<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Has anyone done distcp between secured clusters but different REALM? in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97582#M11050</link>
    <description>&lt;P&gt;I have not done distcp with different Kerberos REALMS, but I think this should be possible. Our documentation only mentions &lt;EM&gt;"&lt;/EM&gt;&lt;EM&gt;same principal name must be assigned to the applicable NameNodes"&lt;/EM&gt;, so that auth_to_local configuration can calculate the same username on both sides (Kerberos principal: nn/host1@realm will be user "nn"). As long as the different realms use the same KDC or the KDCs trust each other, this should be possible.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Nov 2015 14:10:11 GMT</pubDate>
    <dc:creator>jstraub</dc:creator>
    <dc:date>2015-11-25T14:10:11Z</dc:date>
    <item>
      <title>Has anyone done distcp between secured clusters but different REALM?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97581#M11049</link>
      <description>&lt;P&gt;As long as reading &lt;A href="http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_Sys_Admin_Guides/content/ref-263ee41f-a0a9-4dea-ad4a-b3c257b8e188.1.html" target="_blank"&gt;http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_Sys_Admin_Guides/content/ref-263ee41f-a0a9-4dea-ad4a-b3c257b8e188.1.html&lt;/A&gt; , looks like implying same realm.&lt;/P&gt;&lt;P&gt;Even Cloudera mentions Distinct Realms... &lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cloudera.com/content/www/en-us/documentation/enterprise/latest/topics/cdh_admin_distcp_data_cluster_migrate.html#concept_hcs_srr_sr_unique_1" target="_blank"&gt;http://www.cloudera.com/content/www/en-us/documentation/enterprise/latest/topics/cdh_admin_distcp_data_cluster_migrate.html#concept_hcs_srr_sr_unique_1&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 13:57:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97581#M11049</guid>
      <dc:creator>hosako</dc:creator>
      <dc:date>2015-11-25T13:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done distcp between secured clusters but different REALM?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97582#M11050</link>
      <description>&lt;P&gt;I have not done distcp with different Kerberos REALMS, but I think this should be possible. Our documentation only mentions &lt;EM&gt;"&lt;/EM&gt;&lt;EM&gt;same principal name must be assigned to the applicable NameNodes"&lt;/EM&gt;, so that auth_to_local configuration can calculate the same username on both sides (Kerberos principal: nn/host1@realm will be user "nn"). As long as the different realms use the same KDC or the KDCs trust each other, this should be possible.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 14:10:11 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97582#M11050</guid>
      <dc:creator>jstraub</dc:creator>
      <dc:date>2015-11-25T14:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done distcp between secured clusters but different REALM?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97583#M11051</link>
      <description>&lt;P&gt;Search of Hortonworks documentation indicates the following three requirements, besides general Kerberos correct setup:&lt;/P&gt;&lt;P&gt;1. Both clusters must be using Java 1.7 or better if you are using MIT kerberos.  Java 1.6 has too many known bugs with cross-realm trust; eg see ref &lt;A href="http://bugs.java.com/bugdatabase/view_bug.do?bug_id=7061379"&gt;http://bugs.java.com/bugdatabase/view_bug.do?bug_id=7061379&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. The same principal name must be assigned to the NameNodes in both the source and the destination cluster.  For example, if the Kerberos principal name of the NameNode in cluster A is nn/host1@realm, the Kerberos principal name of the NameNode in cluster B must be nn/host2@realm, &lt;EM&gt;not&lt;/EM&gt;, for example, nn2/host2@realm; see ref &lt;A href="http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_Sys_Admin_Guides/content/ref-263ee41f-a0a9-4dea-ad4a-b3c257b8e188.1.html"&gt;http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_Sys_Admin_Guides/content/ref-263ee41f-a0a9-4dea-ad4a-b3c257b8e188.1.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3. Bi-directional cross-realm trust must be set up.  Correct trust setup can be tested by running an hdfs client on a node from cluster A and see if you can put a file or list a directory on cluster B, and vice versa; credit Robert Molina in the old Hortonworks Forums, &lt;A href="https://hortonworks.com/community/forums/topic/hadoop-distcp-between-two-secured-clusters/#post-49303"&gt;post-49303&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Note: the key statement for items #2 and #3 is that "It is important that each NodeManager can reach and communicate with both the source and destination file systems"; see ref &lt;A href="https://hadoop.apache.org/docs/r2.7.1/hadoop-distcp/DistCp.html"&gt;https://hadoop.apache.org/docs/r2.7.1/hadoop-distcp/DistCp.html&lt;/A&gt;. Therefore the trust must be bi-directional.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 04:06:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97583#M11051</guid>
      <dc:creator>mfoley</dc:creator>
      <dc:date>2015-11-26T04:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done distcp between secured clusters but different REALM?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97584#M11052</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/536/mfoley.html" nodeid="536"&gt;@Matt Foley&lt;/A&gt;&lt;P&gt;I have followed the same steps and when i do distcp between 2 secured HA cluster yarn throws failed  to renew token error  kind HDFS_DELGATION_TOKEN service: ha-hdfs . i am able to do hadoop fs -ls using the HA on both the cluster.  Bothe the cluster has MIT KDC and cross realm setup is done. Bothe the cluster has the same namenode principal. Is there anything else that i need to do? &lt;/P&gt;&lt;P&gt;Just an info , when i change the framework from yarn to MR in mapred-client.xml, i am able to do distcp . when i use the yarn framework i get the above error.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 00:32:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97584#M11052</guid>
      <dc:creator>sprakash</dc:creator>
      <dc:date>2016-06-22T00:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done distcp between secured clusters but different REALM?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97585#M11053</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/3917/sprakash.html" nodeid="3917"&gt;@sprakash&lt;/A&gt;
&lt;P&gt;The fact that distcp works with some configurations indicates you probably have Security set up right, as well as giving you an obvious work-around.  To try to answer your question, please provide some clarifying information:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;When you speak of mapred-client.xml, do you mean mapred-site.xml on the client machine?&lt;/LI&gt;&lt;LI&gt;When you speak of changing the framework, do you mean the "mapreduce.framework.name" configuration parameter in mapred-side.xml?  &lt;/LI&gt;&lt;LI&gt;Do you change it only on the client machine, or throughout both clusters?&lt;/LI&gt;&lt;LI&gt;The allowed values of that parameter are "local", "classic", and "yarn".  When you change it to not be "yarn", what do you set it to?&lt;/LI&gt;&lt;LI&gt;Do you have "mapreduce.application.framework.path" set?  If so, to what value?&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 24 Jun 2016 03:35:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Has-anyone-done-distcp-between-secured-clusters-but/m-p/97585#M11053</guid>
      <dc:creator>mfoley</dc:creator>
      <dc:date>2016-06-24T03:35:02Z</dc:date>
    </item>
  </channel>
</rss>

