<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos Generate Credentials fails in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/80227#M41958</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;when enable Kerberos on new cluster after restart the failed installation got the error message&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="command-container"&gt;&lt;SPAN&gt;Generate Missing Credentials&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="muted"&gt;Command&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="modal in modal-xl"&gt;&lt;DIV class="modal-dialog"&gt;&lt;DIV class="modal-content"&gt;&lt;DIV class="modal-body "&gt;&lt;DIV class="command-container"&gt;&lt;PRE&gt;/usr/share/cmf/bin/gen_credentials.sh failed with exit code 1 and output of &amp;lt;&amp;lt;
+ export PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/usr/lib/mit/bin:/usr/bin:/sbin:/usr/sbin:/bin:/usr/bin
+ PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/usr/lib/mit/bin:/usr/bin:/sbin:/usr/sbin:/bin:/usr/bin
+ CMF_REALM=HADM.RU
+ KEYTAB_OUT=/var/run/cloudera-scm-server/cmf5888901524077791261.keytab
+ PRINC=mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU
+ MAX_RENEW_LIFE=604800
+ KADMIN='kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU'
+ RENEW_ARG=
+ '[' 604800 -gt 0 ']'
+ RENEW_ARG='-maxrenewlife "604800 sec"'
+ '[' -z /etc/krb5.conf ']'
+ echo 'Using custom config path '\''/etc/krb5.conf'\'', contents below:'
+ cat /etc/krb5.conf
+ kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU -q 'addprinc -maxrenewlife "604800 sec" -randkey mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU'
WARNING: no policy specified for mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU; defaulting to no policy
add_principal: Principal or policy already exists while creating "mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU".
+ '[' 604800 -gt 0 ']'
++ kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU -q 'getprinc -terse mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU'
++ tail -1
++ cut -f 12
+ RENEW_LIFETIME=0
+ '[' 0 -eq 0 ']'
+ echo 'Unable to set maxrenewlife'
+ exit 1

&amp;gt;&amp;gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;Close&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;Redhat 7.5 linux&amp;nbsp; &amp;nbsp;Cloudera Manager 5.12.1&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 24 Sep 2018 05:33:10 GMT</pubDate>
    <dc:creator>techfriend</dc:creator>
    <dc:date>2018-09-24T05:33:10Z</dc:date>
    <item>
      <title>Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27695#M41953</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to configure kerberos on a single user installation.&lt;/P&gt;&lt;P&gt;I've created the cloudera-scm/admin@MYREALM.COM and was able to kinit it manually but I keep falling at the Generate Credentials phase:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;/usr/share/cmf/bin/gen_credentials.sh failed with exit code 1 and output of &amp;lt;&amp;lt;&lt;BR /&gt;+ export PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/sbin:/usr/sbin:/bin:/usr/bin&lt;BR /&gt;+ PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/sbin:/usr/sbin:/bin:/usr/bin&lt;BR /&gt;+ CMF_REALM=MYREALM.COM&lt;BR /&gt;+ KEYTAB_OUT=/var/run/cloudera-scm-server/cmf470480807619850998.keytab&lt;BR /&gt;+ PRINC=yarn/datanode003.domain.com@MYREALM.COM&lt;BR /&gt;+ MAX_RENEW_LIFE=604800&lt;BR /&gt;+ KADMIN='kadmin -k -t /var/run/cloudera-scm-server/cmf7525098316801008285.keytab -p cloudera-scm/admin@MYREALM.COM -r MYREALM.COM'&lt;BR /&gt;+ RENEW_ARG=&lt;BR /&gt;+ '[' 604800 -gt 0 ']'&lt;BR /&gt;+ RENEW_ARG='-maxrenewlife "604800 sec"'&lt;BR /&gt;+ '[' -z /var/run/cloudera-scm-server/krb58981110957643724339.conf ']'&lt;BR /&gt;+ echo 'Using custom config path '\''/var/run/cloudera-scm-server/krb58981110957643724339.conf'\'', contents below:'&lt;BR /&gt;+ cat /var/run/cloudera-scm-server/krb58981110957643724339.conf&lt;BR /&gt;+ kadmin -k -t /var/run/cloudera-scm-server/cmf7525098316801008285.keytab -p cloudera-scm/admin@MYREALM.COM -r MYREALM.COM -q 'addprinc -maxrenewlife "604800 sec" -randkey yarn/datanode003.domain.com@MYREALM.COM'&lt;BR /&gt;WARNING: no policy specified for yarn/datanode003.domain.com@MYREALM.COM; defaulting to no policy&lt;BR /&gt;add_principal: Operation requires ``add'' privilege while creating "yarn/datanode003.domain.com@MYREALM.COM".&lt;BR /&gt;+ '[' 604800 -gt 0 ']'&lt;BR /&gt;++ kadmin -k -t /var/run/cloudera-scm-server/cmf7525098316801008285.keytab -p cloudera-scm/admin@MYREALM.COM -r MYREALM.COM -q 'getprinc -terse yarn/datanode003.domain.com@MYREALM.COM'&lt;BR /&gt;++ tail -1&lt;BR /&gt;++ cut -f 12&lt;BR /&gt;get_principal: Operation requires ``get'' privilege while retrieving "yarn/datanode003.domain.com@MYREALM.COM".&lt;BR /&gt;+ RENEW_LIFETIME='Authenticating as principal cloudera-scm/admin@MYREALM.COM with keytab /var/run/cloudera-scm-server/cmf7525098316801008285.keytab.'&lt;BR /&gt;+ '[' Authenticating as principal cloudera-scm/admin@MYREALM.COM with keytab /var/run/cloudera-scm-server/cmf7525098316801008285.keytab. -eq 0 ']'&lt;BR /&gt;/usr/share/cmf/bin/gen_credentials.sh: line 35: [: too many arguments&lt;BR /&gt;+ kadmin -k -t /var/run/cloudera-scm-server/cmf7525098316801008285.keytab -p cloudera-scm/admin@MYREALM.COM -r MYREALM.COM -q 'xst -k /var/run/cloudera-scm-server/cmf470480807619850998.keytab yarn/datanode003.domain.com@MYREALM.COM'&lt;BR /&gt;kadmin: Operation requires ``change-password'' privilege while changing yarn/avpr-dhc003.lpdomain.com@MYREALM.COM's key&lt;BR /&gt;+ chmod 600 /var/run/cloudera-scm-server/cmf470480807619850998.keytab&lt;BR /&gt;chmod: cannot access `/var/run/cloudera-scm-server/cmf470480807619850998.keytab': No such file or directory&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 09:29:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27695#M41953</guid>
      <dc:creator>danielLP</dc:creator>
      <dc:date>2022-09-16T09:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27851#M41954</link>
      <description>Anyone ?&lt;span class="lia-unicode-emoji" title=":neutral_face:"&gt;😐&lt;/span&gt;</description>
      <pubDate>Sat, 23 May 2015 09:06:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27851#M41954</guid>
      <dc:creator>danielLP</dc:creator>
      <dc:date>2015-05-23T09:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27852#M41955</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as you read through&amp;nbsp;the error message, (the middle here being signficant) this line appears to be indicating at least part of the problem, as well as the others like it, that follow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;add_principal: Operation requires ``add'' privilege while creating "yarn/datanode003.domain.com@MYREALM.COM".&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You would want to review your /var/kerberos/krb5kdc/kadmin5.acl file. Verify if the name pattern you are using for the CM administrator will properly resolve to an administrative account.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 May 2015 11:48:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27852#M41955</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2015-05-23T11:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27890#M41956</link>
      <description>Hi,&lt;BR /&gt;The problem was indeed the kadm5.acl file where I had a typo in the realm name.&lt;BR /&gt;&lt;BR /&gt;Thank you!</description>
      <pubDate>Mon, 25 May 2015 10:58:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/27890#M41956</guid>
      <dc:creator>danielLP</dc:creator>
      <dc:date>2015-05-25T10:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/48326#M41957</link>
      <description>&lt;P&gt;There are a few files to change for realm renaming.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 20:44:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/48326#M41957</guid>
      <dc:creator>zhuw.bigdata</dc:creator>
      <dc:date>2016-12-05T20:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/80227#M41958</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;when enable Kerberos on new cluster after restart the failed installation got the error message&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="command-container"&gt;&lt;SPAN&gt;Generate Missing Credentials&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="muted"&gt;Command&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="modal in modal-xl"&gt;&lt;DIV class="modal-dialog"&gt;&lt;DIV class="modal-content"&gt;&lt;DIV class="modal-body "&gt;&lt;DIV class="command-container"&gt;&lt;PRE&gt;/usr/share/cmf/bin/gen_credentials.sh failed with exit code 1 and output of &amp;lt;&amp;lt;
+ export PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/usr/lib/mit/bin:/usr/bin:/sbin:/usr/sbin:/bin:/usr/bin
+ PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/usr/lib/mit/bin:/usr/bin:/sbin:/usr/sbin:/bin:/usr/bin
+ CMF_REALM=HADM.RU
+ KEYTAB_OUT=/var/run/cloudera-scm-server/cmf5888901524077791261.keytab
+ PRINC=mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU
+ MAX_RENEW_LIFE=604800
+ KADMIN='kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU'
+ RENEW_ARG=
+ '[' 604800 -gt 0 ']'
+ RENEW_ARG='-maxrenewlife "604800 sec"'
+ '[' -z /etc/krb5.conf ']'
+ echo 'Using custom config path '\''/etc/krb5.conf'\'', contents below:'
+ cat /etc/krb5.conf
+ kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU -q 'addprinc -maxrenewlife "604800 sec" -randkey mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU'
WARNING: no policy specified for mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU; defaulting to no policy
add_principal: Principal or policy already exists while creating "mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU".
+ '[' 604800 -gt 0 ']'
++ kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU -q 'getprinc -terse mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU'
++ tail -1
++ cut -f 12
+ RENEW_LIFETIME=0
+ '[' 0 -eq 0 ']'
+ echo 'Unable to set maxrenewlife'
+ exit 1

&amp;gt;&amp;gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;Close&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="modal-footer"&gt;Redhat 7.5 linux&amp;nbsp; &amp;nbsp;Cloudera Manager 5.12.1&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 24 Sep 2018 05:33:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/80227#M41958</guid>
      <dc:creator>techfriend</dc:creator>
      <dc:date>2018-09-24T05:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/360945#M238468</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/28803"&gt;@techfriend&lt;/a&gt;&amp;nbsp;this can be resolved after modifiying the principle.&lt;/P&gt;&lt;PRE&gt;WARNING: no policy specified for mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU; defaulting to no policy
add_principal: Principal or policy already exists while creating "mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU".
+ '[' 604800 -gt 0 ']'
++ kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU -q 'getprinc -terse mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU'
++ tail -1
++ cut -f 12
+ RENEW_LIFETIME=0
+ '[' 0 -eq 0 ']'
+ echo 'Unable to set maxrenewlife'
+ exit 1&lt;/PRE&gt;&lt;P&gt;Login to kadmin.local shell then modify the principle using below comamnd.&lt;/P&gt;&lt;PRE&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;kadmin.local&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;modprinc -maxrenewlife 90day +allow_renewable&amp;nbsp;mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 13:30:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/360945#M238468</guid>
      <dc:creator>Kartik_Agarwal</dc:creator>
      <dc:date>2023-01-10T13:30:23Z</dc:date>
    </item>
    <item>
      <title>Kerberos Generate Credentials fails</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/361481#M238604</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/28803"&gt;@techfriend&lt;/a&gt;&amp;nbsp;this can be resolved after modifiying the principle.&lt;/P&gt;&lt;PRE&gt;WARNING: no policy specified for mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU; defaulting to no policy
add_principal: Principal or policy already exists while creating "mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU".
+ '[' 604800 -gt 0 ']'
++ kadmin -k -t /var/run/cloudera-scm-server/cmf5922922234613877041.keytab -p cloudera-scm/admin@HADM.RU -r HADM.RU -q 'getprinc -terse mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU'
++ tail -1
++ cut -f 12
+ RENEW_LIFETIME=0
+ '[' 0 -eq 0 ']'
+ echo 'Unable to set maxrenewlife'
+ exit 1&lt;/PRE&gt;&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;modprinc -maxrenewlife 90day +allow_renewable&amp;nbsp;mapred/ip-172-31-46-169.us-west-2.compute.internal@HADM.RU&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 07:44:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-Generate-Credentials-fails/m-p/361481#M238604</guid>
      <dc:creator>Kartik_Agarwal</dc:creator>
      <dc:date>2023-01-17T07:44:40Z</dc:date>
    </item>
  </channel>
</rss>

