<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Spark job failure after Kerberos is enabled in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401446#M251157</link>
    <description>&lt;P&gt;&lt;SPAN&gt;It appears that the user 'xxxx' has not been synchronized back from LDAP to the local OS on the relevant host. There is a possibility that it could be due to misconfiguration on the AD/LDAP side, preventing correct username resolution and causing the synchronization to fail.&amp;nbsp; Resolve AD/LDAP side problem to overcome this problem.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also &lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.7/security-authorization/topics/cm-security-authorization-ldap-group-mappings.html" target="_self"&gt;Document&lt;/A&gt;&amp;nbsp; for CDP 7.1.7&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Feb 2025 13:55:50 GMT</pubDate>
    <dc:creator>ggangadharan</dc:creator>
    <dc:date>2025-02-04T13:55:50Z</dc:date>
    <item>
      <title>Spark job failure after Kerberos is enabled</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401216#M251090</link>
      <description>&lt;P&gt;The error from my Spark job is&lt;BR /&gt;++++&lt;BR /&gt;Failing this attempt.Diagnostics: Application application_1738011234567_0014 initialization failed (exitCode=255) with output: main : command provided 0&lt;BR /&gt;main : run as user is xxxx&lt;BR /&gt;main : requested yarn user is xxxx&lt;BR /&gt;User xxxx not found&lt;BR /&gt;++++&lt;/P&gt;&lt;P&gt;I read this post &amp;lt;&lt;A href="https://community.cloudera.com/t5/Support-Questions/MapReduce-job-failing-after-kerberos/td-p/160273" target="_blank"&gt;https://community.cloudera.com/t5/Support-Questions/MapReduce-job-failing-after-kerberos/td-p/160273&lt;/A&gt;&amp;gt;. My group mapping configuration is hadoop.security.group.mapping = org.apache.hadoop.security.LdapGroupsMapping. I kinited xxxx before the job run. I added the AD user xxxx to an AD group hadoop. But I still got the same error.&lt;/P&gt;&lt;P&gt;This online doc might be appliable &amp;lt;&lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.8/security-authorization/topics/cm-security-authorization-ldap-group-mappings.html#ariaid-title3" target="_blank"&gt;https://docs.cloudera.com/cdp-private-cloud-base/7.1.8/security-authorization/topics/cm-security-authorization-ldap-group-mappings.html#ariaid-title3&lt;/A&gt;&amp;gt;&lt;BR /&gt;I might need to add the flag -Dcom.cloudera.cmf.service.config.emitLdapBindPasswordInClientConfig=true to the variable CMF_JAVA_OPTS flag. But the documentation is for CDP 7.1.8 and does not exist for 7.1.7, which is my cluster.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 18:46:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401216#M251090</guid>
      <dc:creator>Seaport</dc:creator>
      <dc:date>2025-01-30T18:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Spark job failure after Kerberos is enabled</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401446#M251157</link>
      <description>&lt;P&gt;&lt;SPAN&gt;It appears that the user 'xxxx' has not been synchronized back from LDAP to the local OS on the relevant host. There is a possibility that it could be due to misconfiguration on the AD/LDAP side, preventing correct username resolution and causing the synchronization to fail.&amp;nbsp; Resolve AD/LDAP side problem to overcome this problem.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also &lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.7/security-authorization/topics/cm-security-authorization-ldap-group-mappings.html" target="_self"&gt;Document&lt;/A&gt;&amp;nbsp; for CDP 7.1.7&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 13:55:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401446#M251157</guid>
      <dc:creator>ggangadharan</dc:creator>
      <dc:date>2025-02-04T13:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Spark job failure after Kerberos is enabled</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401466#M251171</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/92016"&gt;@ggangadharan&lt;/a&gt;&amp;nbsp;Thanks for the advice.&amp;nbsp; After I created user xxx on each data node, the Spark job ran successfully.&lt;/P&gt;&lt;P&gt;Regarding user account synchronization from ldap to local OS, I had to create the user account on each node manually. Do you mean using SSSD?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 23:35:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401466#M251171</guid>
      <dc:creator>Seaport</dc:creator>
      <dc:date>2025-02-04T23:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: Spark job failure after Kerberos is enabled</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401477#M251182</link>
      <description>&lt;P&gt;If the environment allows , use &lt;STRONG&gt;SSSD&lt;/STRONG&gt; with &lt;STRONG&gt;LDAP integration&lt;/STRONG&gt; to avoid manually creating Users.&amp;nbsp;&lt;BR /&gt;If that's not possible , use &lt;STRONG&gt;Ansible to automate user creation&lt;/STRONG&gt; across all nodes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 08:48:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Spark-job-failure-after-Kerberos-is-enabled/m-p/401477#M251182</guid>
      <dc:creator>ggangadharan</dc:creator>
      <dc:date>2025-02-05T08:48:26Z</dc:date>
    </item>
  </channel>
</rss>

