<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Getting error when add new service in Cluster after enable Kerberos in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49071#M50766</link>
    <description>&lt;P&gt;Cloudera Manager will create the necessary keytabs automatically when adding a service to a Kerberos-enabled cluster.&lt;/P&gt;&lt;P&gt;Based on your exception when attempting to manually generate the crednetials, the user you have configured as your Cloudera Manager Principal is not an admin (does not have 'get' privilege to create principals).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see the information here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s3_cm_principal.html" target="_blank"&gt;http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s3_cm_principal.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that when using MIT KDC, admin access is defined in&amp;nbsp;/var/kerberos/krb5kdc/kadm5.acl&lt;/P&gt;&lt;P&gt;See this for more info:&lt;/P&gt;&lt;P&gt;&lt;A href="https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/kadm5_acl.html" target="_blank"&gt;https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/kadm5_acl.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To give any principal with "/admin" all privileges, you could use the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;*/admin@REALM.COM *&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After you have made sure you have a user created in the KDC (cloudera-scm/admin@REALM.COM for example), you can import those credentials as described here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s4_kerb_wizard.html#concept_ann_x5y_l4" target="_blank"&gt;http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s4_kerb_wizard.html#concept_ann_x5y_l4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, hosts always need to have a valid fully-qualified Domain Name (FQDN). &amp;nbsp;When you redacted information in your principal, I see you mention:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All principals in your CDH cluster should have the format of "name/FQDN@REALM"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance:&lt;/P&gt;&lt;P&gt;solr/solrhost.example.com@EXAMPLE.COM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure all of your cluster hosts resolve their FQDNs via forward and reverse DNS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jan 2017 17:08:20 GMT</pubDate>
    <dc:creator>bgooley</dc:creator>
    <dc:date>2017-01-04T17:08:20Z</dc:date>
    <item>
      <title>Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49070#M50765</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CDH 5.7.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used to add new services in our cluster using Cloudera Manager without any issue before enable Kerberos. We have installed/enabled Kerberos now and everything is good for the existing services&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I want to add new service (Solr) and getting the following error&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Start Solr: Failed to start service

&lt;SPAN&gt;Execute command Start this Solr Server on role Solr Server: &lt;/SPAN&gt;Command failed to run because this role has invalid configuration. &lt;BR /&gt;Review and correct its configuration. First error: Role is missing Kerberos keytab. &lt;BR /&gt;Please run the Generate Missing Credentials command on the &lt;BR /&gt;Kerberos Credentials tab of the Administration -&amp;gt; Security page&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hv tried to Generate Missing Credentials in Admin -&amp;gt; security page but it end up with following error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;/usr/share/cmf/bin/gen_credentials.sh failed with exit code 1 and output of &amp;lt;&amp;lt;
+ export PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/usr/lib/mit/bin:/usr/bin:/sbin:/usr/sbin:/bin:/usr/bin
+ PATH=/usr/kerberos/bin:/usr/kerberos/sbin:/usr/lib/mit/sbin:/usr/sbin:/usr/lib/mit/bin:/usr/bin:/sbin:/usr/sbin:/bin:/usr/bin
+ CMF_REALM=REALM.COM
+ KEYTAB_OUT=/var/run/cloudera-scm-server/cmf6942980384105255302.keytab
+ PRINC=solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
+ MAX_RENEW_LIFE=432000
+ KADMIN='kadmin -k -t /var/run/cloudera-scm-server/cmf2028852611455413307.keytab -p root/admin@REALM.COM -r REALM.COM'
+ RENEW_ARG=
+ '[' 432000 -gt 0 ']'
+ RENEW_ARG='-maxrenewlife "432000 sec"'
+ '[' -z /var/run/cloudera-scm-server/krb5920427054266466413.conf ']'
+ echo 'Using custom config path '\''/var/run/cloudera-scm-server/krb5920427054266466413.conf'\'', contents below:'
+ cat /var/run/cloudera-scm-server/krb5920427054266466413.conf
+ kadmin -k -t /var/run/cloudera-scm-server/cmf2028852611455413307.keytab -p root/admin@REALM.COM -r REALM.COM -q 'addprinc -maxrenewlife "432000 sec" -randkey solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM'
WARNING: no policy specified for solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM; defaulting to no policy
add_principal: Operation requires ``add'' privilege while creating "solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM".
+ '[' 432000 -gt 0 ']'
++ kadmin -k -t /var/run/cloudera-scm-server/cmf2028852611455413307.keytab -p root/admin@REALM.COM -r REALM.COM -q 'getprinc -terse solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM'
++ tail -1
++ cut -f 12
get_principal: Operation requires ``get'' privilege while retrieving "solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM".
+ RENEW_LIFETIME='Authenticating as principal root/admin@REALM.COM with keytab /var/run/cloudera-scm-server/cmf2028852611455413307.keytab.'
+ '[' Authenticating as principal root/admin@REALM.COM with keytab /var/run/cloudera-scm-server/cmf2028852611455413307.keytab. -eq 0 ']'
/usr/share/cmf/bin/gen_credentials.sh: line 35: [: too many arguments
+ kadmin -k -t /var/run/cloudera-scm-server/cmf2028852611455413307.keytab -p root/admin@REALM.COM -r REALM.COM -q 'xst -k /var/run/cloudera-scm-server/cmf6942980384105255302.keytab solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM'
kadmin: Operation requires ``change-password'' privilege while changing solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM's key
+ chmod 600 /var/run/cloudera-scm-server/cmf6942980384105255302.keytab
chmod: cannot access `/var/run/cloudera-scm-server/cmf6942980384105255302.keytab': No such file or directory

&amp;gt;&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I've manually added "solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM" using kadmin.local and tried to import from&amp;nbsp;&lt;SPAN&gt;Admin -&amp;gt; security page.. no luck&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;so now my questions are&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. Is there any prequest to add a new service in Kerberoized cluster? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. I cannot simply press "Generate Missing Credentials in Admin -&amp;gt; security page" Becuase How does my cluster knows which service I am going to add... it can be Solr, or something else?? Still I tried but it says nothing to generate&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kumar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 16:52:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49070#M50765</guid>
      <dc:creator>saranvisa</dc:creator>
      <dc:date>2017-01-04T16:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49071#M50766</link>
      <description>&lt;P&gt;Cloudera Manager will create the necessary keytabs automatically when adding a service to a Kerberos-enabled cluster.&lt;/P&gt;&lt;P&gt;Based on your exception when attempting to manually generate the crednetials, the user you have configured as your Cloudera Manager Principal is not an admin (does not have 'get' privilege to create principals).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see the information here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s3_cm_principal.html" target="_blank"&gt;http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s3_cm_principal.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that when using MIT KDC, admin access is defined in&amp;nbsp;/var/kerberos/krb5kdc/kadm5.acl&lt;/P&gt;&lt;P&gt;See this for more info:&lt;/P&gt;&lt;P&gt;&lt;A href="https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/kadm5_acl.html" target="_blank"&gt;https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/kadm5_acl.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To give any principal with "/admin" all privileges, you could use the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;*/admin@REALM.COM *&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After you have made sure you have a user created in the KDC (cloudera-scm/admin@REALM.COM for example), you can import those credentials as described here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s4_kerb_wizard.html#concept_ann_x5y_l4" target="_blank"&gt;http://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_s4_kerb_wizard.html#concept_ann_x5y_l4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, hosts always need to have a valid fully-qualified Domain Name (FQDN). &amp;nbsp;When you redacted information in your principal, I see you mention:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All principals in your CDH cluster should have the format of "name/FQDN@REALM"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance:&lt;/P&gt;&lt;P&gt;solr/solrhost.example.com@EXAMPLE.COM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure all of your cluster hosts resolve their FQDNs via forward and reverse DNS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 17:08:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49071#M50766</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2017-01-04T17:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49073#M50767</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&amp;nbsp;Thanks for quick reply. Let me double check all the points that you have mentioned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the mean time, I am still not clear with one point....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I believe my /var/kerberos/krb5kdc/kadm5.acl and other configurations are fine, because&amp;nbsp;&lt;/SPAN&gt;As I mentioned already, all the existing services (HDFS, Hive, Impala, Oozie, Hue, etc) are working fine. If there is a problem with my configuration, I should get the same error for my the existing services right..&amp;nbsp;why should I get error for only new service?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only difference between existing and new services are&lt;/P&gt;&lt;P&gt;1. Existing services are added before enable Kerberos (everything is ok)&lt;/P&gt;&lt;P&gt;2. Trying to add New services now after enable Kerberos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any idea?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 17:32:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49073#M50767</guid>
      <dc:creator>saranvisa</dc:creator>
      <dc:date>2017-01-04T17:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49074#M50768</link>
      <description>&lt;P&gt;No problem...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The attempt to manually generate credentials fails when the "kadmin" command fails:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;kadmin -k -t /var/run/cloudera-scm-server/cmf2028852611455413307.keytab -p root/admin@REALM.COM -r REALM.COM -q 'addprinc -maxrenewlife "432000 sec" -randkey solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;add_principal: Operation requires ``add'' privilege while creating "solr/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM".&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means that the user that the principal that Cloudera Manager used to execute the kadmin command did not have privilege to add the principal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can try running the same kadmin command from the command line on the Cloudera Manager host to see if you get the same error. &amp;nbsp;If you do, make sure that the kadm5.acl is correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also note that the generate credentials process must create the principals; it cannot import existing principals created in the KDC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Ben&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 17:39:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49074#M50768</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2017-01-04T17:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49075#M50769</link>
      <description>&lt;P&gt;Note on my last message:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The keytab file referenced in the kadmin command issued by Cloudera Manager is removed by CM after the generate credentials is run. &amp;nbsp;So, you'll need to remove the "&lt;SPAN&gt;-k -t /var/run/cloudera-scm-server/cmf202885261145541330&lt;/SPAN&gt;&lt;SPAN&gt;7.keytab" part of the kadmin command so you can be promted for the password.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 17:41:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49075#M50769</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2017-01-04T17:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49082#M50770</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&amp;nbsp;You are correct, I am getting the privilege error when I use kadmin but it is working fine with kadmin.local... I understand Generate Missing Credential will use kadmin instead of kadmin.local, so this is causing the trouble.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[root@abc]# kadmin
Authenticating as principal root/admin@REALM.COM with password.
Password for root/admin@REALM.COM:
kadmin:  addprinc -maxrenewlife "432000 sec" -randkey -pw hadoop1 solr/&amp;lt;&amp;lt;my_IP&amp;gt;&amp;gt;@REALM.COM
WARNING: no policy specified for solr/&amp;lt;&amp;lt;my_IP&amp;gt;&amp;gt;@REALM.COM; defaulting to no policy
add_principal: Operation requires ``add'' privilege while creating "solr/&amp;lt;&amp;lt;my_IP&amp;gt;&amp;gt;@REALM.COM".c

[root@abc]# kadmin.local
kadmin.local:  addprinc -maxrenewlife "432000 sec" -randkey -pw hadoop1 solr/&amp;lt;&amp;lt;my_IP&amp;gt;&amp;gt;@REALM.COM
WARNING: no policy specified for solr/&amp;lt;&amp;lt;my_IP&amp;gt;&amp;gt;@REALM.COM; defaulting to no policy
Principal "solr/&amp;lt;&amp;lt;my_IP&amp;gt;&amp;gt;@REALM.COM" created.&lt;/PRE&gt;&lt;P&gt;I tried to Import the credential using CM -&amp;gt; Admin -&amp;gt; Security. It says success message but I list the Kerberos credential, the principal is still missing for only solr&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Successfully imported KDC Account Manager credentials.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so I've&amp;nbsp;deleted the principal that i've added manually using kadmin.local.....&lt;/P&gt;&lt;P&gt;How to fix the issue with kadmin? so that I can use Generate Missing Credential option&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here I've listed my configuration, do you think any change required on it?&lt;/P&gt;&lt;PRE&gt;cat /var/kerberos/krb5kdc/kadm5.acl
*/admin@REALM.COM *
hive@REALM.COM *
hdfs@REALM.COM
&lt;BR /&gt;###
kadmin.local:  listprincs
HTTP/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
K/M@REALM.COM
cloudera-scm/admin@REALM.COM
hdfs/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
hdfs@REALM.COM
hive/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
hue/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
impala/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
kadmin/admin@REALM.COM
kadmin/changepw@REALM.COM
kadmin/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
krbtgt/REALM.COM@REALM.COM
mapred/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
oozie/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
root/admin@REALM.COM
root@REALM.COM
sentry/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
yarn/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM
zookeeper/&amp;lt;&amp;lt;my_ipaddress&amp;gt;&amp;gt;@REALM.COM&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've confirmed that my Fully qualified Domain Name (FQDN) is correct with my configurations&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: I am using admin login in Cloudera manager to generate new principal and root/admin@REALM in CLI to add new principal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 19:52:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49082#M50770</guid>
      <dc:creator>saranvisa</dc:creator>
      <dc:date>2017-01-04T19:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Getting error when add new service in Cluster after enable Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49148#M50771</link>
      <description>&lt;P&gt;FYI... Everything is fine with kadmin.local but kadmin is not working properly.. the same issue was raised by someone else in stackoverflow...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just followed the instruction.. The issue has been fixed now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://stackoverflow.com/questions/23779468/kerberos-kadmin-not-working-properly" target="_blank"&gt;http://stackoverflow.com/questions/23779468/kerberos-kadmin-not-working-properly&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2017 17:08:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Getting-error-when-add-new-service-in-Cluster-after-enable/m-p/49148#M50771</guid>
      <dc:creator>saranvisa</dc:creator>
      <dc:date>2017-01-06T17:08:52Z</dc:date>
    </item>
  </channel>
</rss>

