<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos Authentication Issues with Impala from edgeserver in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88477#M36685</link>
    <description>&lt;P&gt;Hi gzigldurm,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you fro the reply,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have review the proxy server and hostname configuration is same ,where i can see the request is coming to proxy and redirect to any onfe of the datanodes where i can see the kerberos ticket and conf file for the proxy and dtanode is mention below&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;proxy server krb5.conf&lt;BR /&gt;--------------------------&lt;/P&gt;&lt;P&gt;~]$ cat /etc/krb5.conf&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = DEV.SIT.COM&lt;BR /&gt;dns_lookup_kdc = false&lt;BR /&gt;dns_lookup_realm = false&lt;BR /&gt;ticket_lifetime = 86400&lt;BR /&gt;renew_lifetime = 604800&lt;BR /&gt;forwardable = true&lt;BR /&gt;default_tgs_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;default_tkt_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;permitted_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;udp_preference_limit = 1&lt;BR /&gt;kdc_timeout = 3000&lt;BR /&gt;[realms]&lt;BR /&gt;DEV.SIT.COM = {&lt;BR /&gt;kdc = clouderamanager.hadoop-inventory.local&lt;BR /&gt;admin_server = clouderamanager.hadoop-inventory.local&lt;BR /&gt;}&lt;BR /&gt;[domain_realm]&lt;/P&gt;&lt;P&gt;-----------&lt;BR /&gt;kerberos Ticket&lt;/P&gt;&lt;P&gt;# klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: dbadmin@DEV.SIT.COM&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;03/29/19 12:00:01 03/30/19 12:00:01 krbtgt/DEV.SIT.COM@DEV.SIT.COM&lt;BR /&gt;renew until 04/05/19 13:00:01&lt;/P&gt;&lt;P&gt;principals:&lt;BR /&gt;------------&lt;/P&gt;&lt;P&gt;$] klist -ket /home/sit/dbadmin.keytab&lt;BR /&gt;Keytab name: FILE:/home/sit/dbadmin.keytab&lt;BR /&gt;KVNO Timestamp Principal&lt;BR /&gt;---- ----------------- --------------------------------------------------------&lt;BR /&gt;1 03/18/19 10:38:24 dbadmin@DEV.SIT.COM (arcfour-hmac)&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;the request is redirect to datanode1 and its krb5 and principals&lt;/P&gt;&lt;P&gt;]# cat /etc/krb5.conf&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = DEV.SIT.COM&lt;BR /&gt;dns_lookup_kdc = false&lt;BR /&gt;dns_lookup_realm = false&lt;BR /&gt;ticket_lifetime = 86400&lt;BR /&gt;renew_lifetime = 604800&lt;BR /&gt;forwardable = true&lt;BR /&gt;default_tgs_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;default_tkt_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;permitted_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;udp_preference_limit = 1&lt;BR /&gt;kdc_timeout = 3000&lt;BR /&gt;[realms]&lt;BR /&gt;DEV.SIT.COM = {&lt;BR /&gt;kdc = clouderamanager.hadoop-inventory.local&lt;BR /&gt;admin_server = clouderamanager.hadoop-inventory.local&lt;BR /&gt;}&lt;BR /&gt;[domain_realm]&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;kerberos Ticket in datanode&lt;BR /&gt;-----------------------------------------------&lt;/P&gt;&lt;P&gt;# klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: impala/data1@DEV.SIT.COM&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;03/25/19 12:02:59 03/26/19 12:02:59 krbtgt/DEV.SIT.COM@DEV.SIT.COM&lt;BR /&gt;renew until 04/01/19 13:02:59&lt;/P&gt;&lt;P&gt;principals:&lt;BR /&gt;------------------------------------------&lt;BR /&gt;]# klist -ket impala.keytab&lt;BR /&gt;Keytab name: FILE:impala.keytab&lt;BR /&gt;KVNO Timestamp Principal&lt;BR /&gt;---- ----------------- --------------------------------------------------------&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (aes256-cts-hmac-sha1-96)&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (aes128-cts-hmac-sha1-96)&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (des3-cbc-sha1)&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (arcfour-hmac)&lt;BR /&gt;2 03/25/19 07:34:08 impala/data1@DEV.SIT.COM (des-hmac-sha1)&lt;BR /&gt;2 03/25/19 07:34:08 impala/data1@DEV.SIT.COM (des-cbc-md5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;/P&gt;&lt;P&gt;Implad logs i can see this error&lt;/P&gt;&lt;P&gt;E0329 14:04:55.577369 32288 authentication.cc:159] SASL message (Kerberos (external)): GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Wrong principal in request)&lt;BR /&gt;I0329 14:04:55.580916 32288 thrift-util.cc:123] TThreadPoolServer: Caught TException: SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context&lt;BR /&gt;E0329 14:04:55.672466 32288 authentication.cc:159] SASL message (Kerberos (external)): GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Wrong principal in request)&lt;BR /&gt;I0329 14:04:55.673733 32288 thrift-util.cc:123] TThreadPoolServer: Caught TException: SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;from the cloudmanegr the kerberos configuration&amp;nbsp;&lt;/P&gt;&lt;P&gt;]# cat /var/kerberos/krb5kdc/kdc.conf&lt;BR /&gt;[kdcdefaults]&lt;BR /&gt;kdc_ports = 88&lt;BR /&gt;kdc_tcp_ports = 88&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;DEV.SIT.COM = {&lt;BR /&gt;#master_key_type = aes256-cts&lt;BR /&gt;acl_file = /var/kerberos/krb5kdc/kadm5.acl&lt;BR /&gt;dict_file = /usr/share/dict/words&lt;BR /&gt;max_renewable_life = 7d&lt;BR /&gt;max_life = 1d&lt;BR /&gt;admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab&lt;BR /&gt;supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal&lt;BR /&gt;default_principal_flags = +renewable, +forwardable&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;where in clouder portal&amp;nbsp; --&amp;gt; administartiom --&amp;gt; settings-- &amp;gt; kerberos&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;kerberos encription types mentions as&amp;nbsp;&lt;/P&gt;&lt;P&gt;rc4-hmac&lt;/P&gt;&lt;P&gt;aes256-cts-hmac-sha1-96&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------------------------------------------------------&lt;/P&gt;&lt;P&gt;can you please let me know where the issues accoued in the principals?&lt;/P&gt;&lt;P&gt;you mean to say rc4-hmac is not supported enscription types&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;pandu.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Mar 2019 14:15:31 GMT</pubDate>
    <dc:creator>pandu12</dc:creator>
    <dc:date>2019-03-29T14:15:31Z</dc:date>
    <item>
      <title>Kerberos Authentication Issues with Impala from edgeserver</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88374#M36683</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;We have upgrader he VM resources , like CPU and storage is added to each VM in the Cloudera manager.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; we have done this one by one VM , and also we have upgraded the edgeserv as well, where we have proxy is installed to access the datanodes. our appliaction is using the impala api URL to access the data from the datanode via the proxy using edgeserver.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from java side we can see the the error&amp;nbsp;&lt;/P&gt;
&lt;P&gt;java.sql.SQLException: [Simba][ImpalaJDBCDriver](500310) Invalid operation: Unable to connect to server:;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and checked the edgeserver logs request is recived in proxy and redirct to the data nodes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in the data nodes logs we can see error logs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;E0327 11:57:09.115049 32288 authentication.cc:159] SASL message (Kerberos (external)): GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Wrong principal in request)&lt;BR /&gt;I0327 11:57:09.115571 32288 thrift-util.cc:123] TThreadPoolServer: Caught TException: SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context&lt;BR /&gt;E0327 11:57:09.199386 32288 authentication.cc:159] SASL message (Kerberos (external)): GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Wrong principal in request)&lt;BR /&gt;I0327 11:57:09.199843 32288 thrift-util.cc:123] TThreadPoolServer: Caught TException: SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have cheked the kerbros ticked it is valid from both the places. from the appliaction serevr and the edgeserver i am using same .keytab ,file and kerboros ticket is valid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;please help me out to fix this issues, its very urgent to resolve this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reagrds,&lt;/P&gt;
&lt;P&gt;pandu&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 14:16:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88374#M36683</guid>
      <dc:creator>pandu12</dc:creator>
      <dc:date>2022-09-16T14:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication Issues with Impala from edgeserver</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88410#M36684</link>
      <description>&lt;P&gt;The kerberos ticket is valid but the DN complains about&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;Wrong principal in request&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Please review your application configuration or proxy software for correct kerberos principal configured.&lt;/P&gt;&lt;P&gt;As you upgraded your proxy server host, may it be that some settings changed like hostname or krb5.conf?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another possibility is that there is a mismatch of encryption types, see&amp;nbsp;&lt;A href="https://my.cloudera.com/knowledge/Service-Fails-to-Start--Error-Wrong-principal-in-request-?id=74392" target="_blank" rel="noopener"&gt;this KB article&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 16:04:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88410#M36684</guid>
      <dc:creator>gzigldrum</dc:creator>
      <dc:date>2019-03-28T16:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication Issues with Impala from edgeserver</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88477#M36685</link>
      <description>&lt;P&gt;Hi gzigldurm,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you fro the reply,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have review the proxy server and hostname configuration is same ,where i can see the request is coming to proxy and redirect to any onfe of the datanodes where i can see the kerberos ticket and conf file for the proxy and dtanode is mention below&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;proxy server krb5.conf&lt;BR /&gt;--------------------------&lt;/P&gt;&lt;P&gt;~]$ cat /etc/krb5.conf&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = DEV.SIT.COM&lt;BR /&gt;dns_lookup_kdc = false&lt;BR /&gt;dns_lookup_realm = false&lt;BR /&gt;ticket_lifetime = 86400&lt;BR /&gt;renew_lifetime = 604800&lt;BR /&gt;forwardable = true&lt;BR /&gt;default_tgs_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;default_tkt_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;permitted_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;udp_preference_limit = 1&lt;BR /&gt;kdc_timeout = 3000&lt;BR /&gt;[realms]&lt;BR /&gt;DEV.SIT.COM = {&lt;BR /&gt;kdc = clouderamanager.hadoop-inventory.local&lt;BR /&gt;admin_server = clouderamanager.hadoop-inventory.local&lt;BR /&gt;}&lt;BR /&gt;[domain_realm]&lt;/P&gt;&lt;P&gt;-----------&lt;BR /&gt;kerberos Ticket&lt;/P&gt;&lt;P&gt;# klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: dbadmin@DEV.SIT.COM&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;03/29/19 12:00:01 03/30/19 12:00:01 krbtgt/DEV.SIT.COM@DEV.SIT.COM&lt;BR /&gt;renew until 04/05/19 13:00:01&lt;/P&gt;&lt;P&gt;principals:&lt;BR /&gt;------------&lt;/P&gt;&lt;P&gt;$] klist -ket /home/sit/dbadmin.keytab&lt;BR /&gt;Keytab name: FILE:/home/sit/dbadmin.keytab&lt;BR /&gt;KVNO Timestamp Principal&lt;BR /&gt;---- ----------------- --------------------------------------------------------&lt;BR /&gt;1 03/18/19 10:38:24 dbadmin@DEV.SIT.COM (arcfour-hmac)&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;the request is redirect to datanode1 and its krb5 and principals&lt;/P&gt;&lt;P&gt;]# cat /etc/krb5.conf&lt;BR /&gt;[libdefaults]&lt;BR /&gt;default_realm = DEV.SIT.COM&lt;BR /&gt;dns_lookup_kdc = false&lt;BR /&gt;dns_lookup_realm = false&lt;BR /&gt;ticket_lifetime = 86400&lt;BR /&gt;renew_lifetime = 604800&lt;BR /&gt;forwardable = true&lt;BR /&gt;default_tgs_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;default_tkt_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;permitted_enctypes = rc4-hmac aes256-cts-hmac-sha1-96&lt;BR /&gt;udp_preference_limit = 1&lt;BR /&gt;kdc_timeout = 3000&lt;BR /&gt;[realms]&lt;BR /&gt;DEV.SIT.COM = {&lt;BR /&gt;kdc = clouderamanager.hadoop-inventory.local&lt;BR /&gt;admin_server = clouderamanager.hadoop-inventory.local&lt;BR /&gt;}&lt;BR /&gt;[domain_realm]&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;kerberos Ticket in datanode&lt;BR /&gt;-----------------------------------------------&lt;/P&gt;&lt;P&gt;# klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: impala/data1@DEV.SIT.COM&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;03/25/19 12:02:59 03/26/19 12:02:59 krbtgt/DEV.SIT.COM@DEV.SIT.COM&lt;BR /&gt;renew until 04/01/19 13:02:59&lt;/P&gt;&lt;P&gt;principals:&lt;BR /&gt;------------------------------------------&lt;BR /&gt;]# klist -ket impala.keytab&lt;BR /&gt;Keytab name: FILE:impala.keytab&lt;BR /&gt;KVNO Timestamp Principal&lt;BR /&gt;---- ----------------- --------------------------------------------------------&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (aes256-cts-hmac-sha1-96)&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (aes128-cts-hmac-sha1-96)&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (des3-cbc-sha1)&lt;BR /&gt;2 03/25/19 07:34:07 impala/data1@DEV.SIT.COM (arcfour-hmac)&lt;BR /&gt;2 03/25/19 07:34:08 impala/data1@DEV.SIT.COM (des-hmac-sha1)&lt;BR /&gt;2 03/25/19 07:34:08 impala/data1@DEV.SIT.COM (des-cbc-md5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;/P&gt;&lt;P&gt;Implad logs i can see this error&lt;/P&gt;&lt;P&gt;E0329 14:04:55.577369 32288 authentication.cc:159] SASL message (Kerberos (external)): GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Wrong principal in request)&lt;BR /&gt;I0329 14:04:55.580916 32288 thrift-util.cc:123] TThreadPoolServer: Caught TException: SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context&lt;BR /&gt;E0329 14:04:55.672466 32288 authentication.cc:159] SASL message (Kerberos (external)): GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Wrong principal in request)&lt;BR /&gt;I0329 14:04:55.673733 32288 thrift-util.cc:123] TThreadPoolServer: Caught TException: SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;from the cloudmanegr the kerberos configuration&amp;nbsp;&lt;/P&gt;&lt;P&gt;]# cat /var/kerberos/krb5kdc/kdc.conf&lt;BR /&gt;[kdcdefaults]&lt;BR /&gt;kdc_ports = 88&lt;BR /&gt;kdc_tcp_ports = 88&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;DEV.SIT.COM = {&lt;BR /&gt;#master_key_type = aes256-cts&lt;BR /&gt;acl_file = /var/kerberos/krb5kdc/kadm5.acl&lt;BR /&gt;dict_file = /usr/share/dict/words&lt;BR /&gt;max_renewable_life = 7d&lt;BR /&gt;max_life = 1d&lt;BR /&gt;admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab&lt;BR /&gt;supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal&lt;BR /&gt;default_principal_flags = +renewable, +forwardable&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;where in clouder portal&amp;nbsp; --&amp;gt; administartiom --&amp;gt; settings-- &amp;gt; kerberos&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;kerberos encription types mentions as&amp;nbsp;&lt;/P&gt;&lt;P&gt;rc4-hmac&lt;/P&gt;&lt;P&gt;aes256-cts-hmac-sha1-96&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------------------------------------------------------&lt;/P&gt;&lt;P&gt;can you please let me know where the issues accoued in the principals?&lt;/P&gt;&lt;P&gt;you mean to say rc4-hmac is not supported enscription types&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;pandu.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 14:15:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88477#M36685</guid>
      <dc:creator>pandu12</dc:creator>
      <dc:date>2019-03-29T14:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication Issues with Impala from edgeserver</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88658#M36686</link>
      <description>Can you kinit using this principal and then run hdfs commands like "hdfs dfs -l /"? Does this work?</description>
      <pubDate>Wed, 03 Apr 2019 11:28:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88658#M36686</guid>
      <dc:creator>gzigldrum</dc:creator>
      <dc:date>2019-04-03T11:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Authentication Issues with Impala from edgeserver</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88684#M36687</link>
      <description>&lt;P&gt;Hi Gzigldrum,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Thank you for the reply,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I found the Route cause and resolved the issue myself,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; my proxy server principal is not listing in the impla demon keytab , impla/proxy@relim&amp;nbsp; in none of the demon nodes,&lt;/P&gt;&lt;P&gt;&amp;nbsp; i cross checked the Impala Daemons Load Balancer has confiured to Executor&amp;nbsp; group feild eariler with value&amp;nbsp;" proxyhost:port"&lt;/P&gt;&lt;P&gt;this where its not reflecting ,because none of the impla demon nodes are present in executor group .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the impla demon nodes are present in "impala demon default group, i have added the value '"proxyhost:port"&amp;nbsp;&lt;/P&gt;&lt;P&gt;in this field and restarted the impala service, when is cross cehck the princaipl in demon node the impala keytab has the&amp;nbsp;impla/proxy@relim, and the kerberos authentication from proxy server started working fro the impala.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pandu&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 06:37:46 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Authentication-Issues-with-Impala-from-edgeserver/m-p/88684#M36687</guid>
      <dc:creator>pandu12</dc:creator>
      <dc:date>2019-04-04T06:37:46Z</dc:date>
    </item>
  </channel>
</rss>

