<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Server has invalid Kerberos principal in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140108#M27821</link>
    <description>&lt;P&gt;Were there any issue while kerberizing the cluster? Did it fininshed without any error ?&lt;/P&gt;</description>
    <pubDate>Tue, 10 May 2016 16:32:39 GMT</pubDate>
    <dc:creator>sshimpi</dc:creator>
    <dc:date>2016-05-10T16:32:39Z</dc:date>
    <item>
      <title>Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140106#M27819</link>
      <description>&lt;P&gt;After kerberising the cluster (HDP 2.3.2 on SLES 11.4) many services doesn't start anymore:&lt;/P&gt;&lt;P&gt;Nimbus, Storm Supervisor, HBase Master, Phoenix and the YARN node managers on the nodes other than the Resource Manager&lt;/P&gt;&lt;P&gt;In detail, the YARN log contain the following:&lt;/P&gt;&lt;PRE&gt;org.apache.hadoop.yarn.exceptions.YarnRuntimeException: java.io.IOException: Failed on local exception: java.io.IOException: java.lang.IllegalArgumentException: Server has invalid Kerberos principal: rm/&amp;lt;res_mgr_host&amp;gt;@hdp23cluster; Host Details : local host is: "&amp;lt;nod_mgr_host&amp;gt;/&amp;lt;nod_mgr_ip&amp;gt;"; destination host is: "&amp;lt;res_mgr_host&amp;gt;":8025;&lt;/PRE&gt;&lt;P&gt;On &amp;lt;res_mgr_host&amp;gt; runs the YARN RM, on &amp;lt;nod_mgr_host&amp;gt; run an additional node manager&lt;/P&gt;&lt;P&gt;I've installed a standard kerberos server using zypper and succesfully configured kerberos in Ambari leaving all default values.&lt;/P&gt;&lt;P&gt;On all nodes is configured a proxy, additionally, the &lt;EM&gt;no_proxy&lt;/EM&gt; system variable contains the list of hosts for which the proxy should be ignored: all node hosts + other hosts.&lt;/P&gt;&lt;P&gt;What could be wrong?&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 16:22:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140106#M27819</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-10T16:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140107#M27820</link>
      <description>&lt;P&gt;Hi &lt;A rel="user" href="https://community.cloudera.com/users/3130/openbusinessintelligence.html" nodeid="3130" target="_blank"&gt;@Nicola Marangoni&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Can you login to ambari and click on Kerberos-&amp;gt;Advance and check if the principals are present /created for respective services properly ? Check the screenshot below -&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4126-screen-shot-2016-05-10-at-30008-pm.png" style="width: 1235px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/21794iE23E59B72A8469A7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="4126-screen-shot-2016-05-10-at-30008-pm.png" alt="4126-screen-shot-2016-05-10-at-30008-pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 08:23:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140107#M27820</guid>
      <dc:creator>sshimpi</dc:creator>
      <dc:date>2019-08-19T08:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140108#M27821</link>
      <description>&lt;P&gt;Were there any issue while kerberizing the cluster? Did it fininshed without any error ?&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 16:32:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140108#M27821</guid>
      <dc:creator>sshimpi</dc:creator>
      <dc:date>2016-05-10T16:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140109#M27822</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/3130/openbusinessintelligence.html" nodeid="3130"&gt;@Nicola Marangoni&lt;/A&gt;
&lt;/P&gt;&lt;P&gt;Unless you changed this when editing your log entry for the post, your realm is incorrect.  You have "hdp23cluster" as your realm when it should be in all upper case characters - "HDP23CLUSTER". &lt;/P&gt;&lt;P&gt;To change this, your best bet is to disable Kerberos and then re-enable Kerberos with the correct realm. &lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 20:00:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140109#M27822</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2016-05-10T20:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140110#M27823</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/2648/sshimpi.html" nodeid="2648"&gt;@Sagar Shimpi&lt;/A&gt;: the user exists.&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 20:43:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140110#M27823</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-10T20:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140111#M27824</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;: The realm ist in lower case also in kerberos. Should I indeed enter it in uppercase in Ambari?&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 20:45:54 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140111#M27824</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-10T20:45:54Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140112#M27825</link>
      <description>&lt;P&gt;Technically, if the realm matches in the KDC, the /etc/krb5.conf file, and Ambari, all should work. But I have seen that the MIT Kerberos libraries tend to assume the realm is all uppercase - or maybe it is the internal Hadoop Kerberos logic.  &lt;/P&gt;&lt;P&gt;You can check the MIT libray case by attempting to manually kinit and see if it works.  &lt;/P&gt;&lt;PRE&gt;kinit -kt /etc/security/keytabs/rm.service.keytab  rm/&amp;lt;res_mgr_host&amp;gt;@hdp23cluster&lt;/PRE&gt;&lt;P&gt;In any case, I would disable Kerberos in Ambari, rebuild the KDC using the uppercase form of the realm, and then re-enable Kerberos. If it doesn't work after this, we can at least rule out the case-sensitivity issue. &lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 21:01:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140112#M27825</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2016-05-10T21:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140113#M27826</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;&lt;P&gt;Thank you for the tip, after recreating and re-configuring everything with an uppercase realm, it still doesn't work.&lt;/P&gt;&lt;P&gt;However, I have noticed that the keytab rm.service.keytab is present on the RM host, but not in the other hosts.&lt;/P&gt;&lt;P&gt;Should the keytab be present on every host? If yes, than the automatic deployment of the keytabs doesn't work well.&lt;/P&gt;&lt;P&gt;Keytabs on the non-RM node:&lt;/P&gt;&lt;PRE&gt;dn.service.keytab
hbase.headless.keytab
hdfs.headless.keytab
knox.service.keytab
nfs.service.keytab
nm.service.keytab
nn.service.keytab
smokeuser.headless.keytab
spark.headless.keytab
spnego.service.keytab
zk.service.keytab
&lt;/PRE&gt;&lt;P&gt;Keytabs on the RM node:&lt;/P&gt;&lt;PRE&gt;dn.service.keytab
hbase.headless.keytab
hdfs.headless.keytab
hive.service.keytab
jhs.service.keytab
nfs.service.keytab
nm.service.keytab
nn.service.keytab
oozie.service.keytab
rm.service.keytab
sbetp.headless.keytab
smokeuser.headless.keytab
spark.headless.keytab
spnego.service.keytab
yarn.service.keytab
zk.service.keytab
&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 May 2016 23:09:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140113#M27826</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-10T23:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140114#M27827</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt;&lt;P&gt;The command&lt;/P&gt;&lt;PRE&gt;kinit -kt /etc/security/keytabs/rm.service.keytab  rm/&amp;lt;res_mgr_host&amp;gt;@hdp23cluster&lt;/PRE&gt;&lt;P&gt;works only on the RM-node, maybe because of the missing keytab.&lt;/P&gt;&lt;P&gt;After copying the rm.service.keytab on all nodes the command works in the console, but the node manager fails again with the same error "Server has invalid Kerberos principal".&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 23:53:30 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140114#M27827</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-10T23:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140115#M27828</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/3130/openbusinessintelligence.html" nodeid="3130"&gt;@Nicola Marangoni&lt;/A&gt;&lt;P&gt;The keytabs are only distributed to the hosts on which they are needed. So I do not expect all keytab file to be distributed to all hosts. &lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 23:54:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140115#M27828</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2016-05-10T23:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140116#M27829</link>
      <description>&lt;P&gt;I only expect a keytab file to work on the particular host it was distributed to. This is because the service principals have the hostname where the service is running embedded in its name.  So it is not recommended to copy them around. &lt;/P&gt;&lt;P&gt;That said, you might want to make sure that the hostname of the hosts is being represented the same via the different mechanisms for getting the host's name.  &lt;/P&gt;&lt;P&gt;For example,  &lt;EM&gt;&lt;STRONG&gt;hostname -f&lt;/STRONG&gt;&lt;/EM&gt; should be the fully qualified domain name (FQDN) of the host and return the same FQDN that was used to register with Ambari. &lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 23:59:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140116#M27829</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2016-05-10T23:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140117#M27830</link>
      <description>&lt;P&gt;This appears to be FQDN issue. Does your DNS resolution happen through a DNS server or hosts file? if it is hosts file make sure all nodes have fqdn followed by their assigned IP address. &lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2016 03:40:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140117#M27830</guid>
      <dc:creator>PranayV</dc:creator>
      <dc:date>2016-05-11T03:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140118#M27831</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas&lt;/A&gt; &lt;A rel="user" href="https://community.cloudera.com/users/768/pvyas.html" nodeid="768"&gt;@Pranay Vyas&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Name resolution works over a DNS server, but Kerberos seems to ignore it.&lt;/P&gt;&lt;P&gt;Adding IP/Hosts to the /etc/hosts file seems to help, so thank you for the tip!&lt;/P&gt;&lt;P&gt;However, this doesn't solve the problem but generate a different error message:&lt;/P&gt;&lt;PRE&gt;org.apache.hadoop.yarn.exceptions.YarnRuntimeException: org.apache.hadoop.security.authorize.AuthorizationException: User nm/msas6502i.msg.de@HDP23CLUSTER (auth:KERBEROS) is not authorized for protocol interface org.apache.hadoop.yarn.server.api.ResourceTrackerPB, expected client Kerberos principal is nm/10.100.233.13@HDP23CLUSTER&lt;/PRE&gt;</description>
      <pubDate>Wed, 11 May 2016 14:31:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140118#M27831</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-11T14:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140119#M27832</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/322/rlevas.html" nodeid="322"&gt;@Robert Levas &lt;/A&gt;&lt;A rel="user" href="https://community.cloudera.com/users/768/pvyas.html" nodeid="768"&gt;@Pranay Vyas&lt;/A&gt;
It was definitively a DNS problem: Kerberos can't use the DNS, it can resolve names only over /etc/hosts&lt;P&gt;Many thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2016 16:24:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140119#M27832</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-11T16:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Server has invalid Kerberos principal</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140120#M27833</link>
      <description>&lt;P&gt;I had to unkerberize and rekerberize the cluster, now it works!&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2016 16:45:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Server-has-invalid-Kerberos-principal/m-p/140120#M27833</guid>
      <dc:creator>openbusinessintelligence</dc:creator>
      <dc:date>2016-05-11T16:45:12Z</dc:date>
    </item>
  </channel>
</rss>

