Member since
01-19-2017
3679
Posts
632
Kudos Received
372
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 1554 | 06-04-2025 11:36 PM | |
| 2024 | 03-23-2025 05:23 AM | |
| 956 | 03-17-2025 10:18 AM | |
| 3614 | 03-05-2025 01:34 PM | |
| 2509 | 03-03-2025 01:09 PM |
01-10-2019
05:59 PM
@Divya Thaore If you generated the ssh-keys hoping you didn't protect it with a password navigate to the /root/.ssh directory and # cat id_rsa And copy all the content between including the begin and end as shown and paste in the designated window in Ambari UI -----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEA8qP3SQ+81GIpYSd/Sw1uKjt1khxv/zh4aEbRbPK0pcaW1KAh
9mD76BdouBRifv6Mn8ydnanSthRNOmH1LcF8YhkudLseKJFoLO2iIFWtFwSqMPmX
cipTpBo+1YQGdrf3ugKsBZ+vWZBisEI6F5pTGHUrAEO3phYXQxfP6GEoVGQj7aIB
........ ..... qUzoqQKBgBjIJakrJfoFGySAOImIxjQDD0sv3ZTc85WtFeFyRvQxewdPQDS8NvZo
6pyhYJRSGSgaL+xzEwg3D1ofQinkYw1jVYUzldBZESMOslmEuOzYbpImnY3yxLOG
Yo0j49637Chn8BMVnrlELUWWf6YHOrXmwHT6nu71WmbqFBzbmsv8 -----END RSA PRIVATE KEY----- or using WinSCP download the above file and use the option to load from your windows/mac client HTH
... View more
01-10-2019
03:48 PM
@Divya Thaore A good practice to configure passwordless ssh by generating ssh-key on the Ambari server and copying it to all the host in the cluster. Those are the pre-requisites for the cluster install see steps below #####################################
# Generating the ssh key on CentOS 7
#####################################
ssh-keygen
chmod 700 ~/.ssh
cat ~/.ssh/id_rsa.pub >> /root/.ssh/authorized_keys
chmod 600 ~/.ssh/authorized_keys
########################################
# copy the public key to all other hosts
########################################
cat .ssh/id_rsa.pub | ssh root@xxx_host 'cat >> .ssh/authorized_keys' Or you can use manual by installing the ambari-agent on the other nodes but this is impractical for large clusters! One the slave node # yum install -y ambari-agent Then edit the ambari-agent.ini, under security [server]
hostname=$FQDN_Ambari server
url_port=8440
secured_url_port=8441
The start the agent # ambari-agent start Then you can proceed with you Ambari UI adding the hosts remember to do this on all the host you intend to join to your cluster HTH
... View more
01-09-2019
08:48 AM
@huzaira bashir Here they are
... View more
01-08-2019
02:20 PM
@Kunal Kumar Can you share your /etc/hosts files? To me it seems this is the first host in the cluster, what is your cluster name?
... View more
01-08-2019
10:30 AM
2 Kudos
@choppadandi vamshi krishna @Raymond Honderdors I choose to disagree on creating your own because of compatibility and support issues. According to the support matrix the valid HDF versions for HDP 3.0 are HTH
... View more
01-07-2019
10:42 PM
@harish Create the test user principal Let's try this out as root create user at OS level # useradd test Set password # passwd test evoke the kdc admin CLI, run these commands from /etc/security/keytabs # kadmin.local ..
kadmin.local: addprinc test@RXPERF.HDP.XX.COM
Quit kadmin
Kadmin.local: q Extract/Generate the keytab The extracting the keytab is done in the ktutil shell cmd a continuation from the previous step the keytab name and principal is an explicit input it’s usually good if it matches the user for easy identification. This will extract the keytab in the current directory i.e /etc/security/keytabs/ you can later move it to the user’s home directory or the /tmp directory #sudo ktutil
ktutil : addent –password –p test@RXPERF.HDP.XX.COM -k 1 -e RC4-HMAC
Password for test@RXPERF.HDP.XX.COM :
ktutil : wkt test.keytab
ktutil : q Now to validate the above steps run as the user test $ klist -kt /etc/security/keytabs/test.keytab The output should look like Keytab name: FILE:/etc/security/keytabs/test.keytab
KVNO Timestamp Principal
---- ----------------- --------------------------------------------------------
1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (des3-cbc-sha1)
1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (aes128-cts-hmac-sha1-96)
1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (arcfour-hmac)
1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (des-cbc-md5)
1 01/07/19 22:25:31 test@RXPERF.HDP.XX.COM (aes256-cts-hmac-sha1-96) Now grab a ticket using as test user format kinit -kt $keytab $principal $ kinit -kt /etc/security/keytabs/test.keytab test@RXPERF.HDP.XX.COM Check for ticket Klist Let me know if that works
... View more
01-07-2019
09:32 PM
1 Kudo
@harish Can you share with me exactly how you created the new principal and keytab? I would like to see the syntax remember to garble sensitive info. Also remember to add a new entry in the cron kprop to also propagate the newly create principal in the slave KDC database to the Primary so in case you switch back everything is in sync !!
... View more
01-07-2019
07:23 PM
@harish Was the creation successful without errors? If so can you list the principals in the slave KDC On the slave # kadmin.local
kadmin: listprincs Is your slave KDC also in the krb5.conf? In the format. [realms]
EXAMPLE.COM = {
...
kdc = kdc1.example.com
kdc = kdc2.example.com
...
} Because multiple KDCs may exist for an installation (failover, high availability, etc, Ambari should allow a user to specify multiple KDC hosts to be set while enabling Kerberos and updating the Kerberos service's configuration. This should be done by allowing kerberos-env/kdc_host to accept a (comma-)delimited list of hosts and then parsing that list properly when building the krb5.conf file where each kdc_host item generates an entry in the relevant realm block kerberos-env And in Ambari your kerberos.env should have an entry the {
...
"kdc_hosts" : "kdc1.example.com, kdc2.example.com"
...
} Some Ambari KDC documentation To backup a KDC database to a file, use krb5_util_dump. # kdb5_util dump kdcfile To restore the KDC database from the dump file created in the above step, do the following: # kdb5_util load kdcfile Please revert
... View more
01-07-2019
03:34 PM
1 Kudo
@choppadandi vamshi krishna After successfully running the --mpack you will need to go to the bottom left of the Ambari UI and click on Stack and Version, for illustration see the attached screenshot. Nifi and Nifi Registry should be available for installation. You should be able to proceed with the nifi setup and choose whether you want it clustered or a single node. In my example, I added a 6 node cluster to an existing HDP cluster. Follow the screen flow at the end of the installation and restart of the nifi services you should see all the Nifi node in your Ambari UI. I would advise you don't install the Certificate authority which will mean all login will be anonymous. Setting the Certificates needs access to the AD or creating the first Admin user who is the Nif superuser to create and grant privileges in Nifi HTH
... View more
01-07-2019
09:35 AM
@huzaira bashir Can you share the corresponding to my screenshots photo5 and 6 , I built a VM to test your case and documented all the steps over the weekend and I am surprised it can't work for you. Is Java Cryptography Extension (JCE) installed, check the syntax below please adjust your jdk_home accordingly # zipgrep CryptoAllPermission /usr/jdk64/jdk1.8.0_112/jre/lib/security/local_policy.jar The desired output should be default_local.policy: permission javax.crypto.CryptoAllPermission;
... View more
- « Previous
- Next »