<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Need Guidance on Setting Up Kerberos with High Availability in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Need-Guidance-on-Setting-Up-Kerberos-with-High-Availability/m-p/393526#M248467</link>
    <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;I'm configuring Kerberos for our environment and aiming to ensure high availability. I've set up a master KDC and a slave KDC on EC2 instances but getting the below error message while propagating.&lt;/P&gt;&lt;P&gt;here is my setup on ec2 instances for master kdc and slave kdc to propagate.&lt;/P&gt;&lt;P&gt;Install Kerberos server on both the KDC's using:&lt;/P&gt;&lt;P&gt;sudo apt install krb5-{admin-server,kdc}&lt;/P&gt;&lt;P&gt;edited the below files.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&lt;/P&gt;&lt;P&gt;sudo cat /etc/krb5.conf&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = EXAMPLE.COM&lt;/P&gt;&lt;P&gt;# The following krb5.conf variables are only for MIT Kerberos.&lt;BR /&gt;kdc_timesync = 1&lt;BR /&gt;ccache_type = 4&lt;BR /&gt;forwardable = true&lt;BR /&gt;proxiable = true&lt;BR /&gt;rdns = false&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;EXAMPLE.COM = {&lt;BR /&gt;kdc = kdc01.example.com&lt;BR /&gt;kdc = kdc02.example.com&lt;BR /&gt;admin_server = kdc01.example.com&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;[domain_realm]&lt;BR /&gt;.example.com = EXAMPLE.COM&lt;BR /&gt;example.com = EXAMPLE.COM&lt;BR /&gt;[logging]&lt;BR /&gt;kdc = FILE:/var/log/kerberos/krb5kdc.log&lt;BR /&gt;admin_server = FILE:/var/log/kerberos/kadmin.log&lt;BR /&gt;default = FILE:/var/log/kerberos/krb5lib.log&lt;/P&gt;&lt;P&gt;2.&lt;/P&gt;&lt;P&gt;sudo cat /etc/krb5kdc/kdc.conf&lt;BR /&gt;[kdcdefaults]&lt;BR /&gt;kdc_ports = 750,88&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;EXAMPLE.COM = {&lt;BR /&gt;database_name = /var/lib/krb5kdc/principal&lt;BR /&gt;admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab&lt;BR /&gt;acl_file = /etc/krb5kdc/kadm5.acl&lt;BR /&gt;key_stash_file = /etc/krb5kdc/stash&lt;BR /&gt;kdc_ports = 750,88&lt;BR /&gt;max_life = 10h 0m 0s&lt;BR /&gt;max_renewable_life = 7d 0h 0m 0s&lt;BR /&gt;#master_key_type = aes256-cts&lt;BR /&gt;#supported_enctypes = aes256-cts:normal aes128-cts:normal&lt;BR /&gt;default_principal_flags = +preauth&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;3. sudo cat /etc/krb5kdc/kadm5.acl&lt;BR /&gt;# This file Is the access control list for krb5 administration.&lt;BR /&gt;# When this file is edited run service krb5-admin-server restart to activate&lt;BR /&gt;# One common way to set up Kerberos administration is to allow any principal&lt;BR /&gt;# ending in /admin is given full administrative rights.&lt;BR /&gt;# To enable this, uncomment the following line:&lt;BR /&gt;# */admin *&lt;BR /&gt;*/admin@EXAMPLE.COM *&lt;/P&gt;&lt;P&gt;here are the principles which I had created&lt;/P&gt;&lt;P&gt;kadmin.local: listprincs&lt;BR /&gt;K/M@EXAMPLE.COM&lt;BR /&gt;host/kdc01.example.com@EXAMPLE.COM&lt;BR /&gt;host/kdc02.example.com@EXAMPLE.COM&lt;BR /&gt;kadmin/admin@EXAMPLE.COM&lt;BR /&gt;kadmin/changepw@EXAMPLE.COM&lt;BR /&gt;kadmin/kdc01.example.com@EXAMPLE.COM&lt;BR /&gt;krbtgt/EXAMPLE.COM@EXAMPLE.COM&lt;BR /&gt;root/admin@EXAMPLE.COM&lt;BR /&gt;ubuntu/admin@EXAMPLE.COM&lt;BR /&gt;&lt;A href="mailto:ubuntu@EXAMPLE.COM" target="_blank" rel="noopener"&gt;ubuntu@EXAMPLE.COM&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Extract the keytab file for the kdc02 principal:&lt;/P&gt;&lt;P&gt;sudo kadmin -p ubuntu/admin -q "ktadd host/kdc02.example.com"&lt;/P&gt;&lt;P&gt;create /etc/krb5kdc/kpropd.acl:&lt;/P&gt;&lt;P&gt;host/kdc01.example.com@EXAMPLE.COM&lt;BR /&gt;host/kdc02.example.com@EXAMPLE.COM&lt;/P&gt;&lt;P&gt;Now install kpropd daemon, which listens for connections from the kprop utility from the primary KDC:&lt;/P&gt;&lt;P&gt;$ sudo apt install krb5-kpropd&lt;BR /&gt;From a terminal on the primary KDC, create a dump file of the principal database:&lt;/P&gt;&lt;P&gt;sudo kdb5_util dump /var/lib/krb5kdc/dump&lt;/P&gt;&lt;P&gt;Still on the Primary KDC, extract its key:&lt;/P&gt;&lt;P&gt;sudo kadmin.local -q "ktadd host/kdc01.example.com"&lt;BR /&gt;On the primary KDC, run the kprop utility to push the database dump made before to the secondary KDC:&lt;/P&gt;&lt;P&gt;sudo kprop -r EXAMPLE.COM -f /var/lib/krb5kdc/dump kdc02.example.com&lt;BR /&gt;kprop: Key table entry not found while getting initial credentials.&lt;/P&gt;&lt;P&gt;this is what I am getting error. please help if anyone has already done it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Sep 2024 12:24:17 GMT</pubDate>
    <dc:creator>thapas</dc:creator>
    <dc:date>2024-09-16T12:24:17Z</dc:date>
    <item>
      <title>Need Guidance on Setting Up Kerberos with High Availability</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Need-Guidance-on-Setting-Up-Kerberos-with-High-Availability/m-p/393526#M248467</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;I'm configuring Kerberos for our environment and aiming to ensure high availability. I've set up a master KDC and a slave KDC on EC2 instances but getting the below error message while propagating.&lt;/P&gt;&lt;P&gt;here is my setup on ec2 instances for master kdc and slave kdc to propagate.&lt;/P&gt;&lt;P&gt;Install Kerberos server on both the KDC's using:&lt;/P&gt;&lt;P&gt;sudo apt install krb5-{admin-server,kdc}&lt;/P&gt;&lt;P&gt;edited the below files.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&lt;/P&gt;&lt;P&gt;sudo cat /etc/krb5.conf&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = EXAMPLE.COM&lt;/P&gt;&lt;P&gt;# The following krb5.conf variables are only for MIT Kerberos.&lt;BR /&gt;kdc_timesync = 1&lt;BR /&gt;ccache_type = 4&lt;BR /&gt;forwardable = true&lt;BR /&gt;proxiable = true&lt;BR /&gt;rdns = false&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;EXAMPLE.COM = {&lt;BR /&gt;kdc = kdc01.example.com&lt;BR /&gt;kdc = kdc02.example.com&lt;BR /&gt;admin_server = kdc01.example.com&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;[domain_realm]&lt;BR /&gt;.example.com = EXAMPLE.COM&lt;BR /&gt;example.com = EXAMPLE.COM&lt;BR /&gt;[logging]&lt;BR /&gt;kdc = FILE:/var/log/kerberos/krb5kdc.log&lt;BR /&gt;admin_server = FILE:/var/log/kerberos/kadmin.log&lt;BR /&gt;default = FILE:/var/log/kerberos/krb5lib.log&lt;/P&gt;&lt;P&gt;2.&lt;/P&gt;&lt;P&gt;sudo cat /etc/krb5kdc/kdc.conf&lt;BR /&gt;[kdcdefaults]&lt;BR /&gt;kdc_ports = 750,88&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;EXAMPLE.COM = {&lt;BR /&gt;database_name = /var/lib/krb5kdc/principal&lt;BR /&gt;admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab&lt;BR /&gt;acl_file = /etc/krb5kdc/kadm5.acl&lt;BR /&gt;key_stash_file = /etc/krb5kdc/stash&lt;BR /&gt;kdc_ports = 750,88&lt;BR /&gt;max_life = 10h 0m 0s&lt;BR /&gt;max_renewable_life = 7d 0h 0m 0s&lt;BR /&gt;#master_key_type = aes256-cts&lt;BR /&gt;#supported_enctypes = aes256-cts:normal aes128-cts:normal&lt;BR /&gt;default_principal_flags = +preauth&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;3. sudo cat /etc/krb5kdc/kadm5.acl&lt;BR /&gt;# This file Is the access control list for krb5 administration.&lt;BR /&gt;# When this file is edited run service krb5-admin-server restart to activate&lt;BR /&gt;# One common way to set up Kerberos administration is to allow any principal&lt;BR /&gt;# ending in /admin is given full administrative rights.&lt;BR /&gt;# To enable this, uncomment the following line:&lt;BR /&gt;# */admin *&lt;BR /&gt;*/admin@EXAMPLE.COM *&lt;/P&gt;&lt;P&gt;here are the principles which I had created&lt;/P&gt;&lt;P&gt;kadmin.local: listprincs&lt;BR /&gt;K/M@EXAMPLE.COM&lt;BR /&gt;host/kdc01.example.com@EXAMPLE.COM&lt;BR /&gt;host/kdc02.example.com@EXAMPLE.COM&lt;BR /&gt;kadmin/admin@EXAMPLE.COM&lt;BR /&gt;kadmin/changepw@EXAMPLE.COM&lt;BR /&gt;kadmin/kdc01.example.com@EXAMPLE.COM&lt;BR /&gt;krbtgt/EXAMPLE.COM@EXAMPLE.COM&lt;BR /&gt;root/admin@EXAMPLE.COM&lt;BR /&gt;ubuntu/admin@EXAMPLE.COM&lt;BR /&gt;&lt;A href="mailto:ubuntu@EXAMPLE.COM" target="_blank" rel="noopener"&gt;ubuntu@EXAMPLE.COM&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Extract the keytab file for the kdc02 principal:&lt;/P&gt;&lt;P&gt;sudo kadmin -p ubuntu/admin -q "ktadd host/kdc02.example.com"&lt;/P&gt;&lt;P&gt;create /etc/krb5kdc/kpropd.acl:&lt;/P&gt;&lt;P&gt;host/kdc01.example.com@EXAMPLE.COM&lt;BR /&gt;host/kdc02.example.com@EXAMPLE.COM&lt;/P&gt;&lt;P&gt;Now install kpropd daemon, which listens for connections from the kprop utility from the primary KDC:&lt;/P&gt;&lt;P&gt;$ sudo apt install krb5-kpropd&lt;BR /&gt;From a terminal on the primary KDC, create a dump file of the principal database:&lt;/P&gt;&lt;P&gt;sudo kdb5_util dump /var/lib/krb5kdc/dump&lt;/P&gt;&lt;P&gt;Still on the Primary KDC, extract its key:&lt;/P&gt;&lt;P&gt;sudo kadmin.local -q "ktadd host/kdc01.example.com"&lt;BR /&gt;On the primary KDC, run the kprop utility to push the database dump made before to the secondary KDC:&lt;/P&gt;&lt;P&gt;sudo kprop -r EXAMPLE.COM -f /var/lib/krb5kdc/dump kdc02.example.com&lt;BR /&gt;kprop: Key table entry not found while getting initial credentials.&lt;/P&gt;&lt;P&gt;this is what I am getting error. please help if anyone has already done it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:24:17 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Need-Guidance-on-Setting-Up-Kerberos-with-High-Availability/m-p/393526#M248467</guid>
      <dc:creator>thapas</dc:creator>
      <dc:date>2024-09-16T12:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Need Guidance on Setting Up Kerberos with High Availability</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Need-Guidance-on-Setting-Up-Kerberos-with-High-Availability/m-p/393717#M248536</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;LI-MESSAGE title="Re: Configure two Kerberos KDCs as a Master/Slave" uid="245269" url="https://community.cloudera.com/t5/Community-Articles/Configure-two-Kerberos-KDCs-as-a-Master-Slave/m-p/245269#U245269" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;@&amp;nbsp;bilsch12&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/34569"&gt;@TerryP&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please suggest.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 08:09:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Need-Guidance-on-Setting-Up-Kerberos-with-High-Availability/m-p/393717#M248536</guid>
      <dc:creator>thapas</dc:creator>
      <dc:date>2024-09-20T08:09:57Z</dc:date>
    </item>
  </channel>
</rss>

