Member since
01-19-2017
3679
Posts
632
Kudos Received
372
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 787 | 06-04-2025 11:36 PM | |
| 1367 | 03-23-2025 05:23 AM | |
| 679 | 03-17-2025 10:18 AM | |
| 2464 | 03-05-2025 01:34 PM | |
| 1603 | 03-03-2025 01:09 PM |
08-01-2017
03:35 PM
1 Kudo
@Hema Penumatsa Can you try to reinstall it on the node that's causing a problem,you will first need to stop the agent, then run the below commands. # yum install epel-release
# yum erase ambari-agent
# yum install -y ambari-agent Then edit the ambari-agent.ini, and under the Server change the host to your Ambari server FQDN vi /etc/ambari-agent/conf/ambari-agent.ini [server]
hostname={your.ambari.server.hostname} Then start the agent. This should resolve the problem
... View more
08-01-2017
10:25 AM
1 Kudo
@@Smart Data If you intend to run a secure Hadop cluster then there is no way you can avoid Kerberos. Below are the difference between knox and kerberos. The Apache Knox Gateway is a system that provides a single point of authentication and access. It provides the following features:
Single REST API Access Point Centralized authentication, authorization and auditing for Hadoop REST/HTTP services LDAP/AD Authentication, Service Authorization and Audit Eliminates SSH edge node risks Hides Network Topology LAYERS OF DEFENSE FOR A HADOOP CLUSTER
Perimeter Level Security – Network Security, Apache Knox (gateway) Authentication : Kerberos Authorization OS Security : encryption of data in network and HDFS Apache Knox can also access a Hadoop cluster over HTTP or HTTPS CURRENT FEATURES OF APACHE KNOX
Authenticate : by LDAP or Cloud SSO Provider Provides services for HDFS, HCat, HBase, Oozie, Hive, YARN, and Storm HTTP access for Hive over JDBC support is available (ODBC driver Support- In Future) Hope that helps to explain.
... View more
08-01-2017
10:24 AM
@@Smart Data If you intend to run a secure Hadop cluster then there is no way you can avoid Kerberos. Below are the difference between knox and kerberos. The Apache Knox Gateway is a system that provides a single point of authentication and access. It provides the following features:
Single REST API Access Point Centralized authentication, authorization and auditing for Hadoop REST/HTTP services LDAP/AD Authentication, Service Authorization and Audit Eliminates SSH edge node risks Hides Network Topology LAYERS OF DEFENSE FOR A HADOOP CLUSTER
Perimeter Level Security – Network Security, Apache Knox (gateway) Authentication : Kerberos Authorization OS Security : encryption of data in network and HDFS Apache Knox can also access a Hadoop cluster over HTTP or HTTPS CURRENT FEATURES OF APACHE KNOX
Authenticate : by LDAP or Cloud SSO Provider Provides services for HDFS, HCat, HBase, Oozie, Hive, YARN, and Storm HTTP access for Hive over JDBC support is available (ODBC driver Support- In Future) Hope that helps to explain.
... View more
07-30-2017
08:37 PM
@Prabhat Ratnala This should answer your question Hope that helps
... View more
07-29-2017
11:09 PM
1 Kudo
@Ameya Sakhalkar Don't worry you can create a new Ranger database as follow change username and password to suit your environment. mysql -u root -p{rootpassword}
CREATE USER 'ranger'@'localhost' IDENTIFIED BY 'ranger_password';
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'localhost';
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'rangerDBhost';
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'%';
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'localhost' WITH GRANT OPTION;
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'rangerDBhost' IDENTIFIED BY 'ranger' WITH GRANT OPTION;
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'localhost' IDENTIFIED BY 'ranger_password' WITH GRANT OPTION;
GRANT ALL PRIVILEGES ON *.* TO 'ranger'@'%' WITH GRANT OPTION;
FLUSH PRIVILEGES;
# mysql -u ranger -pranger
CREATE DATABASE ranger;
################ simpler version ###################
create database ranger;
create user ranger identified by 'ranger';
grant all on ranger.* to ranger;
Flush privileges; Let me know if that helps
... View more
07-27-2017
03:34 PM
@Ameya Sakhalkar Just run this it should work while logged on as root MySQL,make sure you are connected to the ranger database grant all on rangeradmin.* to ranger;
Flush privileges;
... View more
07-26-2017
08:50 PM
@@Mazin Mohammed Any updates on this issue?
... View more
07-24-2017
06:14 PM
@Divakar Annapureddy
No the expiry date is "renew until 07/31/2017 08:28:49" 07/24/2017 08:28:50 07/24/2017 18:28:50 krbtgt/EXAMPLE.COM@EXAMPLE.COM
renew until 07/31/2017 08:28:49
... View more
07-24-2017
12:46 PM
@Mazin Mohammed Your kerberos ticket should now expire in 7 days 07/31/2017 08:28:49 can you monitor to see if the nn again goes down?
... View more
07-24-2017
06:35 AM
@Mazin Mohammed How about the ntp setting across the cluster? Can you run the below commands substituting with the correct values. First run the klit -kt to get the principal for namenode ... # klist -kt /etc/security/keytabs/nn.service.keytab
Keytab name: FILE:/etc/security/keytabs/nn.service.keytab
KVNO Timestamp Principal
---- ------------------- ------------------------------------------------------
1 07/18/2017 08:49:43 nn/my_fdqn.com@REALM.COM
1 07/18/2017 08:49:43 nn/my_fdqn.com@REALM.COM
1 07/18/2017 08:49:43 nn/my_fdqn.com@REALM.COM
1 07/18/2017 08:49:43 nn/my_fdqn.com@REALM.COM
1 07/18/2017 08:49:43 nn/my_fdqn.com@REALM.COM
# kinit -kt /etc/security/keytabs/nn.service.keytab nn/my_fdqn.com@REALM.COM
# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: nn/my_fdqn.com@REALM.COM
Valid starting Expires Service principal
07/24/2017 06:30:56 07/25/2017 06:30:56 krbtgt/REALM.COM@REALM.COM
... View more