<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Hue Kerberos error: &amp;quot;TICKET NOT RENEWABLE&amp;quot; in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6731#M38219</link>
    <description>&lt;P&gt;Consider the following examples:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First the /etc/krb5.conf &amp;nbsp;In this example a second domain is configured (Active Directory) for cross realm authentication with AES256 encryption being used by AD. &amp;nbsp;Using AES256 means that one must install the &lt;A title="JDK6 JCE Policy Jar Files" href="http://www.oracle.com/technetwork/java/javase/downloads/jce-6-download-429243.html" target="_blank"&gt;JCE Policy Files For JDK6&lt;/A&gt; or the &lt;A title="JCE Policy Files for JDK7" href="http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html" target="_blank"&gt;JCE Policy Files for JDK7&lt;/A&gt; to use stron encryption like AES256. Note the &lt;STRONG&gt;Items in bold&amp;nbsp;&lt;/STRONG&gt;that are pointed, out, they should be set in that specific file (krb5.condif)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[logging]
   default = FILE:/var/log/krb5libs.log
   kdc = FILE:/var/log/krb5kdc.log
   admin_server = FILE:/var/log/kadmind.log
[libdefaults]
   default_realm = TEST.LAB
   dns_lookup_realm = false
   dns_lookup_kdc = false
&lt;STRONG&gt;   ticket_lifetime = 24h
   renew_lifetime = 7d
   forwardable = true&lt;/STRONG&gt;
[realms]
TEST.ORG.LAB = {
   kdc = Win2k8x64-AD4.test.org.lab:88
   kdc = Win2k8x64-AD2.test.org.lab:88
   admin_server = Win2k8x64-AD4.test.org.lab:749
   admin_server = Win2k8x64-AD2.test.org.lab:749
   default_domain = test.org.lab
}
TEST.LAB = {
   kdc = kdc1.test.lab:88
   admin_server = kdc1.test.lab:749
   default_domain = test.lab
}
[domain_realm]
   .test.lab = TEST.LAB
   test.lab = TEST.LAB
   .test.org.lab = TEST.ORG.LAB
   test.org.lab = TEST.ORG.LAB&lt;/PRE&gt;&lt;P&gt;Consider the following for the /var/kerberose/krb5kdc/kdc.conf, calling out items to set in this file as &lt;STRONG&gt;Bold Text&lt;/STRONG&gt;, &amp;nbsp;below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[kdcdefaults]
 kdc_ports = 88
 kdc_tcp_ports = 88

[realms]
  TEST.LAB = {
  #master_key_type = aes256-cts
 &lt;STRONG&gt; max_renewable_life = 7d 0h 0m 0s&lt;/STRONG&gt;
  acl_file = /var/kerberos/krb5kdc/kadm5.acl
  dict_file = /usr/share/dict/words
  admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
  supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal
  &lt;STRONG&gt;default_principal_flags = +renewable&lt;/STRONG&gt;
 }&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Feb 2014 16:22:57 GMT</pubDate>
    <dc:creator>Grizzly</dc:creator>
    <dc:date>2014-02-24T16:22:57Z</dc:date>
    <item>
      <title>Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6725#M38218</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am currently in the process of enabling security in our cluster (CDH4.5, CM4.8) according the documentation here =&amp;gt;&amp;nbsp;&lt;A target="_blank" href="http://www.cloudera.com/content/cloudera-content/cloudera-docs/CM4Ent/4.5.4/Configuring-Hadoop-Security-with-Cloudera-Manager/Configuring-Hadoop-Security-with-Cloudera-Manager.html"&gt;http://www.cloudera.com/content/cloudera-content/cloudera-docs/CM4Ent/4.5.4/Configuring-Hadoop-Security-with-Cloudera-Manager/Configuring-Hadoop-Security-with-Cloudera-Manager.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everything went fine until step 14, starting all the services. The service "Kerberos Ticket Renewer" doesn't start, the latest log entries are:&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;PRE&gt;[24/Feb/2014 15:41:39 +0000] settings     INFO     Welcome to Hue 2.5.0
[24/Feb/2014 15:41:40 +0000] kt_renewer   INFO     Reinitting kerberos from keytab: /usr/bin/kinit -k -t /var/run/cloudera-scm-agent/process/1715-hue-KT_RENEWER/hue.keytab -c /tmp/hue_krb5_ccache hue/hadoop-pg-1.cluster
[24/Feb/2014 15:41:42 +0000] kt_renewer   INFO     Renewing kerberos ticket to work around kerberos 1.8.1: /usr/bin/kinit -R -c /tmp/hue_krb5_ccache
[24/Feb/2014 15:41:42 +0000] kt_renewer   ERROR    Couldn't renew kerberos ticket in order to work around Kerberos 1.8.1 issue. Please check that the ticket for 'hue/hadoop-pg-1.cluster' is still renewable:
  $ kinit -f -c /tmp/hue_krb5_ccache
If the 'renew until' date is the same as the 'valid starting' date, the ticket cannot be renewed. Please check your KDC configuration, and the ticket renewal policy (maxrenewlife) for the 'hue/hadoop-pg-1.cluster' and `krbtgt' principals.&lt;/PRE&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logs of the KDC shows:&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;Feb 24 15:41:33 hadoop-pg-1 krb5kdc[4475](info): AS_REQ (4 etypes {18 17 16 23}) 10.147.210.1: NEEDED_PREAUTH: hue/hadoop-pg-1.cluster@HADOOP-PG for krbtgt/HADOOP-PG@HADOOP-PG, Additional pre-authentication required&lt;BR /&gt;Feb 24 15:41:33 hadoop-pg-1 krb5kdc[4475](info): AS_REQ (4 etypes {18 17 16 23}) 10.147.210.1: ISSUE: authtime 1393252893, etypes {rep=18 tkt=18 ses=18}, hue/hadoop-pg-1.cluster@HADOOP-PG for krbtgt/HADOOP-PG@HADOOP-PG&lt;BR /&gt;Feb 24 15:41:35 hadoop-pg-1 krb5kdc[4475](info): TGS_REQ (4 etypes {18 17 16 23}) 10.147.210.1: TICKET NOT RENEWABLE: authtime 0, hue/hadoop-pg-1.cluster@HADOOP-PG for krbtgt/HADOOP-PG@HADOOP-PG, KDC can't fulfill requested option&lt;BR /&gt;Feb 24 15:41:35 hadoop-pg-1 krb5kdc[4475](info): TGS_REQ (4 etypes {18 17 16 23}) 10.147.210.1: TICKET NOT RENEWABLE: authtime 0, hue/hadoop-pg-1.cluster@HADOOP-PG for krbtgt/HADOOP-PG@HADOOP-PG, KDC can't fulfill requested option&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The KDC config looks like:&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;[kdcdefaults]&lt;BR /&gt;kdc_ports = 750,88&lt;/P&gt;&lt;P&gt;[realms]&lt;BR /&gt;HADOOP-PG = {&lt;BR /&gt;database_name = /var/lib/krb5kdc/principal&lt;BR /&gt;admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab&lt;BR /&gt;acl_file = /etc/krb5kdc/kadm5.acl&lt;BR /&gt;key_stash_file = /etc/krb5kdc/stash&lt;BR /&gt;kdc_ports = 750,88&lt;BR /&gt;max_life = 1d 0h 0m 0s&lt;BR /&gt;max_renewable_life = 90d 0h 0m 0s&lt;BR /&gt;master_key_type = des3-hmac-sha1&lt;BR /&gt;supported_enctypes = aes256-cts:normal arcfour-hmac:normal des3-hmac-sha1:normal des-cbc-crc:normal des:normal des:v4 des:norealm des:onlyrealm des:afs3&lt;BR /&gt;default_principal_flags = +preauth +renewable&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additionally I set the following:&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;kadmin.local: modprinc -maxlife "1 day" -maxrenewlife "90 day" +allow_renewable hue/hadoop-pg-1.cluster@HADOOP-PG&lt;/P&gt;&lt;P&gt;""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some hints, where to investigate to resolve this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br, Gerd&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 08:54:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6725#M38218</guid>
      <dc:creator>geko</dc:creator>
      <dc:date>2022-09-16T08:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6731#M38219</link>
      <description>&lt;P&gt;Consider the following examples:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First the /etc/krb5.conf &amp;nbsp;In this example a second domain is configured (Active Directory) for cross realm authentication with AES256 encryption being used by AD. &amp;nbsp;Using AES256 means that one must install the &lt;A title="JDK6 JCE Policy Jar Files" href="http://www.oracle.com/technetwork/java/javase/downloads/jce-6-download-429243.html" target="_blank"&gt;JCE Policy Files For JDK6&lt;/A&gt; or the &lt;A title="JCE Policy Files for JDK7" href="http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html" target="_blank"&gt;JCE Policy Files for JDK7&lt;/A&gt; to use stron encryption like AES256. Note the &lt;STRONG&gt;Items in bold&amp;nbsp;&lt;/STRONG&gt;that are pointed, out, they should be set in that specific file (krb5.condif)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[logging]
   default = FILE:/var/log/krb5libs.log
   kdc = FILE:/var/log/krb5kdc.log
   admin_server = FILE:/var/log/kadmind.log
[libdefaults]
   default_realm = TEST.LAB
   dns_lookup_realm = false
   dns_lookup_kdc = false
&lt;STRONG&gt;   ticket_lifetime = 24h
   renew_lifetime = 7d
   forwardable = true&lt;/STRONG&gt;
[realms]
TEST.ORG.LAB = {
   kdc = Win2k8x64-AD4.test.org.lab:88
   kdc = Win2k8x64-AD2.test.org.lab:88
   admin_server = Win2k8x64-AD4.test.org.lab:749
   admin_server = Win2k8x64-AD2.test.org.lab:749
   default_domain = test.org.lab
}
TEST.LAB = {
   kdc = kdc1.test.lab:88
   admin_server = kdc1.test.lab:749
   default_domain = test.lab
}
[domain_realm]
   .test.lab = TEST.LAB
   test.lab = TEST.LAB
   .test.org.lab = TEST.ORG.LAB
   test.org.lab = TEST.ORG.LAB&lt;/PRE&gt;&lt;P&gt;Consider the following for the /var/kerberose/krb5kdc/kdc.conf, calling out items to set in this file as &lt;STRONG&gt;Bold Text&lt;/STRONG&gt;, &amp;nbsp;below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[kdcdefaults]
 kdc_ports = 88
 kdc_tcp_ports = 88

[realms]
  TEST.LAB = {
  #master_key_type = aes256-cts
 &lt;STRONG&gt; max_renewable_life = 7d 0h 0m 0s&lt;/STRONG&gt;
  acl_file = /var/kerberos/krb5kdc/kadm5.acl
  dict_file = /usr/share/dict/words
  admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
  supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal
  &lt;STRONG&gt;default_principal_flags = +renewable&lt;/STRONG&gt;
 }&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2014 16:22:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6731#M38219</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2014-02-24T16:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6799#M38220</link>
      <description>&lt;P&gt;Hi Tgrayson,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your answer. Seems like adding the {ticket_|renew_}lifetime parameters solved the problem. After inserting them, reducing the original renew-lifetime to 7d and restarting all the services it looks good and I can proceed with the doc mentioned in the initial post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks, Gerd&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2014 08:26:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/6799#M38220</guid>
      <dc:creator>geko</dc:creator>
      <dc:date>2014-02-25T08:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17130#M38221</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Im using only kerberos not AD&lt;BR /&gt;&lt;BR /&gt;I get an error please let me know why?&lt;BR /&gt;&lt;BR /&gt;Im trying to run job from sqoop sql to hdfs&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://cloudera-cdh05.narayana.local:8888/sqoop/#jobs" target="_blank"&gt;http://cloudera-cdh05.narayana.local:8888/sqoop/#jobs&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;on browser&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Error: org.apache.hadoop.security.AccessControlException: SIMPLE authentication is not enabled. Available:[TOKEN, KERBEROS]&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;[root@xeon narayana]# vim /var/kerberos/krb5kdc/kdc.conf&lt;/STRONG&gt;&lt;BR /&gt;-----------------------------&lt;BR /&gt;&lt;BR /&gt;[kdcdefaults]&lt;BR /&gt;&amp;nbsp;kdc_ports = 88&lt;BR /&gt;&amp;nbsp;kdc_tcp_ports = 88&lt;BR /&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;&amp;nbsp;NARAYANA.LOCAL = {&lt;BR /&gt;&amp;nbsp; #master_key_type = aes256-cts&lt;BR /&gt;&amp;nbsp; &lt;STRONG&gt;# Narayana added&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; max_renewable_life = 10000d&lt;BR /&gt;&amp;nbsp; acl_file = /var/kerberos/krb5kdc/kadm5.acl&lt;BR /&gt;&amp;nbsp; dict_file = /usr/share/dict/words&lt;BR /&gt;&amp;nbsp; admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab&lt;BR /&gt;&amp;nbsp; supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; # Narayana added&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; default_principal_flags = +renewable&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Clients&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;----------&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;[cloudera@cloudera-cdh05 hue]$ klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_500&lt;BR /&gt;Default principal: cloudera/cloudera-cdh05.narayana.local@NARAYANA.LOCAL&lt;BR /&gt;&lt;BR /&gt;Valid starting&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expires&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service principal&lt;BR /&gt;08/18/14 22:24:54&amp;nbsp; 08/19/14 22:24:54&amp;nbsp; krbtgt/NARAYANA.LOCAL@NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; renew until 08/18/14 22:24:54&lt;BR /&gt;&lt;BR /&gt;[cloudera@cloudera-cdh05 hue]$ cat /etc/krb5.conf&lt;BR /&gt;[logging]&lt;BR /&gt;&amp;nbsp;default = FILE:/var/log/krb5libs.log&lt;BR /&gt;&amp;nbsp;kdc = FILE:/var/log/krb5kdc.log&lt;BR /&gt;&amp;nbsp;admin_server = FILE:/var/log/kadmind.log&lt;BR /&gt;&lt;BR /&gt;[libdefaults]&lt;BR /&gt;&amp;nbsp;default_realm = NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;dns_lookup_realm = false&lt;BR /&gt;&amp;nbsp;dns_lookup_kdc = false&lt;BR /&gt;&amp;nbsp;ticket_lifetime = 10000h&lt;BR /&gt;&amp;nbsp;renew_lifetime = 10000d&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;forwardable = true&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;udp_preference_limit = 1&lt;BR /&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;&amp;nbsp;NARAYANA.LOCAL = {&lt;BR /&gt;&amp;nbsp; kdc = 192.168.1.10&lt;BR /&gt;&amp;nbsp; admin_server = 192.168.1.10&lt;BR /&gt;&amp;nbsp;}&lt;BR /&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;&amp;nbsp;.narayana.local = NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;narayana.local = NARAYANA.LOCAL&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Error&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-------&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;/var/log/hue/error.log&lt;/STRONG&gt;&lt;BR /&gt;[18/Aug/2014 09:57:08 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;BR /&gt;[18/Aug/2014 09:57:08 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;BR /&gt;[18/Aug/2014 09:57:08 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;BR /&gt;[18/Aug/2014 09:57:11 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;BR /&gt;[18/Aug/2014 09:57:41 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2014 17:43:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17130#M38221</guid>
      <dc:creator>narayanab16</dc:creator>
      <dc:date>2014-08-18T17:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17154#M38222</link>
      <description>&lt;P&gt;We provide example kdc.conf and krb5.conf here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cloudera.com/content/cloudera-content/cloudera-docs/CDH5/latest/CDH5-Security-Guide/cdh5sg_troubleshooting.html" target="_blank"&gt;http://www.cloudera.com/content/cloudera-content/cloudera-docs/CDH5/latest/CDH5-Security-Guide/cdh5sg_troubleshooting.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you us "kadmin.local" and then the "getprinc" command to specifically examine principals in question, it will tell you what properties are set upon creation of the principal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your krb5.conf needs to provide better ticket and renew lifetime settings. &amp;nbsp;See the example for guidance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 00:56:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17154#M38222</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2014-08-19T00:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17160#M38223</link>
      <description>&lt;P&gt;Hi Todd,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What am i missing i really don't understand, the error remains the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont see anything wrong with configuration, i update conf as decribed in the troubleshoot.&lt;/P&gt;&lt;P&gt;Below is my conf list, mapreduce jobs are working as expected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[root@xeon narayana]# cat /var/kerberos/krb5kdc/kdc.conf&lt;/STRONG&gt;&lt;BR /&gt;[kdcdefaults]&lt;BR /&gt;&amp;nbsp;kdc_ports = 88&lt;BR /&gt;&amp;nbsp;kdc_tcp_ports = 88&lt;BR /&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;&amp;nbsp;NARAYANA.LOCAL = {&lt;BR /&gt;&amp;nbsp; #master_key_type = aes256-cts&lt;BR /&gt;&amp;nbsp; # Narayana added&lt;BR /&gt;&amp;nbsp; &lt;STRONG&gt;max_renewable_life = 7d 0h 0m 0s&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; acl_file = /var/kerberos/krb5kdc/kadm5.acl&lt;BR /&gt;&amp;nbsp; dict_file = /usr/share/dict/words&lt;BR /&gt;&amp;nbsp; admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab&lt;BR /&gt;&amp;nbsp; supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal&lt;BR /&gt;&amp;nbsp; # Narayana added&lt;BR /&gt;&amp;nbsp; &lt;STRONG&gt;default_principal_flags = +renewable&lt;/STRONG&gt;&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;clients&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;---------&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[cloudera@cloudera-cdh05 hue]$ klist&lt;/STRONG&gt;&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_500&lt;BR /&gt;Default principal: cloudera/cloudera-cdh05.narayana.local@NARAYANA.LOCAL&lt;BR /&gt;&lt;BR /&gt;Valid starting&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expires&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service principal&lt;BR /&gt;08/19/14 09:48:35&amp;nbsp; 08/20/14 09:48:33&amp;nbsp; krbtgt/NARAYANA.LOCAL@NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;renew until 08/19/14 09:48:35&lt;BR /&gt;&lt;STRONG&gt;[cloudera@cloudera-cdh05 hue]$ cat /etc/krb5.conf&lt;/STRONG&gt;&lt;BR /&gt;[logging]&lt;BR /&gt;&amp;nbsp;default = FILE:/var/log/krb5libs.log&lt;BR /&gt;&amp;nbsp;kdc = FILE:/var/log/krb5kdc.log&lt;BR /&gt;&amp;nbsp;admin_server = FILE:/var/log/kadmind.log&lt;BR /&gt;&lt;BR /&gt;[libdefaults]&lt;BR /&gt;&amp;nbsp;default_realm = NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;dns_lookup_realm = false&lt;BR /&gt;&amp;nbsp;dns_lookup_kdc = false&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;ticket_lifetime = 24h&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;renew_lifetime = 7d&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;forwardable = true&lt;BR /&gt;&amp;nbsp;#udp_preference_limit = 1&lt;BR /&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;&amp;nbsp;NARAYANA.LOCAL = {&lt;BR /&gt;&amp;nbsp; kdc = 192.168.1.10&lt;BR /&gt;&amp;nbsp; admin_server = 192.168.1.10&lt;BR /&gt;&amp;nbsp; default_domain = narayana.local&lt;BR /&gt;&amp;nbsp;}&lt;BR /&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;&amp;nbsp;.narayana.local = NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;narayana.local = NARAYANA.LOCAL&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;[root@cloudera-cdh06 ~]# cat /etc/krb5.conf &lt;/STRONG&gt;&lt;BR /&gt;[logging]&lt;BR /&gt;&amp;nbsp;default = FILE:/var/log/krb5libs.log&lt;BR /&gt;&amp;nbsp;kdc = FILE:/var/log/krb5kdc.log&lt;BR /&gt;&amp;nbsp;admin_server = FILE:/var/log/kadmind.log&lt;BR /&gt;&lt;BR /&gt;[libdefaults]&lt;BR /&gt;&amp;nbsp;default_realm = NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;dns_lookup_realm = false&lt;BR /&gt;&amp;nbsp;dns_lookup_kdc = false&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;ticket_lifetime = 24h&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;renew_lifetime = 7d&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;forwardable = true&lt;BR /&gt;&amp;nbsp;#udp_preference_limit = 1&lt;BR /&gt;&lt;BR /&gt;[realms]&lt;BR /&gt;&amp;nbsp;NARAYANA.LOCAL = {&lt;BR /&gt;&amp;nbsp; kdc = 192.168.1.10&lt;BR /&gt;&amp;nbsp; admin_server = 192.168.1.10&lt;BR /&gt;&amp;nbsp; default_domain = narayana.local&lt;BR /&gt;&amp;nbsp;}&lt;BR /&gt;&lt;BR /&gt;[domain_realm]&lt;BR /&gt;&amp;nbsp;.narayana.local = NARAYANA.LOCAL&lt;BR /&gt;&amp;nbsp;narayana.local = NARAYANA.LOCAL&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 04:50:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17160#M38223</guid>
      <dc:creator>narayanab16</dc:creator>
      <dc:date>2014-08-19T04:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17214#M38224</link>
      <description>&lt;P&gt;these are false-positive error messages they can be ignored:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[18/Aug/2014 09:57:08 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[18/Aug/2014 09:57:08 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[18/Aug/2014 09:57:08 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[18/Aug/2014 09:57:11 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[18/Aug/2014 09:57:41 -0700] kerberos_&amp;nbsp;&amp;nbsp;&amp;nbsp; ERROR&amp;nbsp;&amp;nbsp;&amp;nbsp; handle_other(): Mutual authentication unavailable on 200 response&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is the actual error (other than that log message that can be ignored), are you not able to access/use services?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did &amp;nbsp;you examine how the principals were created with the getprinc subcommand of kadmin.local?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 18:07:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/17214#M38224</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2014-08-19T18:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Hue Kerberos error: "TICKET NOT RENEWABLE"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/83478#M38225</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can somebody please help ?&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;kinit: Failed to store credentials: Internal credentials cache error (filename: /hue_krb5_ccache) while getting initial credentials&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:24 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;INFO &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Reinitting kerberos retry attempt 2 from keytab /bin/kinit -k -t /run/cloudera-scm-agent/process/450-hue-KT_RENEWER/hue.keytab -c /hue_krb5_ccache hue/kabo1.unraveldatalab.com@unravel.COM&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:24 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Couldn't reinit from keytab! `kinit' exited with 1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;kinit: Failed to store credentials: Internal credentials cache error (filename: /hue_krb5_ccache) while getting initial credentials&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:24 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;FATAL: max_retries of 3 reached. Exiting...&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:28 ] settings &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;INFO &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Welcome to Hue 3.9.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:31 -0800] __init__ &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;INFO &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Couldn't import snappy. Support for snappy compression disabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:31 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;INFO &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Reinitting kerberos retry attempt 0 from keytab /bin/kinit -k -t /run/cloudera-scm-agent/process/450-hue-KT_RENEWER/hue.keytab -c /hue_krb5_ccache hue/kabo1.unraveldatalab.com@unravel.COM&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:31 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Couldn't reinit from keytab! `kinit' exited with 1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;kinit: Failed to store credentials: Internal credentials cache error (filename: /hue_krb5_ccache) while getting initial credentials&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:34 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;INFO &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Reinitting kerberos retry attempt 1 from keytab /bin/kinit -k -t /run/cloudera-scm-agent/process/450-hue-KT_RENEWER/hue.keytab -c /hue_krb5_ccache hue/kabo1.unraveldatalab.com@unravel.COM&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:34 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Couldn't reinit from keytab! `kinit' exited with 1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;kinit: Failed to store credentials: Internal credentials cache error (filename: /hue_krb5_ccache) while getting initial credentials&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:37 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;INFO &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Reinitting kerberos retry attempt 2 from keytab /bin/kinit -k -t /run/cloudera-scm-agent/process/450-hue-KT_RENEWER/hue.keytab -c /hue_krb5_ccache hue/kabo1.unraveldatalab.com@unravel.COM&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:37 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Couldn't reinit from keytab! `kinit' exited with 1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;kinit: Failed to store credentials: Internal credentials cache error (filename: /hue_krb5_ccache) while getting initial credentials&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;[09/Dec/2018 21:06:37 -0800] kt_renewer &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;FATAL: max_retries of 3 reached. Exiting...&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;\&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[root@kabo1 ~]# cat /etc/krb5.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[libdefaults]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;default_realm = unravel.COM&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;dns_lookup_kdc = false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;dns_lookup_realm = false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ticket_lifetime = 24h &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;renew_lifetime = 7d&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;forwardable = true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;default_tkt_enctypes = aes256-cts-hmac-sha1-96&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;default_tgs_enctypes = aes256-cts-hmac-sha1-96&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;permitted_enctypes = aes256-cts-hmac-sha1-96&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;allow_weak_crypto = true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;udp_preference_limit = 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;kdc_timeout = 3000&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[realms]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;unravel.COM = {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;kdc = kabo1.unraveldatalab.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;admin_server = kabo1.unraveldatalab.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[domain_realm]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[root@kabo1 ~]# cat&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;/var/kerberos/krb5kdc/kdc.conf &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[kdcdefaults]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;kdc_ports = 88&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;kdc_tcp_ports = 88&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;[realms]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;EXAMPLE.COM = {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;#master_key_type = aes256-cts&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;max_renewable_life = 7d 0h 0m 0s&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;acl_file = /var/kerberos/krb5kdc/kadm5.acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;dict_file = /usr/share/dict/words&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;supported_enctypes = aes256-cts:normal aes128-cts:normal des3-hmac-sha1:normal arcfour-hmac:normal camellia256-cts:normal camellia128-cts:normal des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;default_principal_flags = +renewable&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Dec 2018 05:20:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hue-Kerberos-error-quot-TICKET-NOT-RENEWABLE-quot/m-p/83478#M38225</guid>
      <dc:creator>Parwinderjit</dc:creator>
      <dc:date>2018-12-10T05:20:45Z</dc:date>
    </item>
  </channel>
</rss>

