt;STRONG&gt;cron kprop&lt;/STRONG&gt; to also propagate the newly create principal in the slave KDC database to the Primary so in case you switch back everything is in sync !!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 05:32:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239939#M201745</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2019-01-08T05:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239940#M201746</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;&lt;/P&gt;&lt;P&gt;i created principal for my LDAP id in below fashion.&lt;/P&gt;&lt;P&gt;kadmin.local:  addprinc myid&lt;/P&gt;&lt;P&gt; WARNING: no policy specified for id@RXPERF.HDP.XX.COM; defaulting to no policy &lt;/P&gt;&lt;P&gt;Enter password for principal "id@RXPERF.HDP.XX.COM":&lt;/P&gt;&lt;P&gt;
Re-enter password for principal "id@RXPERF.HDP.XX.COM": &lt;/P&gt;&lt;P&gt;Principal "id@RXPERF.HDP.XX.COM" created.&lt;/P&gt;&lt;P&gt;i didn't created any keytab for my id as of now.&lt;/P&gt;&lt;P&gt;Reg  the sync will update that.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 05:59:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239940#M201746</guid>
      <dc:creator>singathi_harish</dc:creator>
      <dc:date>2019-01-08T05:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239941#M201747</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/231263/%E2%80%8B@harish"&gt;@harish&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Create the test user principal  &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Let's  try this out as root c&lt;/I&gt;&lt;EM&gt;reate user at OS level&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# useradd test &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Set password&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# passwd test&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt; evoke the kdc admin CLI, run these commands from &lt;STRONG&gt;/etc/security/keytabs&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# kadmin.local .. 
kadmin.local: addprinc test@RXPERF.HDP.XX.COM 
Quit kadmin 
Kadmin.local: q &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Extract/Generate the keytab &lt;/STRONG&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;The extracting the keytab is done in the&lt;STRONG&gt; ktutil shell&lt;/STRONG&gt; cmd a continuation from the previous step the keytab name and principal is an explicit input it’s usually good if it matches the user for easy identification. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This will extract  the keytab in the current directory i.e /etc/security/keytabs/  you can later move it to the user’s home directory or the /tmp directory &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;#sudo ktutil 
ktutil : addent –password –p test@RXPERF.HDP.XX.COM -k 1 -e RC4-HMAC 
Password for test@RXPERF.HDP.XX.COM : 
ktutil : wkt test.keytab 
ktutil : q&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now to  validate   the above steps run as the user test&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -kt  /etc/security/keytabs/test.keytab&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;The output should look like &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;Keytab name: FILE:/etc/security/keytabs/test.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (des3-cbc-sha1)
   1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (aes128-cts-hmac-sha1-96)
   1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (arcfour-hmac)
   1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (des-cbc-md5)
   1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (aes256-cts-hmac-sha1-96)&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now grab a ticket using as test user  format &lt;STRONG&gt; kinit -kt  $keytab $principal&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ kinit -kt  /etc/security/keytabs/test.keytab test@RXPERF.HDP.XX.COM&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Check for ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;Klist&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Let me know if that works&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 06:42:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/239941#M201747</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2019-01-08T06:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/278589#M208125</link>
      <description>&lt;P&gt;kadmin can't re-start on slave kdc and master kdc. This message log is:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;oct 01 15:49:48 kdc01.test.local _kadmind[24364]: Error. This appears to be a slave server, found kpropd.acl&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="Object"&gt;Oct 01&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;15:49:48 kdc01.test.local systemd[1]: kadmin.service: control process exited, code=exited status=6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="Object"&gt;Oct 01&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;15:49:48 kdc01.test.local systemd[1]: Failed to start Kerberos 5 Password-changing and Administration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;when i removed kpropd.acl on /var/kerberos/krb5kdc/ on slave &amp;amp; master node. kadmin is working fine. Howto solve this problem?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 08:58:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/278589#M208125</guid>
      <dc:creator>bienkma</dc:creator>
      <dc:date>2019-10-01T08:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/321338#M228356</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much this article helps me a lot to configure KDC HA in Cloudera&amp;nbsp; 6.1.1 CDH. The only one issue I am facing right now is when I stop my Master KDC and create a new principal using slave KDC it works fine but when I UP Master KDC the new created principal is deleted because it back to its previous state can you please share the script or cron tab configuration for syncing both KDC if one down than other will syn newly created principal when ever its up.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 13:36:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/321338#M228356</guid>
      <dc:creator>USMAN_HAIDER</dc:creator>
      <dc:date>2021-07-22T13:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/321362#M228374</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/70598"&gt;@USMAN_HAIDER&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you create a new Principal in the slave KDC you should also have a&amp;nbsp; crontab&amp;nbsp; that will propagate it to the master&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#!/bin/sh 
#/var/kerberos/kdc-master-propogate.sh 
kdclist = "slave-kdc.customer.com" 
  /sbin/kdb5_util dump /usr/local/var/krb5kdc/master_datatrans 
  for kdc in $kdclist 
  do 
 /sbin/kprop -f /usr/local/var/krb5kdc/master_datatrans $kdc 
done &lt;/LI-CODE&gt;&lt;P&gt;This way the&amp;nbsp; principals will be sync'ed&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 17:46:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/321362#M228374</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2021-07-22T17:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos High Availability Functionality Testing</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/321478#M228420</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;Thank you so much&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 19:49:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-High-Availability-Functionality-Testing/m-p/321478#M228420</guid>
      <dc:creator>USMAN_HAIDER</dc:creator>
      <dc:date>2021-07-24T19:49:13Z</dc:date>
    </item>
  </channel>
</rss>

