<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos Enable first time in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185004#M77968</link>
    <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/189662/@Mudit%20Kumar"&gt;@Mudit Kumar&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Testing for HIVE or HBASE straightforward too just similar to the previous &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Without Kerberos ticket &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;From ROOT switch to user hive/hbase &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# su - hive &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;or&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# su - hbase &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Check if hdfs has a ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist
klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_1013) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;If you see some output different from the above destroy the ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ kdestroy &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Try accessing hive or Hbase shell CLI &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hive &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;or &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$hbase-shell &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;When you press "ENTER" this should give you an error for both hive and hbase &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Test with kerberos for hive &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -ket /etc/security/keytabs/hive.keytab
Keytab name: FILE:/etc/security/keytabs/hive.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (des3-cbc-sha1)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (aes058-cts-hmac-sha1-96)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (arcfour-hmac)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (des-cbc-md5)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (aes256-cts-hmac-sha1-96) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Test with kerberos for hbase &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -ket /etc/security/keytabs/hbase.keytab
Keytab name: FILE:/etc/security/keytabs/hbase.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (des3-cbc-sha1)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (aes058-cts-hmac-sha1-96)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (arcfour-hmac)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (des-cbc-md5)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (aes256-cts-hmac-sha1-96) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Note the difference with below command it won't give you the encryption &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Check principal for hive &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -kt /etc/security/keytabs/hive.keytab
Keytab name: FILE:/etc/security/keytabs/hive.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Check principal for hbase &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt; $ klist -kt /etc/security/keytabs/hbase.keytab
Keytab name: FILE:/etc/security/keytabs/hbase.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Grab a ticket, note I switch to &lt;STRONG&gt;kinit &lt;/STRONG&gt;NOT &lt;STRONG&gt;klist&lt;/STRONG&gt; and I append the principal for &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;hive-{host_name}@{YOUR_REALM}&lt;/STRONG&gt; or &lt;STRONG&gt;hbase-{host_name}@{YOUR_REALM}&lt;/STRONG&gt; to the keytab &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$kinit -kt /etc/security/keytabs/hive.keytab hive-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;or &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$kinit -kt /etc/security/keytabs/hbase.keytab hbase-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should have a valid ticket as shown below for either &lt;STRONG&gt;hive&lt;/STRONG&gt; or &lt;STRONG&gt;hbase &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_507 
Default principal: hive-{host_name}@{YOUR_REALM} 
Valid starting 		Expires 	   Service principal 
xx/xx/xx xx:xx:xx 	xx/xx/xx xx:xx:xx  krbtgt/{YOUR_REALM}@{YOUR_REALM}   renew until xx/xx/xx xx:xx:xx &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should be able to connect to hive CLI &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hive &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;After some time you should have the below output &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hive
WARNING: Use "yarn jar" to launch YARN applications
................
Logging initialized using configuration in file:/etc/hive/2.5.0.0-817/0/hive-log4j.properties
hive&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now you can run all the hive queries &lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;For hbase &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_507 
Default principal: hbase-{host_name}@{YOUR_REALM} 
Valid starting 		Expires Service 	principal 
xx/xx/xx xx:xx:xx 	xx/xx/xx xx:xx:xx 	krbtgt/{YOUR_REALM}@{YOUR_REALM}renew until xx/xx/xx xx:xx:xx &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should be able to connect to &lt;STRONG&gt;hbase shell&lt;/STRONG&gt; and there shouldn't be any error &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hbase shell 
HBase Shell; enter 'help&amp;lt;RETURN&amp;gt;' for list of supported commands.
Type "exit&amp;lt;RETURN&amp;gt;" to leave the HBase Shell
Version 0.94.23, rf42302b28aceaab773b15f234aa8718fff7eea3c, Thursday  May 10 18:54:09 UTC 2018
hbase(main):001:0&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Voila, you are done.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;As reiterated please "&lt;STRONG&gt;Accept &lt;/STRONG&gt;" and close the thread. You can open a new thread as this has become long &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 10 May 2018 21:56:02 GMT</pubDate>
    <dc:creator>Shelton</dc:creator>
    <dc:date>2018-05-10T21:56:02Z</dc:date>
    <item>
      <title>Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184995#M77959</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have HDP installed on my cluster.Now next task is to enable kerberos for HDP cluster .Can some one point me to step by step documentation please?Do i need AD/LDAP as well.Its a development cluster .&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 13:11:11 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184995#M77959</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2022-09-16T13:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184996#M77960</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1637/muditcse.html" nodeid="1637"&gt;@Mudit Kumar&lt;/A&gt;, You can refer this document : &lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.4/bk_security/content/configuring_amb_hdp_for_kerberos.html" target="_blank"&gt;https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.6.4/bk_security/content/configuring_amb_hdp_for_kerberos.html&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 01:43:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184996#M77960</guid>
      <dc:creator>sandyy006</dc:creator>
      <dc:date>2018-05-07T01:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184997#M77961</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="@Mudit Kumar"&gt; @Mudit Kumar&lt;/A&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Below is an outline of the next procedure &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Assumption:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt; - Centos6 or RHEL 6 &lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;- REALM is EXAMPLE.COM&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;the command will differ for Centos/RHEL7 ie &lt;STRONG&gt;systemctl&lt;/STRONG&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;# Install a new MIT KDC &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Install a new version of the KDC server: &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# yum install krb5-server krb5-libs krb5-workstation &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;On KDC clients  cluster clients datanodes etc&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# yum install krb5-workstation &lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;# Edit the KDC server configuration file &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Change the &lt;STRONG&gt;[realms]&lt;/STRONG&gt; section of this file by replacing the default “kerberos.example.com” setting for the kdc and admin_server properties with the Fully Qualified Domain Name of the KDC server host. In the following example, “kerberos.example.com” has been replaced with “my.kdc.server”. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;# vi /etc/krb5.conf&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;[realms]
 EXAMPLE.COM = {
   kdc = my.kdc.server
   admin_server = my.kdc.server
} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Some components such as long-running spark jobs require renewable tickets. To configure MIT KDC to support them, ensure the following settings are specified in the&lt;STRONG&gt; libdefaults&lt;/STRONG&gt; section of the &lt;STRONG&gt;/etc/krb5.conf &lt;/STRONG&gt;file. &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;renew_lifetime = 7d &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;# Create the Kerberos Database takes a while &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt; # kdb5_util create -s
Loading random data
Initializing database '/var/kerberos/krb5kdc/principal' for realm 'EXAMPLE.COM',
master key name 'K/M@EXAMPLE.COM'
You will be prompted for the database Master Password.
It is important that you NOT FORGET this password.
Enter KDC database master key:xxxxxxxx {dont lose this password}
Re-enter KDC database master key to verify:xxxxxxxx &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;# Start the KDC&lt;/STRONG&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Start the KDC server and the KDC admin server. &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# service krb5kdc start
# service kadmin start &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;# Set up the KDC server to auto-start on boot. &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# chkconfig krb5kdc on
# chkconfig kadmin on &lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;# Create a Kerberos Admin &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Create a KDC admin by creating an admin principal. &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# kadmin.local -q "addprinc admin/admin" 
Authenticating as principal admin/admin@EXAMPLE.COM with password. 
WARNING: no policy specified for admin/admin@EXAMPLE.COM; defaulting to no policy 
Enter password for principal "admin/admin@EXAMPLE.COM": 
Re-enter password for principal "admin/admin@EXAMPLE.COM": Principal "admin/admin@EXAMPLE.COM" created. &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Confirm that this admin principal has permissions in the KDC ACL. Using a text editor, &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;open the KDC ACL file: &lt;STRONG&gt; /var/kerberos/krb5kdc/kadm5.acl&lt;/STRONG&gt; Ensure that the KDC ACL file includes an entry so to allow the admin principal to administer the KDC for your specific realm. When using a realm that is different than EXAMPLE.COM, be sure there is an entry for the realm you are using. If not present, principal creation will fail. For example, for an admin/admin@HADOOP.COM principal, you should have an entry: &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;*/admin@EXAMPLE.COM * &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;After editing and saving the kadm5.acl file, you must restart the kadmin process. RHEL/CentOS/Oracle Linux 6 &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# service kadmin restart &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Check status&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# service krb5kdc status &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;desired output krb5kdc (pid 2204) is running... &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# service kadmin status &lt;/PRE&gt;&lt;P&gt;&lt;I&gt;desired output &lt;/I&gt;&lt;EM&gt;kadmind (pid 16891) is running... &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;# Install the JCE&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;On the Ambari Server, obtain the JCE policy file appropriate for the JDK version in your cluster. For Oracle JDK 1.8: &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;nstall JCE 8wget --no-check-certificate --no-cookies --header "Cookie: oraclelicense=accept-securebackup-cookie" "http://download.oracle.com/otn-pub/java/jce/8/jce_policy-8.zip"unzip jce_policy-8.zip&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Save the policy file archive in a temporary location.On Ambari Server and on each host in the cluster, add the unlimited security policy JCE jars to $JAVA_HOME/jre/lib/security/. &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# unzip -o -j -q jce_policy-8.zip -d /usr/jdk64/jdk1.8.0_77/jre/lib/security/ &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;# Restart Ambari Server.&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# ambari-server restart &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; # Running the Kerberos Security Wizard &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; When choosing Existing MIT KDC or Existing Active Directory, the Kerberos Wizard prompts for information related to the KDC, the KDC Admin Account and the Service and Ambari principals. Once provided, Ambari will automatically create principals, generate keytabs and distribute keytabs to the hosts in the cluster. The services will be configured for Kerberos and the service components are restarted to authenticate against the KDC &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;# To continue &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A href="http://docs.hortonworks.com/HDPDocuments/Ambari-2.4.1.0/bk_ambari-security/content/ch_advanced_security_options_for_ambari.html" target="_blank"&gt; http://docs.hortonworks.com/HDPDocuments/Ambari-2.4.1.0/bk_ambari-security/content/ch_advanced_security_options_for_ambari.html&lt;/A&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Go to Ambari GUI&lt;/STRONG&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;To enable kerberos, the inputs are quite straight forward  Admin pricipal password anREALM etc&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Good luck&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;After the successful installation, all the service are restart !&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Test  without kerberos ticket ad HDFS user &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;su - hdfs &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Destroy any valid ticket&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$kdestroy&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;The below command should error out&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;hdfs dfs -ls /user&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;List the generated keytabs&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ ls /etc/security/keytabs &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Test the with a valid Kerberos ticket as hdfs&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -kt /etc/security/keytabs/hdfs.service.keytab
Keytab name: FILE:/etc/security/keytabs/hdfs.service.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 02/02/17 23:00:12 hdfs/london.EXAMPLE.COM@EXAMPLE.COM
   1 02/02/17 23:00:12 hdfs/london.EXAMPLE.COM@EXAMPLE.COM
   1 02/02/17 23:00:12 hdfs/london.EXAMPLE.COM@EXAMPLE.COM
   1 02/02/17 23:00:12 hdfs/london.EXAMPLE.COM@EXAMPLE.COM
   1 02/02/17 23:00:12 hdfs/london.EXAMPLE.COM@EXAMPLE.COM &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Get a ticket&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ kinit -kt /etc/security/keytabs/hdfs.service.keytab hdfs/london.EXAMPLE.COM@EXAMPLE.COM &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;You should see a valid ticket&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_504 
Default principal: hdfs/london.EXAMPLE.COM@EXAMPLE.COM 

Valid starting           Expires           Service principal 
02/10/17 01:32:45        02/11/17 01:32:45 krbtgt/EXAMPLE.COM@EXAMPLE.COM 
renew until 02/10/17 01:32:45&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;The below command should succeed&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;hdfs dfs -ls /user&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Hope that helps&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 02:33:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184997#M77961</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2018-05-07T02:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184998#M77962</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;&lt;P&gt; Thanks!So we need to have MIT KDC or AD running.Right?&lt;/P&gt;&lt;P&gt;For the development environment,is there a way to setup MIT KDC specifically for development environment?Any link for that please?&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 15:57:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184998#M77962</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2018-05-10T15:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184999#M77963</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; &lt;A rel="user" href="https://community.cloudera.com/users/10159/snemuri.html" nodeid="10159"&gt;@Sandeep Nemuri&lt;/A&gt; I donot see kerberos wizard on my ambari?whats the issue?I have reached till the steps provided by &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; till installiing JCE files and restrarting ambari server after that.&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 16:54:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/184999#M77963</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2018-05-10T16:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185000#M77964</link>
      <description>&lt;P&gt;i am able to find kerberos wizard ,sorry for the trouble.&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 18:04:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185000#M77964</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2018-05-10T18:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185001#M77965</link>
      <description>&lt;P&gt;&lt;A href="https://community.hortonworks.com/users/1271/sheltong.html"&gt;@Geoffrey Shelton &lt;/A&gt;  &lt;A href="https://community.hortonworks.com/users/10159/snemuri.html"&gt;@Sandeep Nemuri&lt;/A&gt; GUys,thanks a lot.I am done successfully.Can you share few steps to verify steps for services like hdfs,spark,yarn,hive,hbase!&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 18:47:48 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185001#M77965</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2018-05-10T18:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185002#M77966</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/189662/@Mudit%20Kumar"&gt;@Mudit Kumar&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Testing is straightforward &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; Without Kerberos ticket &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;From ROOT switch to user &lt;STRONG&gt;hdfs &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt; # su - hdfs &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Check if &lt;STRONG&gt;hdfs &lt;/STRONG&gt;has a ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist
Ticket cache: FILE:/tmp/krb5cc_507
Default principal: hdfs-London@{YOUR_REALM}
Valid starting     Expires            Service principal
xx/xx/xx xx:xx:xx  xx/xx/xx xx:xx:xx  krbtgt/{YOUR_REALM}@{YOUR_REALM} 		renew until xx/xx/xx xx:xx:xx
xx/xx/xx xx:xx:xx  xx/xx/xx xx:xx:xx  HTTP/{host_name}@{YOUR_REALM}		renew until xx/xx/xx xx:xx:xx
xx/xx/xx xx:xx:xx  xx/xx/xx xx:xx:xx  HTTP/{host_name}@{YOUR_REALM} 	        renew until xx/xx/xx xx:xx:xx
&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;If you see some out like above that means &lt;STRONG&gt;hdfs&lt;/STRONG&gt; user was already given a ticket, destroy the ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ kdestroy &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now try accessing hdfs  directory &lt;STRONG&gt;/user home &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hdfs dfs -ls /user &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;This should throughout an error &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Test with Kerberos &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;To get a valid Kerberos ticket need to know the principal, it's the part that starts with  hdfs-{xxx}&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -ket /etc/security/keytabs/hdfs.headless.keytab
Keytab name: FILE:/etc/security/keytabs/hdfs.headless.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} (des3-cbc-sha1)
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} (aes058-cts-hmac-sha1-96)
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} (arcfour-hmac)
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} (des-cbc-md5)
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} (aes256-cts-hmac-sha1-96) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Note the difference with below command it won't give you the encryption &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt; $ klist -kt /etc/security/keytabs/hdfs.headless.keytab
Keytab name: FILE:/etc/security/keytabs/hdfs.headless.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hdfs-{host_name}@{YOUR_REALM} 
&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Grab a ticket, note I switch to &lt;B&gt;kinit&lt;/B&gt; NOT &lt;B&gt;klist&lt;/B&gt; and I append the principal &lt;STRONG&gt;hdfs-{host_name}@{YOUR_REALM}&lt;/STRONG&gt; to the keytab &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should have a valid ticket as shown below &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist
Ticket cache: FILE:/tmp/krb5cc_507
Default principal: hdfs-London@{YOUR_REALM}
Valid starting     Expires            Service principal
xx/xx/xx xx:xx:xx  xx/xx/xx xx:xx:xx  krbtgt/{YOUR_REALM}@{YOUR_REALM} 		renew until xx/xx/xx xx:xx:xx
xx/xx/xx xx:xx:xx  xx/xx/xx xx:xx:xx  HTTP/{host_name}@{YOUR_REALM}		renew until xx/xx/xx xx:xx:xx
xx/xx/xx xx:xx:xx  xx/xx/xx xx:xx:xx  HTTP/{host_name}@{YOUR_REALM} 	        renew until xx/xx/xx xx:xx:xx
&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should be able to list the hdfs &lt;STRONG&gt;/user&lt;/STRONG&gt; directory  see the example below&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hdfs dfs -ls / 
Found 11 items 
drwxrwxrwx - yarn hadoop 0 2018-05-09 21:45 /app-logs 
.......
.......
drwxrwxrwx - mapred hadoop 0 2018-05-14 14:19 /mr-history&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Voila you are done, &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;So no service /user without a valid ticket can run any job on your cluster.&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;So can you Accept the answer I gave by Clicking on Accept button below, That would be a great help to Community users to find the solution quickly for these kinds of errors.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 19:33:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185002#M77966</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2018-05-10T19:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185003#M77967</link>
      <description>&lt;P&gt;Thanks &lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt; . This is done.&lt;/P&gt;&lt;P&gt;How can i validate hive and hbase as well?&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 19:40:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185003#M77967</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2018-05-10T19:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185004#M77968</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/189662/@Mudit%20Kumar"&gt;@Mudit Kumar&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Testing for HIVE or HBASE straightforward too just similar to the previous &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Without Kerberos ticket &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;From ROOT switch to user hive/hbase &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# su - hive &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;or&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;# su - hbase &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Check if hdfs has a ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist
klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_1013) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;If you see some output different from the above destroy the ticket &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ kdestroy &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Try accessing hive or Hbase shell CLI &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hive &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;or &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$hbase-shell &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;When you press "ENTER" this should give you an error for both hive and hbase &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Test with kerberos for hive &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -ket /etc/security/keytabs/hive.keytab
Keytab name: FILE:/etc/security/keytabs/hive.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (des3-cbc-sha1)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (aes058-cts-hmac-sha1-96)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (arcfour-hmac)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (des-cbc-md5)
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} (aes256-cts-hmac-sha1-96) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Test with kerberos for hbase &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -ket /etc/security/keytabs/hbase.keytab
Keytab name: FILE:/etc/security/keytabs/hbase.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (des3-cbc-sha1)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (aes058-cts-hmac-sha1-96)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (arcfour-hmac)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (des-cbc-md5)
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} (aes256-cts-hmac-sha1-96) &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Note the difference with below command it won't give you the encryption &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Check principal for hive &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ klist -kt /etc/security/keytabs/hive.keytab
Keytab name: FILE:/etc/security/keytabs/hive.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hive-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Check principal for hbase &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt; $ klist -kt /etc/security/keytabs/hbase.keytab
Keytab name: FILE:/etc/security/keytabs/hbase.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} 
   1 05/10/18 22:25:31 hbase-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Grab a ticket, note I switch to &lt;STRONG&gt;kinit &lt;/STRONG&gt;NOT &lt;STRONG&gt;klist&lt;/STRONG&gt; and I append the principal for &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;hive-{host_name}@{YOUR_REALM}&lt;/STRONG&gt; or &lt;STRONG&gt;hbase-{host_name}@{YOUR_REALM}&lt;/STRONG&gt; to the keytab &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$kinit -kt /etc/security/keytabs/hive.keytab hive-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;or &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$kinit -kt /etc/security/keytabs/hbase.keytab hbase-{host_name}@{YOUR_REALM} &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should have a valid ticket as shown below for either &lt;STRONG&gt;hive&lt;/STRONG&gt; or &lt;STRONG&gt;hbase &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_507 
Default principal: hive-{host_name}@{YOUR_REALM} 
Valid starting 		Expires 	   Service principal 
xx/xx/xx xx:xx:xx 	xx/xx/xx xx:xx:xx  krbtgt/{YOUR_REALM}@{YOUR_REALM}   renew until xx/xx/xx xx:xx:xx &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should be able to connect to hive CLI &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hive &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;After some time you should have the below output &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hive
WARNING: Use "yarn jar" to launch YARN applications
................
Logging initialized using configuration in file:/etc/hive/2.5.0.0-817/0/hive-log4j.properties
hive&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now you can run all the hive queries &lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;For hbase &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;$ klist 
Ticket cache: FILE:/tmp/krb5cc_507 
Default principal: hbase-{host_name}@{YOUR_REALM} 
Valid starting 		Expires Service 	principal 
xx/xx/xx xx:xx:xx 	xx/xx/xx xx:xx:xx 	krbtgt/{YOUR_REALM}@{YOUR_REALM}renew until xx/xx/xx xx:xx:xx &lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Now I should be able to connect to &lt;STRONG&gt;hbase shell&lt;/STRONG&gt; and there shouldn't be any error &lt;/EM&gt;&lt;/P&gt;&lt;PRE&gt;$ hbase shell 
HBase Shell; enter 'help&amp;lt;RETURN&amp;gt;' for list of supported commands.
Type "exit&amp;lt;RETURN&amp;gt;" to leave the HBase Shell
Version 0.94.23, rf42302b28aceaab773b15f234aa8718fff7eea3c, Thursday  May 10 18:54:09 UTC 2018
hbase(main):001:0&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Voila, you are done.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;As reiterated please "&lt;STRONG&gt;Accept &lt;/STRONG&gt;" and close the thread. You can open a new thread as this has become long &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 21:56:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185004#M77968</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2018-05-10T21:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185005#M77969</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;A href="https://community.hortonworks.com/questions/189662/@Mudit%20Kumar"&gt;@Mudit Kumar&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Hopefully, this helped. If it did, please '&lt;STRONG&gt;Accept&lt;/STRONG&gt;' and '&lt;STRONG&gt;upvote&lt;/STRONG&gt;' the answer hence closing the thread.&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Thank you!!&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 13:37:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185005#M77969</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2018-05-11T13:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos Enable first time</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185006#M77970</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1271/sheltong.html" nodeid="1271"&gt;@Geoffrey Shelton Okot&lt;/A&gt;:Now i need to access my HDP cluster from my Laptop  using curl/rest API but i am not able to do so.My laptop is in different AD domain.I tried enabling SPENGO/HTTP as well but no luck.Curl call works inside the cluster but not from outside.Any documentation help on that?&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jun 2018 22:31:47 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-Enable-first-time/m-p/185006#M77970</guid>
      <dc:creator>muditcse</dc:creator>
      <dc:date>2018-06-23T22:31:47Z</dc:date>
    </item>
  </channel>
</rss>

