<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2 in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69414#M79980</link>
    <description>&lt;P&gt;Hi Ben,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;for the quick reply. I have&amp;nbsp;already tried that but&amp;nbsp;the error remains same:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trusted Kerberos Realms: Example.COM&lt;BR /&gt;Additional Rules to Map Kerberos Principals to Short Names: RULE:[1:$1](sbalusu\..*)s/sbalusu\.(.*)/$1/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;Siva&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jun 2018 03:56:55 GMT</pubDate>
    <dc:creator>balusu</dc:creator>
    <dc:date>2018-06-28T03:56:55Z</dc:date>
    <item>
      <title>Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69412#M79978</link>
      <description>&lt;P&gt;Users are synced to hosts as user@example.com, I can do hadoop fs -ls as hdfs user with out a problem, But when I tried as a user from AD I am getting the error "INFO util.KerberosName: No auth_to_local rules applied to user@userexample.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the complete log:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[exampleuser@example.com@explehost1 ~]$ hadoop fs -ls&lt;BR /&gt;18/06/28 02:20:56 DEBUG util.Shell: setsid exited with exit code 0&lt;BR /&gt;18/06/28 02:20:56 DEBUG conf.Configuration: parsing URL jar:file:/opt/cloudera/parcels/CDH-5.14.2-1.cdh5.14.2.p0.3/jars/hadoop-common-2.6.0-cdh5.14.2.jar!/core-default.xml&lt;BR /&gt;18/06/28 02:20:56 DEBUG conf.Configuration: parsing input stream sun.net.&lt;A href="http://www.protocol.jar.JarURLConnection$JarURLInputStream@271053e1" target="_blank"&gt;www.protocol.jar.JarURLConnection$JarURLInputStream@271053e1&lt;/A&gt;&lt;BR /&gt;18/06/28 02:20:56 DEBUG conf.Configuration: parsing URL file:/etc/hadoop/conf.cloudera.YARN/core-site.xml&lt;BR /&gt;18/06/28 02:20:56 DEBUG conf.Configuration: parsing input stream java.io.BufferedInputStream@5bc79255&lt;BR /&gt;18/06/28 02:20:56 DEBUG core.Tracer: sampler.classes = ; loaded no samplers&lt;BR /&gt;18/06/28 02:20:56 TRACE core.TracerId: ProcessID(fmt=%{tname}/%{ip}): computed process ID of "FsShell/hostiP"&lt;BR /&gt;18/06/28 02:20:56 TRACE core.TracerPool: TracerPool(Global): adding tracer Tracer(FsShell/hostiP)&lt;BR /&gt;18/06/28 02:20:56 DEBUG core.Tracer: span.receiver.classes = ; loaded no span receivers&lt;BR /&gt;18/06/28 02:20:56 TRACE core.Tracer: Created Tracer(FsShell/hostiP) for FsShell&lt;BR /&gt;18/06/28 02:20:56 DEBUG lib.MutableMetricsFactory: field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginSuccess with annotation @org.apache.hadoop.metrics2.annotation.Metric(about=, always=false, sampleName=Ops, type=DEFAULT, valueName=Time, value=[Rate of successful kerberos logins and latency (milliseconds)])&lt;BR /&gt;18/06/28 02:20:56 DEBUG lib.MutableMetricsFactory: field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginFailure with annotation @org.apache.hadoop.metrics2.annotation.Metric(about=, always=false, sampleName=Ops, type=DEFAULT, valueName=Time, value=[Rate of failed kerberos logins and latency (milliseconds)])&lt;BR /&gt;18/06/28 02:20:56 DEBUG lib.MutableMetricsFactory: field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.getGroups with annotation @org.apache.hadoop.metrics2.annotation.Metric(about=, always=false, sampleName=Ops, type=DEFAULT, valueName=Time, value=[GetGroups])&lt;BR /&gt;18/06/28 02:20:56 DEBUG lib.MutableMetricsFactory: field private org.apache.hadoop.metrics2.lib.MutableGaugeLong org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailuresTotal with annotation @org.apache.hadoop.metrics2.annotation.Metric(about=, always=false, sampleName=Ops, type=DEFAULT, valueName=Time, value=[Renewal failures since startup])&lt;BR /&gt;18/06/28 02:20:56 DEBUG lib.MutableMetricsFactory: field private org.apache.hadoop.metrics2.lib.MutableGaugeInt org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailures with annotation @org.apache.hadoop.metrics2.annotation.Metric(about=, always=false, sampleName=Ops, type=DEFAULT, valueName=Time, value=[Renewal failures since last successful login])&lt;BR /&gt;18/06/28 02:20:56 DEBUG impl.MetricsSystemImpl: UgiMetrics, User and group related metrics&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.SecurityUtil: Setting hadoop.security.token.service.use_ip to true&lt;BR /&gt;Java config name: null&lt;BR /&gt;Native config name: /etc/krb5.conf&lt;BR /&gt;Loaded from native config&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.Groups: Creating new Groups object&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.Groups: Group mapping impl=org.apache.hadoop.security.ShellBasedUnixGroupsMapping; cacheTimeout=1000; warningDeltaMs=5000&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.UserGroupInformation: hadoop login&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.UserGroupInformation: hadoop login commit&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.UserGroupInformation: using local user:UnixPrincipal: exampleuser@example.com&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.UserGroupInformation: Using user: "UnixPrincipal: exampleuser@example.com" with name exampleuser@example.com&lt;BR /&gt;18/06/28 02:20:56 INFO util.KerberosName: No auth_to_local rules applied to exampleuser@example.com&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.UserGroupInformation: User entry: "exampleuser@example.com"&lt;BR /&gt;18/06/28 02:20:56 DEBUG security.UserGroupInformation: UGI loginUser:exampleuser@example.com (auth:SIMPLE)&lt;BR /&gt;18/06/28 02:20:56 DEBUG core.Tracer: sampler.classes = ; loaded no samplers&lt;BR /&gt;18/06/28 02:20:56 TRACE core.TracerId: ProcessID(fmt=%{tname}/%{ip}): computed process ID of "FSClient/hostiP"&lt;BR /&gt;18/06/28 02:20:56 TRACE core.TracerPool: TracerPool(Global): adding tracer Tracer(FSClient/hostiP)&lt;BR /&gt;18/06/28 02:20:56 DEBUG core.Tracer: span.receiver.classes = ; loaded no span receivers&lt;BR /&gt;18/06/28 02:20:56 TRACE core.Tracer: Created Tracer(FSClient/hostiP) for FSClient&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.client.use.legacy.blockreader.local = false&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.client.read.shortcircuit = false&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.client.domain.socket.data.traffic = false&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.domain.socket.path = /var/run/hdfs-sockets/dn&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.DFSClient: Sets dfs.client.block.write.replace-datanode-on-failure.min-replication to 0&lt;BR /&gt;18/06/28 02:20:56 TRACE security.SecurityUtil: Name lookup for namenode XX.XX.XX.XX18/06/28 02:20:56 TRACE security.SecurityUtil: Name lookup for spmbaexampleuser.example.com took 0 ms.&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.HAUtil: No HA service delegation token found for logical URI hdfs://nameservice1&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.client.use.legacy.blockreader.local = false&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.client.read.shortcircuit = false&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.client.domain.socket.data.traffic = false&lt;BR /&gt;18/06/28 02:20:56 DEBUG hdfs.BlockReaderLocal: dfs.domain.socket.path = /var/run/hdfs-sockets/dn&lt;BR /&gt;18/06/28 02:20:56 DEBUG retry.RetryUtils: multipleLinearRandomRetry = null&lt;BR /&gt;18/06/28 02:20:56 DEBUG ipc.Server: rpcKind=RPC_PROTOCOL_BUFFER, rpcRequestWrapperClass=class org.apache.hadoop.ipc.ProtobufRpcEngine$RpcRequestWrapper, rpcInvoker=org.apache.hadoop.ipc.ProtobufRpcEngine$Server$ProtoBufRpcInvoker@534a5a98&lt;BR /&gt;18/06/28 02:20:56 DEBUG ipc.Client: getting client out of cache: org.apache.hadoop.ipc.Client@1e6a3214&lt;BR /&gt;18/06/28 02:20:56 DEBUG azure.NativeAzureFileSystem: finalize() called.&lt;BR /&gt;18/06/28 02:20:56 DEBUG azure.NativeAzureFileSystem: finalize() called.&lt;BR /&gt;18/06/28 02:20:57 DEBUG util.NativeCodeLoader: Trying to load the custom-built native-hadoop library...&lt;BR /&gt;18/06/28 02:20:57 DEBUG util.NativeCodeLoader: Loaded the native-hadoop library&lt;BR /&gt;18/06/28 02:20:57 DEBUG unix.DomainSocketWatcher: org.apache.hadoop.net.unix.DomainSocketWatcher$2@6a8b3053: starting with interruptCheckPeriodMs = 60000&lt;BR /&gt;18/06/28 02:20:57 TRACE unix.DomainSocketWatcher: DomainSocketWatcher(337574644): adding notificationSocket 168, connected to 167&lt;BR /&gt;18/06/28 02:20:57 DEBUG util.PerformanceAdvisory: Both short-circuit local reads and UNIX domain socket are disabled.&lt;BR /&gt;18/06/28 02:20:57 DEBUG sasl.DataTransferSaslUtil: DataTransferProtocol not using SaslPropertiesResolver, no QOP found in configuration for dfs.data.transfer.protection&lt;BR /&gt;18/06/28 02:20:57 TRACE ipc.ProtobufRpcEngine: 1: Call -&amp;gt; namenode/XX.XX.XX.XX:8020: getFileInfo {src: "/user/exampleuser@example.com"}&lt;BR /&gt;18/06/28 02:20:57 DEBUG ipc.Client: The ping interval is 60000 ms.&lt;BR /&gt;18/06/28 02:20:57 DEBUG ipc.Client: Connecting to namenode/XX.XX.XX.XX:8020&lt;BR /&gt;18/06/28 02:20:57 DEBUG ipc.Client: IPC Client (1029472813) connection to namenode/XX.XX.XX.XX:8020 from exampleuser@example.com: starting, having connections 1&lt;BR /&gt;18/06/28 02:20:57 DEBUG ipc.Client: IPC Client (1029472813) connection to namenode/XX.XX.XX.XX:8020 from exampleuser@example.com sending #0 org.apache.hadoop.hdfs.protocol.ClientProtocol.getFileInfo&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: IPC Client (1029472813) connection to namenode/XX.XX.XX.XX:8020 from exampleuser@example.com got value #0&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.ProtobufRpcEngine: Call: getFileInfo took 2343ms&lt;BR /&gt;18/06/28 02:20:59 TRACE ipc.ProtobufRpcEngine: 1: Response &amp;lt;- namenode/XX.XX.XX.XX:8020: getFileInfo {}&lt;BR /&gt;ls: `.': No such file or directory&lt;BR /&gt;18/06/28 02:20:59 TRACE core.TracerPool: TracerPool(Global): removing tracer Tracer(FsShell/hostiP)&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: stopping client from cache: org.apache.hadoop.ipc.Client@1e6a3214&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: removing client from cache: org.apache.hadoop.ipc.Client@1e6a3214&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: stopping actual client because no more references remain: org.apache.hadoop.ipc.Client@1e6a3214&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: Stopping client&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: IPC Client (1029472813) connection to namenode/XX.XX.XX.XX:8020 from exampleuser@example.com: closed&lt;BR /&gt;18/06/28 02:20:59 DEBUG ipc.Client: IPC Client (1029472813) connection to namenode/XX.XX.XX.XX:8020 from exampleuser@example.com: stopped, remaining connections 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In need of a serious help, Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 13:23:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69412#M79978</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2022-09-16T13:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69413#M79979</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/27482"&gt;@balusu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually, the error in your log snippet is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;18/06/28 02:20:56 INFO util.KerberosName: No auth_to_local rules applied to exampleuser@example.com.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This error occurs when no rules in your "hadoop.security.auth_to_local" property in the server's core-site.xml matched the principal, "exampleuser@example.com"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is not a kerberos error; rather, this is a message being returned by hadoop code when hadoop tries to map your principal to a unix user name.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Generally, if you are attempting to act on a hadoop service with a user who is not in the hadoop cluster's Kerberos realm, you need to make sure that the hadoop.security.auth_to_local property includes rules that will match the principal and convert the string to just a username.&amp;nbsp; Cloudera Manager will create such rules for you if you add the other realm to the "Trusted Realms" or "Trusted Kerberos Realms" configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;see:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cloudera.com/documentation/enterprise/5-14-x/topics/cm_sg_kerbprin_to_sn.html" target="_blank"&gt;https://www.cloudera.com/documentation/enterprise/5-14-x/topics/cm_sg_kerbprin_to_sn.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that you will need to deploy client configuration and restart the cluster after making this change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Ben&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 03:48:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69413#M79979</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-06-28T03:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69414#M79980</link>
      <description>&lt;P&gt;Hi Ben,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;for the quick reply. I have&amp;nbsp;already tried that but&amp;nbsp;the error remains same:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trusted Kerberos Realms: Example.COM&lt;BR /&gt;Additional Rules to Map Kerberos Principals to Short Names: RULE:[1:$1](sbalusu\..*)s/sbalusu\.(.*)/$1/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;Siva&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 03:56:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69414#M79980</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-06-28T03:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69415#M79981</link>
      <description>&lt;P&gt;Hi Ben,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had the pattern wrong in the rule, Here is the updated and working one:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;RULE:[1:$1@$0](.*@\EXAMPLE.COM)s/@\EXAMPLE.COM//&lt;BR /&gt;RULE:[2:$1@$0](.*@\EXAMPLE.COM)s/@\EXAMPLE.COM//&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Siva&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 04:57:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69415#M79981</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-06-28T04:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69416#M79982</link>
      <description>&lt;P&gt;That's great news.&lt;/P&gt;&lt;P&gt;To avoid any confusion, the automatically generated auth_to_local rules (based on a realm listed in "Trusted Kerbreros Realms" would look like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@\QEXAMPLE.COM\E$)s/@\QEXAMPLE.COM\E$//
RULE:[2:$1@$0](.*@\QEXAMPLE.COM\E$)s/@\QEXAMPLE.COM\E$//&lt;/PRE&gt;&lt;P&gt;It appears that perhaps some of your characters were interpretted as special when you printed the generaged rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 05:02:13 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69416#M79982</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-06-28T05:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69417#M79983</link>
      <description>&lt;P&gt;I tried exactly same but it threw the below error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Failed to start namenode.&lt;BR /&gt;java.util.regex.PatternSyntaxException: Illegal/unsupported escape sequence near index 22&lt;BR /&gt;.*@\EXAMPLE.COM\E$&lt;BR /&gt;^&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also i had to add example.com to make it work, Can you please suggest if there is a way to ignore case in the rule.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 05:09:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69417#M79983</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-06-28T05:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69429#M79984</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/27482"&gt;@balusu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned, you would want to add the realm to the HDFS configuration "Trusted Kerberos Realms".&amp;nbsp; This will allow Cloudera Manager to generate the necessary auth_to_local rule for that realm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The regex you used is, indeed, not correct as you have two "\E" but no "\Q" to match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure, exactly, what trouble you had with the case of realms, but the realm should &lt;EM&gt;always&lt;/EM&gt; be in uppercase format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more information on regex, etc., this is a great resource:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cloudera.com/documentation/enterprise/5-14-x/topics/cdh_sg_kerbprin_to_sn.html#topic_19_1" target="_blank"&gt;https://www.cloudera.com/documentation/enterprise/5-14-x/topics/cdh_sg_kerbprin_to_sn.html#topic_19_1&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 16:06:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69429#M79984</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-06-28T16:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69431#M79985</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ya, The pattern is wrong and I am glad that the documentation link you provided&amp;nbsp;is very clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I observed an interesting thing in our environment:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When only example.com as trusted domain:&lt;BR /&gt;[sbalusu@example.com@host ~]$ hadoop org.apache.hadoop.security.HadoopKerberosName sbalusu@example.com&lt;BR /&gt;Name: sbalusu@example.com to sbalusu&lt;BR /&gt;[sbalusu@example.com@host ~]$ hadoop org.apache.hadoop.security.HadoopKerberosName sbalusu@EXAMPLE.COM&lt;BR /&gt;Name: sbalusu@EXAMPLE.COM to sbalusu&lt;/P&gt;&lt;P&gt;When only EXAMPLE.COM as trusted domain:&lt;BR /&gt;[sbalusu@example.com@host ~]$ hadoop org.apache.hadoop.security.HadoopKerberosName sbalusu@EXAMPLE.COM&lt;BR /&gt;Name: sbalusu@EXAMPLE.COM to sbalusu&lt;BR /&gt;[sbalusu@example.com@host ~]$ hadoop org.apache.hadoop.security.HadoopKerberosName sbalusu@example.com&lt;BR /&gt;18/06/28 17:41:41 INFO util.KerberosName: No auth_to_local rules applied to sbalusu@example.com&lt;BR /&gt;Name: sbalusu@example.com to sbalusu@example.com&lt;/P&gt;&lt;P&gt;and kinit shows EXAMPLE.COM&lt;BR /&gt;[sbalusu@example.com@host ~]$ kinit&lt;BR /&gt;Password for sbalusu@EXAMPLE.COM:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure from where hadoop is picking lower case realm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 18:36:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69431#M79985</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-06-28T18:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69593#M79986</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/27482"&gt;@balusu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you clarify what you are trying to test with lower case realms?&amp;nbsp; The realm in the kerberos principal should be uppercase, so the lower case is not expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you "kinit" make certain you specify the realm in uppercase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The auth_to_local rules are not intended to match a lowercase realm, so the response you get is expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Ben&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jul 2018 15:20:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69593#M79986</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-07-05T15:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69595#M79987</link>
      <description>&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&lt;BR /&gt;&lt;BR /&gt;I completely agree with the Uppercase realm concept and it worked fine for many clusters we deployed for different clients but somehow the current cluster only works when I have the lower case in trusted realms.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Siva</description>
      <pubDate>Thu, 05 Jul 2018 15:39:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69595#M79987</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-07-05T15:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69606#M79988</link>
      <description>&lt;P&gt;No problem.&amp;nbsp; I as long as you have a reasonable solution to address the issue, that's all good.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jul 2018 17:24:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69606#M79988</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-07-05T17:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69656#M79989</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&amp;nbsp; hdfs is not picking up the users from supergroup@domain.com, does auth to local rule works for groups?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hadoop.security.group.mapping&amp;nbsp;org.apache.hadoop.security.ShellBasedUnixGroupsMapping&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[sbalusu@domain.com@hostname ~]$ hadoop fs -chown hdfs:supergroup /user/test&lt;BR /&gt;chown: changing ownership of '/user/test': Non-super user cannot change owner&lt;/P&gt;&lt;P&gt;[sbalusu@domain.com@hostname ~]$ getent group supergroup@domain.com&lt;BR /&gt;supergroup@domain.com:*:514734591:sbalusu@supergroup.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried both group short name as well as group fqdn:&lt;BR /&gt;dfs.permissions.supergroup, dfs.permissions.superusergroup supergroup@domain.com&lt;/P&gt;&lt;P&gt;dfs.permissions.supergroup, dfs.permissions.superusergroup supergroup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jul 2018 18:59:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69656#M79989</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-07-06T18:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69657#M79990</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/27482"&gt;@balusu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;auth_to_local is used to map a user's principal to a unix name only.&amp;nbsp; It is not used for anything group-oriented.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By default, only the "hdfs" user is a superuser so it is the only user who can perform "chown" operations.&lt;/P&gt;&lt;P&gt;If you want to make other users superusers, you can do so by defining which group will be the "supergroup" and which users belong to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The group must be accessible via the OS (getent group supergroup).&amp;nbsp; The default name for the supergroup is "supergroup"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In cloudera Manager you can see this configuration in HDFS --&amp;gt; Configuration --&amp;gt; Superuser Group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there a reason you are trying to attach the "@domain" onto the group name?&lt;/P&gt;&lt;P&gt;I would recommend adding a group named "supergroup" if you don't need to change the default.&amp;nbsp; Then add sbalusu as a member.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note this has nothing to do with Kerberos at all at this point... this is all group mapping for hadoop.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jul 2018 19:07:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69657#M79990</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-07-06T19:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69658#M79991</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appolgise for the confusion, The supergroup I mentioned is hadoopadmingroup@example.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In cloudera Manager i changed this configuration in HDFS --&amp;gt; Configuration --&amp;gt; Superuser Group&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and tried setting it to&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;hadoopadmingroup@example.com and then&amp;nbsp;hadoopadmingroup, both of them did not worked.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;sssd&amp;nbsp;is set up to have a domain name at the end of Unix group and Unix user, Somehow hdfs is not able to map user to group with the domain name at the end.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;True, I agree this is not a Kerberos issue. My intention is to find if Hadoop&amp;nbsp;can work having a domain name at the end of the group so that I can have a conversation&amp;nbsp;with Unix team to trim domain name at the end of the group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Siva&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jul 2018 19:34:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69658#M79991</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-07-06T19:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69659#M79992</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/27482"&gt;@balusu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah, I'm not sure if supergroup mapping will work if the group has the domain on it.&amp;nbsp; I can't confirm it won't, but if you changed the group name, restarted HFDS, and still didn't have group access, that does indicate the config may not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may try running "hdfs groups &amp;lt;user&amp;gt;" to see if that command "sees" your groups....&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jul 2018 19:38:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69659#M79992</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-07-06T19:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69661#M79993</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ya, it does not seem to be working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;HDFS --&amp;gt; Configuration --&amp;gt; Superuser Group =&amp;nbsp;&lt;/SPAN&gt;hadoopadmingroup@example.com and then&amp;nbsp;hadoopadmingroup,&amp;nbsp;both of them yielded zero groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[sbalusu@example.com@hostname ~]$ hdfs groups sbalusu@example.com&lt;BR /&gt;sbalusu_c@example.com :&lt;BR /&gt;[sbalusu@example.com@hostname ~]$ hdfs groups sbalusu_c&lt;BR /&gt;sbalusu_c :&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;Siva&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jul 2018 19:52:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69661#M79993</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-07-06T19:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket error:No rules applied to hdfs@CDH5.14.2</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69729#M79994</link>
      <description>I have the SSSD configured to short name and everything looks good now!!! Thanks &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;</description>
      <pubDate>Mon, 09 Jul 2018 20:18:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Kerberos-ticket-error-No-rules-applied-to-hdfs-CDH5-14-2/m-p/69729#M79994</guid>
      <dc:creator>balusu</dc:creator>
      <dc:date>2018-07-09T20:18:26Z</dc:date>
    </item>
  </channel>
</rss>

