Community Articles
Find and share helpful community-sourced technical articles
Super Guru

Note - I did receive few complaints about this script that it's failing on new Ambari versions, It happened because of change in kerberos payload. I have modified the script and it works like a charm again for new versions. Please continue to provide me the feedback! 🙂

Disclaimer - "Please do not use unless you know what u r doing! Test on Dev. cluster before using on production systems" 🙂

Automated Kerberos Installation and Configuration – For this post, I have written a shell script which uses Ambari APIs to configure Kerberos on HDP Single or Multinode clusters. You just need to clone our github repository and modify property file according to your cluster environment, execute setup script and phew!! Within 5-10 minutes you should have your cluster completely secured by Kerberos! Cool isn’t it? :)

Detailed Steps(Demo on HDP Sandbox 2.4):

1. Clone our github repository Ambari server in your HDP Cluster

Note - This script will install and configure KDC on your Ambari Server.

git clone

Sample Output:

[root@sandbox ~]# git clone
Initialized empty Git repository in /root/useful-scripts/.git/
remote: Counting objects: 29, done.
remote: Compressing objects: 100% (25/25), done.
remote: Total 29 (delta 4), reused 25 (delta 3), pack-reused 0
Unpacking objects: 100% (29/29), done.

2. Goto useful-scripts/ambari directory
[root@sandbox ~]# cd useful-scripts/ambari/
[root@sandbox ambari]# ls -lrt
total 16
-rw-r--r-- 1 root root 5701 2016-04-23 20:33
-rw-r--r-- 1 root root 748 2016-04-23 20:33 README
-rw-r--r-- 1 root root 366 2016-04-23 20:33 ambari.props
[root@sandbox ambari]#

3. Copy and ambari.props to the host where you want to setup KDC Server

4. Edit and modify ambari.props file according to your cluster environment

Note - In case of multinode cluster, Please don't forget to add comma separated list of hosts as a value of KERBEROS_CLIENTS variable.

Sample output for my Sandbox

[root@sandbox ambari]# cat ambari.props
##### Notes #####
#1. KERBEROS_CLIENTS - Comma separated list of Kerberos clients in case of multinode cluster
#2. Admin princial is admin/admin and password is hadoop
[root@sandbox ambari]#

5. Start installation by simply executing


1. Please run from KDC_HOST only, you don’t need to setup or configure KDC, this script will do everything for you.

2. If you are running script on Sandbox then please turn OFF maintenance mode for HDFS and turn ON maintenance mode for Zepplin Notebook before executing the script.



1. Before Script execution


2. Script execution is in progress


3. Script execution has finished


4. Voila!!


Please comment if you have any feedback/questions/suggestions. Happy Hadooping!! :)


Thanks Kuldeep Kulkarni. This is working perfectly fine. But its not generating keytabs for root user. Which is resulting in user not found in KDC database when i am trying to run "hadoop fs -ls /" command. Is there a way to acheive this ?


Thank you, the script works and the Kerberos is enabled after running the script.

But how to connect Toad for apache hadoop?

can you please provide the instruction?



you can create your own root principal

su admin
bash-4.1$ kadmin
Couldn't open log file /var/log/kadmind.log: Permission denied
Authenticating as principal admin/admin@HWX.COM with password.
Password for admin/admin@HWX.COM:
kadmin:  add_principal root
Enter password for principal "root@HWX.COM":
Re-enter password for principal "root@HWX.COM":
kadmin: exit
Super Guru
Super Guru

@Richard Guo - Thank you. Yes for AD, work is in progress. I will update you once done


@Artem Ervits

whom are you referring to by "admin" ? FYI. I am using AD as KDC. I don't have a local KDC.


Local user on OS


How to create a keytab file to root to login remotely?


Not applicable

Thanks Kuldeep,

Can you suggest that how we can configure for Multi node custer?

Super Guru

@shivom mali - You can use same script, only you need to add comma separate hosts in for KERBEROS_CLIENTS


In case you want to perform this via the UI, the docs for enabling Kerberos via Ambari can be found here:

Including a section on setting up an MIT KDC:


There is also an Ambari project wiki page on using the Ambari API for Kerberos:

Not applicable

Awesome work

Thank you so much Kuldeep for the wonderful blog, This makes me so easier to Kerberized two clusters and Implement the Cross Relam between two Kerberized clusters. Thanks Again !!!

Expert Contributor

@Kuldeep Kulkarni Add "deploy JCE policies" steps as prerequisites. I tried without JCE and it fails for me.

Let me know if i am missing anything.