<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos KDC secondary in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-KDC-secondary/m-p/149051#M32531</link>
    <description>&lt;P&gt;I generally recommend letting DNS handle this. The latest versions of the KRB client will default to resolving the KDC from SRV records in the DNS for the realm. This should be configured by default if you use Microsoft Active Directory (or AWS Simple AD). &lt;/P&gt;&lt;P&gt;If you want it explicit in your krb5.conf file, you can use DNS round robin with the A/AAA/CNAME and reference that name in krb5.conf. Further, you could have multiple "kdc" entries for a realm in krb5.conf and a master_kdc entry which is only used when there are certain kinds of issues.&lt;/P&gt;&lt;P&gt;You can always manage the krb5.conf from Ambari inside the Kerberos component configs.&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jun 2016 01:45:05 GMT</pubDate>
    <dc:creator>ewalk</dc:creator>
    <dc:date>2016-06-22T01:45:05Z</dc:date>
    <item>
      <title>Kerberos KDC secondary</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-KDC-secondary/m-p/149050#M32530</link>
      <description>&lt;P&gt;Has anyone tried to have a secondary KDC. In production definitely it is not a good approach to have the KDC as a single point of failure. any thoughts or anyone has the steps with them.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 10:26:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-KDC-secondary/m-p/149050#M32530</guid>
      <dc:creator>arunpoy</dc:creator>
      <dc:date>2022-09-16T10:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos KDC secondary</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-KDC-secondary/m-p/149051#M32531</link>
      <description>&lt;P&gt;I generally recommend letting DNS handle this. The latest versions of the KRB client will default to resolving the KDC from SRV records in the DNS for the realm. This should be configured by default if you use Microsoft Active Directory (or AWS Simple AD). &lt;/P&gt;&lt;P&gt;If you want it explicit in your krb5.conf file, you can use DNS round robin with the A/AAA/CNAME and reference that name in krb5.conf. Further, you could have multiple "kdc" entries for a realm in krb5.conf and a master_kdc entry which is only used when there are certain kinds of issues.&lt;/P&gt;&lt;P&gt;You can always manage the krb5.conf from Ambari inside the Kerberos component configs.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 01:45:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-KDC-secondary/m-p/149051#M32531</guid>
      <dc:creator>ewalk</dc:creator>
      <dc:date>2016-06-22T01:45:05Z</dc:date>
    </item>
  </channel>
</rss>

