Member since
09-15-2015
294
Posts
764
Kudos Received
81
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
1586 | 07-27-2017 04:12 PM | |
4304 | 06-29-2017 10:50 PM | |
2008 | 06-21-2017 06:29 PM | |
2269 | 06-20-2017 06:22 PM | |
2050 | 06-16-2017 06:46 PM |
03-23-2017
05:58 PM
1 Kudo
You just need to logon to the namenode hosts and run the same grep command on the /etc/group file
... View more
03-23-2017
05:27 PM
1 Kudo
I think what he means is to check the same on the namenode hosts.
... View more
03-23-2017
05:15 PM
1 Kudo
Hi Jeeva, Find the superusergroup value in hdfs-site.xml. Lets say for instance this value is 'hadoop' Once you find that value, you need to do is "grep 'superusergroup:' /etc/group" i.e if that value is hadoop, it will be: grep 'hadoop:' /etc/group
This should return you the list of all users belonging to the supergroup.
... View more
03-23-2017
04:30 PM
7 Kudos
Below is one similar post which might help: https://community.hortonworks.com/questions/43502/hue-installation-hdp-24-and-rhel7.html
... View more
03-23-2017
04:18 PM
7 Kudos
@Jeeva Jeeva - There is a property "dfs.permissions.superusergroup" in hdfs-site.xml which specifies the superusergroup. Please see below apache guide for HDFS Permissions: https://hadoop.apache.org/docs/r2.4.1/hadoop-project-dist/hadoop-hdfs/HdfsPermissionsGuide.html To list all the users belonging to the supergroup, its just like getting users belonging to a group in linux. Below is good article on that: https://www.cyberciti.biz/faq/linux-list-all-members-of-a-group/
... View more
03-23-2017
01:13 AM
1 Kudo
So, this works fine as expected when we provide the Active Namenode in the curl call instead of the Proxy server. Yeah, I don't think we can work around this by using a proxy. There is an Apache Jira already open for the issue: https://issues.apache.org/jira/browse/HDFS-6371 For now I think you can either use the way we did above, or have Knox / Httpfs
... View more
03-23-2017
12:45 AM
1 Kudo
Can you please paste the output of running below commands : kinit -kt /etc/security/keytabs/spnego.service.keytab HTTP/node2.localdomain@HO-UBU02
klist
curl -i --negotiate -u : 'http://node2.localdomain:50070/webhdfs/v1/tmp/?op=LISTSTATUS'
... View more
03-23-2017
12:25 AM
1 Kudo
Can you please share your hdfs-site.xml file.
... View more
03-22-2017
11:48 PM
1 Kudo
Below posts also have similar login error: https://community.hortonworks.com/questions/83331/error-unable-to-perform-the-desired-action-due-to.html https://community.hortonworks.com/questions/54164/how-to-enable-user-authentication-with-kerberos-in.html https://community.hortonworks.com/questions/63770/nifi-authorization-problem.html Please see if this helps!
... View more
03-22-2017
11:36 PM
@Hajime - Please see below Apache Documentation for WebHdfs Authentication: https://hadoop.apache.org/docs/stable/hadoop-project-dist/hadoop-hdfs/WebHDFS.html#Authentication As stated in point 2 for Kerberos enabled cluster you can do kinit with Spengo Principal and perform the webhdfs operation. Can you please paste the command you are trying and the stack trace to debug further?
... View more