Support Questions
Find answers, ask questions, and share your expertise
Announcements
Alert: Welcome to the Unified Cloudera Community. Former HCC members be sure to read and learn how to activate your account here.

Hue Job Browser issue on a kerberized cluster

Hue Job Browser issue on a kerberized cluster

Contributor

We recently enabled kerberos ( MIT-KDC ) on a cluster HDP 2.3.2/Ambari 2.1.2.1.

I also installed Hue and configured using the following link ..

http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_installing_manually_book/content/ch_insta...

I am able to see all the jobs when I click on the Hue Job Browser but when I try to click on any job ID .. i see the following error

Could not find job application_1458248146517_0015.

Job application_1458248146517_0015 could not be found: <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/> <title>Error 401 Authentication required</title> </head> <body><h2>HTTP ERROR 401</h2> <p>Problem accessing /ws/v1/applicationhistory/apps/application_1458248146517_0015. Reason: <pre> Authentication required</pre></p><hr /><i><small>Powered by Jetty://</small></i><br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> </body> </html> (error 401)

Could some one please point me in the right direction on how to troubleshoot this issue?

3 REPLIES 3
Highlighted

Re: Hue Job Browser issue on a kerberized cluster

Expert Contributor
@rbalam

Can you set up kerberos info for Hue: Hue Kerberos?

Highlighted

Re: Hue Job Browser issue on a kerberized cluster

Contributor

@mbalakrishnan

I already went through that doc and here is my config

[[kerberos]] #

Path to Hue's Kerberos keytab file

hue_keytab=/etc/security/keytabs/hue.service.keytab

# Kerberos principal name for Hue

hue_principal=hue@EXAMPLE.COM

# Path to kinit

kinit_path=/usr/bin/kinit

## Frequency in seconds with which Hue will renew its keytab. Default 1h.

## reinit_frequency=3600

## Path to keep Kerberos credentials cached.

## ccache_path=/tmp/hue_krb5_ccache

CDD0001V:~#kinit -kt /etc/security/keytabs/hue.service.keytab hue@EXAMPLE.COM

CDD0001V:~#klist

Ticket cache: FILE:/tmp/krb5cc_34255 Default principal: hue@EXAMPLE.COM

Valid starting Expires Service principal 03/23/16 14:09:22 03/24/16 14:09:22 krbtgt/EXAMPLE.COM@EXAMPLE.COM renew until 03/23/16 14:09:22

Check configuration link shows the following which indicates the config is fine.

Configuration files located in /etc/hue/conf.empty

All OK. Configuration check passed.

However I see the following in supervisor.log but not sure if it is related

[23/Mar/2016 14:10:58 +0000] supervisor WARNING Exit code for /usr/lib/hue/build/env/bin/hue runcpserver: 1 [23/Mar/2016 14:10:58 +0000] supervisor ERROR Process /usr/lib/hue/build/env/bin/hue runcpserver exited abnormally

Highlighted

Re: Hue Job Browser issue on a kerberized cluster

Explorer

Hello, we are having exactly the same problem. We have map reduce, pig, hive and spark running successfully from the command line.

Our setup works. In Hue, we have also everything working fine, expect when we submit a Map Reduce job: the job is working, but when looking at it from the job history, we are getting the same error. When submitting TEZ or Spark jobs, we can see the job details.

When tracking down the issue, we see that in the Hue logs that for the job history: http_client DEBUG REST invocation:

curl -X GET  -H Accept: application/json 'http://my_cluster:19888/ws/v1/history/mapreduce/jobs/job_1474295224072_0004' 

Which is wrong. It should contain a --negotiate such as:

http_client  DEBUG    REST invocation: curl -X GET --negotiate -H Accept: application/json 'http://my_cluster:19888/ws/v1/history/mapreduce/jobs/job_1474295224072_0004' 

Looking at the source code shows no indication of any kind of support for that.

So my question is: is Hue shipped in HDP 2.4 capable to use Kerberos for this job browser?

Don't have an account?
Coming from Hortonworks? Activate your account here